To connect to an AWS RDS Postgres instance from Azure Data Factory when public accessibility is disabled, you need to ensure that the network connectivity between Azure and AWS is correctly configured, and the security groups and firewall settings allow traffic between the two environments. Here are a few steps to troubleshoot your issue:
- Check network connectivity: Make sure that the VPN connection between your Azure and AWS environments is correctly configured and active. You can verify this in the AWS VPC console for the VPN connection status and the Azure portal for the Azure Virtual Network Gateway connection status.
- Check AWS security group rules: Ensure that the security group associated with the RDS instance allows inbound traffic from the Azure Data Factory's managed private endpoint or from the subnet where your integration runtime is running in Azure.
- Check Azure NSG rules: If you have a Network Security Group (NSG) associated with the Azure subnet, make sure it allows outbound traffic to the AWS RDS Postgres instance.
- Verify the connection string: Double-check the connection string used in the Azure Data Factory's source settings. Make sure the hostname, port number, and credentials are correct.
- Test the connectivity: You can use tools like
psql
or an application like pgAdmin to test the connectivity from a VM in your Azure environment to the AWS RDS Postgres instance. This can help you identify if the issue is related to the Azure Data Factory configuration or the network settings.
If you have followed these steps and are still facing issues, you may need to review your network configuration in more detail or consult your network administrators to ensure proper connectivity between the Azure and AWS environments.