Connection Options
There are three ways to connect Superblocks to your integration:
Direct Connection
By default, Integrations are connected to the Superblocks Cloud via direct connection. This makes it simple to get started and simple to manage. Superblocks Cloud acts as a proxy to your Integrations. For production databases and non-public internal APIs, we recommend using IP allowlists to protect your environment, see next section for more details.
IP Allowlists
When using Superblocks' cloud-only deployment model, it is vital that Superblocks is able to connect to your configured integrations. In order to keep your environment secure the following IP addresses must be added to an allowlist within your environment.
- US Instance
- EU Instance
NAT hostname | Current DNS | Last Recorded IPs |
---|---|---|
nat.superblocks.com | A Records | 107.22.228.244 3.93.101.124 34.209.17.50 34.227.169.51 35.155.119.178 35.171.116.214 35.86.18.137 44.232.244.93 54.148.33.216 |
NAT hostname | Current DNS | Last Recorded IPs |
---|---|---|
nat.eu.superblocks.com | A Records | 52.17.136.219 99.81.159.1 54.220.65.107 13.50.50.66 13.50.81.30 13.51.231.18 |
A simple implementation guide is found below for both AWS and GCP.
- AWS
- GCP
- Log in to the AWS Console
- Navigate to the resource that you would like Superblocks to connect to
- If you are applying an allowlist to an RDS instance, the instance must be set to
Publicly accessible
(this is found under Connectivity -> Additional configuration)
- Select an existing Security Group or create a new one
- Select the Inbound tab at the bottom and click edit
- Choose the port to connect over (defaults for Postgres: 5432, MySQL: 3306, MSSQL: 1433)
- Set Source to Custom and enter the following IP addresses
107.22.228.244/32, 3.93.101.124/32, 34.209.17.50/32, 34.227.169.51/32, 35.155.119.178/32, 35.171.116.214/32, 35.86.18.137/32, 44.232.244.93/32, 54.148.33.216/32
- Click Save rules
- Log in to the GCP Console
- Navigate to VPC Network -> Firewall
- Select an existing Firewall Rule or create a new one
- Set the following
- Direction of traffic: Ingress
- Action on match: Allow
- Targets: All instances on network
- Source Filter: IPv4 ranges
- Source IPv4 ranges: Add the following IP addresses
107.22.228.244/32, 3.93.101.124/32, 34.209.17.50/32, 34.227.169.51/32, 35.155.119.178/32, 35.171.116.214/32, 35.86.18.137/32, 44.232.244.93/32, 54.148.33.216/32
- Protocols and Ports: Specified protocols and ports, TCP Ports (defaults for Postgres: 5432, MySQL: 3306, MSSQL: 1433)
- Click Create/Save
On-premise Agent
See the On-premise Agent page for more details.