Definite IP Address

First things first, if your database has IP address / networking security, you’ll need to whitelist our IP address:

146.148.83.61
34.42.34.129

Here’s how to do this on various cloud platforms

Amazon Web Services (AWS) Security Groups

1

Log in to the AWS Management Console and open the Amazon RDS console at https://console.aws.amazon.com/rds/.

2

In the navigation pane, choose Security groups.

3

Choose the Security Group associated with your database.

4

In the details pane, choose the Inbound tab, then choose Edit .

5

Choose Add Rule.

6

In the Type dropdown, select the protocol you want to permit.

7

In the Source section, enter our IP address in the format: '146.148.83.61/32'.

8

Choose Save .

Google Cloud Platform (GCP) Firewall Rules

1

Open the Google Cloud Console at https://console.cloud.google.com/.

2

Select your project.

3

In the left sidebar, click on VPC network, then click Firewall.

4

Click Create Firewall Rule .

5

Enter a name for the firewall rule.

6

Under Target tags, enter the network tag associated with your instance.

7

Under Source filter, choose IP ranges.

8

In the Source IP ranges field, enter our IP address (146.148.83.61).

9

Under Protocols and ports, select the protocol and ports used by your SQL database.

10

Click Create.

Microsoft Azure SQL Database Server-Level Firewall Rules

1

Log in to the Azure portal at https://portal.azure.com/.

2

In the left-hand menu, select SQL databases.

3

In the SQL databases pane, choose your database.

4

In the toolbar at the top, click Set server firewall.

5

At the top of the firewall settings page, click + Add client IP.

6

Enter our IP address in the Start IP and End IP fields.

7

Click Save.

Snowflake Network Policies

1

Log in to the Snowflake web interface.

2

On the top menu, click on Account >> Policies.

3

Click on Create.

4

Enter a name for the network policy.

5

In the Allowed IP Addresses field, enter our IP address.

6

Leave the Blocked IP Addresses field empty.

7

(Optional) Check the Enforce MFA box for multi-factor authentication.

8

Click Finish.

9

Assign the network policy to the necessary users or roles.

Google Cloud BigQuery

BigQuery leverages GCP’s security model, and thus it doesn’t offer native IP whitelisting like a traditional database. Instead, it relies on Google Cloud’s Identity and Access Management (IAM) system, OAuth, and other security protocols.

If your BigQuery data is connected to a Compute Engine instance, you can use GCP’s firewall rules:

1

Open the Google Cloud Console at https://console.cloud.google.com/.

2

Select your project.

3

In the left sidebar, click on VPC network, then click Firewall.

4

Click Create Firewall Rule.

5

Enter a name for the firewall rule.

6

Under Target tags, enter the network tag associated with your instance.

7

Under Source filter, choose IP ranges.

8

In the Source IP ranges field, enter our IP address.

9

Under Protocols and ports, select the protocol and ports used by your Compute Engine instance.

10

Click Create.

Always remember to only whitelist trusted IP addresses and maintain your security settings updated. Regularly reviewing and updating these settings will help protect your resources from unauthorized access.