AWS

Tree Schema supports AWS-specific data base DynamoDB & S3 as well as RDS databases MySQL, Oracle & Postgres. This page focuses on the RDS connections as DynamoDB & S3 connect via HTTPs.


Connecting in Tree Schema

AWS does not have special requirements for connecting to database from Tree Schema. You can enter the connection details just as you would as if you were connecting locally or through another application.

../../_images/ts_aws_msssql.png

Connecting to a Public Database

If your database has a public endpoint then you can connect directly from Tree Schema as long as the appropriate security group policies allow inbound access from Tree Schema. You will need to update one of the databases’ security groups to allow inbound access to the databases’ required port from the Tree Schema exposed IP address which can be found in the admin portal under Jump Servers.

The following security group rule will allow Tree Schema direct access to a publicly exposed RDS Postgres instance, simply change the Type or port for your database type.

../../_images/aws_postgres_security_group.png

Connecting to a Private Database

Databases in private subnets can be accessed through a jump server that sits in a public subnet that has access to your database. To allow Tree Schema to access your database you will need to provide Tree Schema SSH access to the jump server. This will be port 22 on the jump server:

The following security group rule will allow Tree Schema direct access to a publicly exposed RDS Postgres instance, simply change the Type or port for your database type.

../../_images/aws_jump_server.png

You will need to add the jump server in Tree Schema and select it when setting up your database.