Connect to RDS instance with PostgreSQL with AWS Secrets Manager? - postgresql

I have an RDS instance utilizing PostgreSQL in a VPC. This DB uses Secrets Manager for authentication. I created an EC2 within the same VPC and subnet as my RDS instance. I have attached policies to give full access to my EC2 instance.
I have verified I can access Secrets Manager through this EC2 instance by getting a json response of the secretstring and other details.
I use this information to try and access my aurora-postgresql cluster to no avail. connection timed out.
DB accepts inbound traffic to port 5432.
Any tips on what to diagnose next?

Related

Google Composer / Airflow - connection to MongoDB Atlas

We have an airflow task that adds data to the mongodb server.
We can connect to the mongodb server only behind IP Access or VPC Peering.
We are having issues with VPC Peering, so we thought we can just enable direct IP access between the airflow workers and the mongodb server
Has anyone done that?
If not, do you have another suggestion?

Why am I getting connection timed out when connecting to AWS Document DB from my local machine with TLS disabled?

When utilizing AWS' connection string to connect to my Amazon Document DB instance in Robo3T I'm getting a 'Connection Timed Out' error.
Error connecting to ....cluster-....us-east-1.docdb.amazonaws.com:27017 (123.45.67.89:27017) :: caused by :: Connection timed out :
AWS does not currently support connecting to Document DB from public endpoints when not using SSH.
Connecting from Public Endpoints
You are trying to connect to an Amazon DocumentDB cluster directly
from your laptop or local development machine.
Trying to connect to an Amazon DocumentDB cluster directly from a
public endpoint, such as your laptop or local development machine,
will fail. Amazon DocumentDB is virtual private cloud (VPC)-only and
does not currently support public endpoints. Thus, you can't connect
directly to your Amazon DocumentDB cluster from your laptop or local
development environment outside of your VPC.
To connect to an Amazon DocumentDB cluster from outside an Amazon VPC,
you can use an SSH tunnel. For more information, see Connecting to an
Amazon DocumentDB Cluster from Outside an Amazon VPC. Additionally, if
your development environment is in a different Amazon VPC, you can
also use VPC Peering and connect to your Amazon DocumentDB cluster
from another Amazon VPC in the same region or a different region.
More details here: https://docs.aws.amazon.com/documentdb/latest/developerguide/troubleshooting.connecting.html#troubleshooting.cannot-connect.public-endpoints

Mongodb atlas dedicated cluster: how to create peering connection with AWS and then access the cluster without whitelisting ips

We have a dedicated M10 cluster in Mongodb Atlas, on which I have created a peering connection with AWS to incorporate security using VPC. I have followed this Mongodb document for configuring peering connection between AWS and cluster.
https://docs.atlas.mongodb.com/security-vpc-peering/
The peering connection is created successfully and is active now. But the thing is, I am unable to connect to cluster without whitelisting my IP. When I try to connect without whitelisting the IP, it gives below error:
Something went wrong MongooseServerSelectionError: Could not connect
to any servers in your MongoDB Atlas cluster. One common reason is
that you're trying to access the database from an IP that isn't
whitelisted. Make sure your current IP address is on your Atlas
cluster's IP whitelist:
https://docs.atlas.mongodb.com/security-whitelist/
While after whitelisting the IP, I am able to connect to cluster successfully from local environment.
What do I need to access a cluster within VPC using application? I can not use the option IP whitelisting as every user's IP can not be whitelisted.
I have already whitelisted CIDR block as mentioned by the above documentation.
IP whitelisting is separate from peering. Peering determines the network, whitelisting determines who on the network is allowed access.
If you want to allow access from anything that has physical connectivity to the database, whitelist the entire world (0.0.0.0/0).

Connecting MongoDB Atlas to Kubernetes EKS Cluster on AWS

I'm trying to setup an VPC Peering from my MongoDB Atlas Cluster to my Kubernetes EKS Cluster on AWS. The Peering is established successfully but i get no connection to the cluster on my pod's.
The peering is setup.
The default entry for the whitelist ist added as well. Once the connection works i will replace it with a security Group.
The peering on AWS is accepted and "DNS resolution from requester VPC to private IP" is enabled.
The route as been added to the Public Route Table of the K8S Cluster.
When i connect to a pod and try to establish a connection with the following command:
# mongo "mongodb://x.mongodb.net:27017,y.mongodb.net:27017,z.mongodb.net:27017/test?replicaSet=Cluster0-shard-0" --ssl --authenticationDatabase admin --username JackBauer
I get "CONNECT_ERROR" for every endpoint.
What am I missing?
NOTE:
I've just created a new paid cluster and the VPC is working perfectly. Might this feature be limited to paid clusters only?
Well... as the documentation states:
You cannot configure Set up a Network Peering Connection on M0 Free
Tier or M2/M5 shared clusters.
Peering is not working on shared Cluster. Which makes, after i think about it, totally sense.

AWS RDS Aurora PostgreSQL serverless: How to set public accessibility to Yes

we have a instance of AWS RDS Aurora PostgreSQL Serverless with a vpc security group associated allowing connections from any place and any port, but we are unable to connect.
we always get the error "could not connect to server: Connection timed out "
We have found references to "public accessibility" parameter to solve the problem, but we are unable to find where to make the change.
Any help?
THanks
Aurora Serverless does not support publicly accessible endpoints at this time. It must be accessed from inside the VPC. Make sure you are attempting to connect to Aurora from within the VPC, and that the security group assigned to the Aurora cluster has the appropriate rules to allow access.