This topic describes how to add information about an exclusive resource group for Data Integration, the default resource group, or a custom resource group to the whitelist of a data store.
Before you use a database as a data store in DataWorks, you must add the IP addresses or Classless Inter-Domain Routing (CIDR) blocks that you use to access the database to the whitelist of the database. This improves security and stability of the database.
- If the sync nodes run on an exclusive resource group for Data Integration, add the CIDR block or the Elastic Network Interface (ENI) IP address of the VSwitch to which the exclusive resource group is bound to the whitelist of the data store.
- If the sync nodes run on the default resource group, add the IP addresses or CIDR blocks of the region where the workspace resides to the whitelist of the data store. For more information about the IP addresses and CIDR blocks of each region, see Add the information about the default resource group to the whitelist of a data store.
- If the sync nodes run on a custom resource group, add the internal or public IP addresses of the servers in the custom resource group to the whitelist of the data store.
Add the information about an exclusive resource group for Data Integration to the whitelist of a data store
- The exclusive resource group for Data Integration is in the same region as the data store to be accessed.
- The exclusive resource group for Data Integration is bound to the same virtual private cloud (VPC) and VSwitch as the data store to be accessed.
For more information about how to purchase an exclusive resource group for Data Integration and bind it to a VPC, see Add an exclusive resource group for data integration. .
An exclusive resource group for Data Integration may still fail to access a data store after you bind it to the same VPC and VSwitch as the data store and configure a route. This is because the resource group is not in the whitelist of the data store.
- Log on to the DataWorks console.
- In the left-side navigation pane, click Resource Groups.
- On the Exclusive Resource Groups tab, find the resource group whose information you want to view and click View Information in the Actions column.
- In the dialog box that appears, click the value of the EIPAddress parameter. The value is automatically copied. Add the value to the whitelist of the data store. Use the same method to add the value of CIDR Blocks to the whitelist.
- On the Exclusive Resource Groups tab, find the resource group whose information you want to view and click Add VPC Binding in the Actions column. On the page that appears, obtain the ENI IP address and add it to the whitelist of the data store.
Add the information about the default resource group to the whitelist of a data store
- Log on to the DataWorks console as a developer.
- In the left-side navigation pane, click Workspaces.
- In the top navigation bar, select a region.
DataWorks supports multiple regions. Select the region where your MaxCompute project resides.
- Determine the IP addresses or CIDR blocks to be added to the whitelist of the data
store to be accessed based on the selected region.
Region CIDR block or IP address China (Hangzhou) 100.64.0.0/10,184.108.40.206/24,220.127.116.11/24,18.104.22.168/24,22.214.171.124/24,126.96.36.199/24,188.8.131.52/24,184.108.40.206/24,220.127.116.11/24,18.104.22.168/24,22.214.171.124/24,126.96.36.199/24,188.8.131.52/24 China (Shanghai) 184.108.40.206/24,220.127.116.11/24,18.104.22.168/24,22.214.171.124/24,126.96.36.199/24,10.117.28.203,10.143.32.0/24,10.152.69.0/24,10.153.136.0/24,10.27.63.15,10.27.63.38,10.27.63.41,10.27.63.60,10.46.64.81,10.46.67.156,188.8.131.52/24,184.108.40.206/24,220.127.116.11/24,18.104.22.168/24,22.214.171.124/24,126.96.36.199/24,188.8.131.52/24,184.108.40.206/24,220.127.116.11/24,18.104.22.168/24,22.214.171.124,126.96.36.199,188.8.131.52,184.108.40.206,220.127.116.11,18.104.22.168,22.214.171.124,126.96.36.199,100.64.0.0/10,10.117.39.238 China (Shenzhen) 100.106.46.0/24,100.106.49.0/24,10.152.27.0/24,10.152.28.0/24,188.8.131.52/24,184.108.40.206/24,220.127.116.11/24,100.64.0.0/10,18.104.22.168/24,22.214.171.124/24,126.96.36.199/24,188.8.131.52/26,184.108.40.206/26,220.127.116.11/26,18.104.22.168/26 China (Chengdu) 22.214.171.124/24,126.96.36.199/24,188.8.131.52/24,100.64.0.0/10 China (Zhangjiakou-Beijing Winter Olympics) 184.108.40.206/24,220.127.116.11/24,100.64.0.0/10 China (Hong Kong) 10.152.162.0/24,18.104.22.168/24,22.214.171.124/24,100.64.0.0/10,126.96.36.199/24,188.8.131.52/24,184.108.40.206/24,220.127.116.11/24,18.104.22.168/25,22.214.171.124/25,126.96.36.199/24 Singapore (Singapore) 100.106.10.0/24,100.106.35.0/24,10.151.234.0/24,10.151.238.0/24,10.152.248.0/24,188.8.131.52/24,184.108.40.206/24,220.127.116.11/24,100.64.0.0/10,18.104.22.168/24,22.214.171.124/24,126.96.36.199/24,188.8.131.52/24,184.108.40.206/24,220.127.116.11/24,18.104.22.168/24,22.214.171.124/24,126.96.36.199/24,188.8.131.52/24 Australia (Sydney) 184.108.40.206/24,220.127.116.11/24,18.104.22.168/24,22.214.171.124/24,126.96.36.199/24,100.64.0.0/10,188.8.131.52/24,184.108.40.206/24,220.127.116.11/24,18.104.22.168/24 