All Products
Search
Document Center

DataV:Configure a database whitelist

Last Updated:Mar 10, 2025

This topic describes how to configure a database whitelist in DataV. Before you add a data source in DataV, you must add the IP addresses in the whitelist of the target region to that of your data source so that DataV can access your database.

  • If you are using a ApsaraDB for RDS database, add the following IP addresses to the configuration of the RDS database. For more information, see Connect to an ApsaraDB RDS for MySQL instance from a client or command line.

  • If you are using a user-created database hosted on an Alibaba Cloud ECS instance as the data source, you must add the IP addresses listed in the following table to the security group rules of the ECS instance, system firewall, and your database whitelist.

  • If your data source is from a user-created database, you must add the following IP addresses to the system firewall of the physical server, the network firewall, and the whitelist of your database.

Select a whitelist based on your connection scenario.

Whitelist for the Internet

Region

IP address

A public whitelist needs to be configured for all regions.

47.99.11.181/24,47.94.185.180/24,47.100.102.0/24,47.102.234.0/25,47.102.181.128/25,47.101.109.0/24,182.92.144.171/24,139.224.92.0/24,139.224.4.0/24,120.76.104.101/24,114.55.195.74/24,112.74.156.111/24,106.14.210.237/24

In addition to the public whitelist, add the whitelist on the right side based on the region.

China (Zhangjiakou)

47.92.22.210/24,47.92.22.68/24

China (Qingdao)

118.190.212.44/24

China (Hohhot)

39.104.29.35/24

Whitelist for an internal network (classic network)

Region

IP address

A public whitelist needs to be configured for all regions.

11.192.98.48/24,11.192.98.61/24,11.192.98.47/24,10.152.164.34/24,11.192.98.58/24,10.152.164.17/24,10.152.164.42/24,11.192.98.37/24,10.152.164.31/24,10.152.164.66/24,10.152.164.22/24,11.115.105.33,11.115.104.230,11.115.103.137,11.115.105.7,11.115.105.28,11.115.103.112,11.115.105.40,11.115.103.158

In addition to the public whitelist, add the whitelist on the right side based on the region.

China (Hangzhou)

11.193.54.74/24,11.193.54.148/24,11.197.246.34/24,11.196.22.196/24

China (Shenzhen)

11.193.104.240/24,11.192.96.136/24

China (Shanghai)

11.192.98.16/24,10.152.164.14/24,11.192.98.36/24

China (Beijing)

11.193.75.233/24,11.193.75.205/24,11.193.83.98/24,11.197.231.75/24

China (Zhangjiakou)

11.193.62.210/24,11.193.234.81/24

China (Qingdao)

11.193.179.76/24,11.193.179.75/24

China (Hohhot)

11.193.183.183/24,11.193.183.184/24

China East 2 Finance

11.192.98.16/24,10.152.164.14/24,11.192.98.36/24

China (Finance Cloud)

11.193.104.240/24,11.192.96.136/24

Important

When you configure an intranet (classic network) whitelist, you may encounter 11 CIDR blocks. For more information, see 11 CIDR blocks.

Whitelist for an internal network (VPC)

Region

IP address

China (Hangzhou)

100.104.70.0/24

China (Shanghai)

100.104.81.0/24

China (Beijing)

100.104.83.0/24

China (Shenzhen)

100.104.131.128/26

China (Zhangjiakou)

100.104.194.128/26

China (Qingdao)

100.104.45.64/26

China (Hohhot)

100.104.194.128/26

China East 2 Finance

100.104.113.64/26

China (Finance Cloud)

100.104.79.128/26

Troubleshoot inaccessible IP addresses on the 11.x.x.x network segments

If IP addresses on the 11.x.x.x network segments are inaccessible, run the following command to add a route to the /etc/rc.local file.

sudo route add -net 11.0.0.0/8 gw 10.152.28.247
Note

gw the IP address behind your server's local gateway.

If the problem persists, submit a ticket to ECS technical personnel.