What is the best way to configure a design node to make a secure connection to a PostgreSQL server?
I'm thinking that an ssh tunnel might be a way, using an ssh command like this:
ssh -L5211:/var/run/postgresql/.s.PGSQL.5432 email@example.com
The above seems to complete successfully from my localhost.
Then to create a Postgress DSS Connection sort of like this:
Host = localhost
Database = mydatabase
port = 5211
User = account
Password = [blank]
Unfortunately. when trying to test this connection I get.
When I look at the "more errors" link I get.
If folks think that this is a good approach for connecting to a PostgreSQL server remotely in an encrypted way to a design node. Then I also wonder if there is a way to automatically make setup of the ssh tunnel each time that DSS is started or each time this connection is used less manual. From an operational point of view, I'd hate to have to manually start the ssh tunnel, then start DSS.
I'm currently working from a macintosh computer running OSX 10.13.x, connecting to a Linux remote server with the PostgreSQL server.
considering the settings in the DSS connection, why not simply:
ssh -L 5211:localhost:5432 firstname.lastname@example.org
Is your postgresql server not binding on all interfaces for port 5432? (on the remote machine)
I found that a command:
ssh -N -L 5211:/var/run/postgresql/.s.PGSQL.5432 email@example.com
Note: I add a space between the “L” and the first “5” and adding a “-N” as the first parameter of the command.
I also found that you had to click the create button on the DSS connection screen before you could test the connection without error.
Now the question, I'd like to grant DSS the opportunity to set up its own secure tunnel rather than having to go to a terminal window to open the tunnel. Is there a "safe" and "effective" way to get this done?