China (Beijing) 100.106.48.0/24,10.152.167.0/24,10.152.168.0/24,22.214.171.124/24,126.96.36.199/24,188.8.131.52/24,184.108.40.206/24,100.64.0.0/10,220.127.116.11/24,18.104.22.168/24,22.214.171.124/24,126.96.36.199/24,188.8.131.52/24,184.108.40.206/24,220.127.116.11/24 US (Silicon Valley) 10.152.160.0/24,100.64.0.0/10,18.104.22.168/24,22.214.171.124/24,126.96.36.199/24 US (Virginia) 188.8.131.52/26,184.108.40.206/26,220.127.116.11/26,18.104.22.168/26,22.214.171.124/26,126.96.36.199/26,188.8.131.52/26,184.108.40.206/26,10.128.134.0/24,220.127.116.11/24,18.104.22.168/24,22.214.171.124/24,100.64.0.0/10 Malaysia (Kuala Lumpur) 126.96.36.199/24,188.8.131.52/24,184.108.40.206/24,220.127.116.11/24,100.64.0.0/10,18.104.22.168/24,22.214.171.124/24,126.96.36.199/24 Germany (Frankfurt) 188.8.131.52/24,184.108.40.206/24,220.127.116.11/24,18.104.22.168/24,22.214.171.124/24,100.64.0.0/10,126.96.36.199,188.8.131.52,184.108.40.206,220.127.116.11,18.104.22.168,22.214.171.124,126.96.36.199,188.8.131.52,184.108.40.206,220.127.116.11,18.104.22.168,22.214.171.124/24,126.96.36.199/24 Japan (Tokyo) 100.105.55.0/24,188.8.131.52/24,184.108.40.206/24,220.127.116.11/24,100.64.0.0/10,18.104.22.168/24,22.214.171.124/24,126.96.36.199/24,188.8.131.52/24,184.108.40.206/24,220.127.116.11/24,18.104.22.168/26,22.214.171.124/26,126.96.36.199/26,188.8.131.52/26 UAE (Dubai) 184.108.40.206/24,220.127.116.11/24,18.104.22.168/24,22.214.171.124/24,126.96.36.199/24,100.64.0.0/10 India (Mumbai) 188.8.131.52/24,184.108.40.206/24,220.127.116.11/24,18.104.22.168/24,22.214.171.124/24,100.64.0.0/10,126.96.36.199/24,188.8.131.52/24,184.108.40.206/24,220.127.116.11/26,18.104.22.168/26,22.214.171.124/26,126.96.36.199/26 UK (London) 188.8.131.52/24,100.64.0.0/10 Indonesia (Jakarta) 184.108.40.206/24,220.127.116.11/24,18.104.22.168/24,22.214.171.124/24,100.64.0.0/10,126.96.36.199/24,10.143.32.0/24,188.8.131.52/24,184.108.40.206/24,220.127.116.11/26,18.104.22.168/26,22.214.171.124/26,126.96.36.199/26 China North 2 Ali Gov 188.8.131.52/24,100.64.0.0/10,184.108.40.206
If the CIDR blocks cannot be added, add the following IP addresses: 220.127.116.11,18.104.22.168,22.214.171.124,126.96.36.199,188.8.131.52,184.108.40.206,220.127.116.11,18.104.22.168,22.214.171.124,126.96.36.199,188.8.131.52,184.108.40.206,220.127.116.11,18.104.22.168,22.214.171.124/24
China East 2 Finance 126.96.36.199/25,188.8.131.52/25,184.108.40.206/25,220.127.116.11/25,18.104.22.168/25,22.214.171.124/25,126.96.36.199/25,188.8.131.52/25,184.108.40.206/25,220.127.116.11/25,18.104.22.168/25,22.214.171.124/26,126.96.36.199/26,188.8.131.52/26,184.108.40.206/26,220.127.116.11/24,18.104.22.168/24,22.214.171.124/24,126.96.36.199/24,188.8.131.52/24,100.104.8.0/24
Add the information about a custom resource group to the whitelist of a data store
To allow a sync node that runs on a custom resource group to access a data store, you must add the required information to the whitelist of the data store. If the data store is hosted on an Elastic Compute Service (ECS) instance, you must also add the information to the security group of the ECS instance. The required information includes the internal or public IP addresses of the servers in the custom resource group.
Configure a whitelist for an ApsaraDB for RDS instance
- ApsaraDB for RDS instance mode
You can add an RDS connection by specifying the corresponding ApsaraDB for RDS instance. Connectivity testing is supported for RDS connections added in this mode, including RDS connections for ApsaraDB for RDS instances deployed in a VPC. If an RDS connection added in this mode fails the connectivity test, add the RDS connection in JDBC URL mode.
- JDBC URL mode
When you add an RDS connection in JDBC URL mode, specify the internal endpoint of the corresponding ApsaraDB for RDS instance as the JDBC URL. If no internal endpoint is available, enter the public endpoint as the JDBC URL. The internal endpoint is used to transfer data inside a data center of Alibaba Cloud. If you use the internal endpoint, data can be synchronized in a faster manner. If you use the public endpoint, the data synchronization speed is limited by the Internet bandwidth package that you purchased.
Configure a whitelist for an ApsaraDB for RDS instance
To allow Data Integration to synchronize data from or to an ApsaraDB for RDS instance, you must connect Data Integration to the ApsaraDB for RDS instance by using a standard database protocol. By default, an ApsaraDB for RDS instance allows connections from all IP addresses. However, if you have configured a whitelist for the ApsaraDB for RDS instance, you must add the IP addresses or CIDR blocks used by Data Integration to the whitelist. If you have not configured a whitelist for the ApsaraDB for RDS instance, you do not need to perform this operation.
If you have configured a whitelist for the ApsaraDB for RDS instance, log on to the ApsaraDB for RDS console and add the corresponding IP addresses or CIDR blocks to the whitelist. For more information, see Control access to an ApsaraDB RDS for MySQL instance.