Whitelist Platform Service
Note
This feature may not be available in all product editions. For more information on available features, see Compare Editions.
Before you begin creating connections to your relational sources, you must whitelist the IP address range of the Alteryx Service in the relevant security groups.
Note
The database to which you are connecting must be available from the Alteryx Service over the public Internet.
The IP address range of the Alteryx Service is the following:
Note
On the database server for each relational source type (Oracle, SQL Server, etc.), you must whitelist these IP addresses.
For Designer Cloud Powered by Trifacta:
35.245.35.240/28
For Redshift:
For Redshift, there are two ways to whitelist the IP range depending on if you are using EC2-VPC or EC2-Classic (not common).
EC2-VPC (Security group): Add the IP address range to the inbound rule for the security group associated with the cluster. For more information, see https://docs.aws.amazon.com/redshift/latest/gsg/rs-gsg-authorize-cluster-access.html#rs-gsg-how-to-authorize-access-vpc-security-group.
EC2-Classic: Add the IP address range to the inbound rule for the security group associated with the EC2 instance. For more information, see https://docs.aws.amazon.com/redshift/latest/gsg/rs-gsg-authorize-cluster-access.html#rs-gsg-how-to-authorize-access-cluster-security-group.
For details on this process with RDS in general, see https://docs.aws.amazon.com/AmazonRDS/latest/UserGuide/Overview.RDSSecurityGroups.html
For more information, please contact Alteryx Support.