Connecting via Reverse SSH Tunnel
This page walks through connecting your data sources via a Reverse SSH Tunnel
Getting Started
The Reverse SSH Tunnel is used securely connect local data sources without opening ports, while encrypting data in-transit.
Setup
On your own EC2/VM, you will run the secoda/agent
docker image. You can use docker-compose, like so:
To retrieve the docker compose environment for your tunnel, go to https://app.secoda.co/tunnels and create a new reverse tunnel.
Copy the details to your clipboard, and replace the contents of your docker compose file with this configuration.
Running the agent
Once you have inputted the values, you can restart the Secoda Agent with:
Using the reverse tunnel
On an integration credentials page, fill in the integration connection details. DNS names are resolved on the agent, so you may use local hostnames.
Select the reverse tunnel you would like to use. Test connection.
Troubleshooting
Upon running the agent, if the agent becomes stuck on the version number during the startup process, similar to:
This typically means that the outbound connection is blocked. Please check your firewall settings. Secoda can adjust the outbound port to a whitelisted one if necessary.
Last updated