Yandex Cloud
Search
Contact UsTry it for free
  • Customer Stories
  • Documentation
  • Blog
  • All Services
  • System Status
  • Marketplace
    • Featured
    • Infrastructure & Network
    • Data Platform
    • AI for business
    • Security
    • DevOps tools
    • Serverless
    • Monitoring & Resources
  • All Solutions
    • By industry
    • By use case
    • Economics and Pricing
    • Security
    • Technical Support
    • Start testing with double trial credits
    • Cloud credits to scale your IT product
    • Gateway to Russia
    • Cloud for Startups
    • Center for Technologies and Society
    • Yandex Cloud Partner program
    • Price calculator
    • Pricing plans
  • Customer Stories
  • Documentation
  • Blog
© 2026 Direct Cursus Technology L.L.C.
Yandex MPP Analytics for PostgreSQL
  • Getting started
    • All guides
      • Pre-configuration
      • FQDNs of hosts
      • Connecting from applications
      • Code examples
    • Connecting to an external file server (gpfdist)
    • Auxiliary utilities
  • Access management
  • Pricing policy
  • Terraform reference
  • Monitoring metrics
  • Audit Trails events
  • Public materials
  • Release notes

In this article:

  • Configuring security groups
  • Obtaining an SSL certificate
  • What's next
  1. Step-by-step guides
  2. Connection
  3. Pre-configuration

Pre-configuring a Greenplum® cluster connection

Written by
Yandex Cloud
Updated at March 5, 2026
  • Configuring security groups
  • Obtaining an SSL certificate
  • What's next

Since Greenplum® is based on PostgreSQL, the same tools are used for connecting to both.

You can only connect to a Greenplum® cluster through the primary master host. To identify host roles, get a list of hosts in the cluster.

You can connect to a cluster:

  • From Yandex Cloud VMs located in the same cloud network

  • Over the internet if you configured public access for your cluster.

You can connect over the internet in the following ways:

  • Use an SSL connection.
  • Use IAM authentication.

Without an SSL connection, internal cloud network traffic is not encrypted.

Configuring security groupsConfiguring security groups

You can assign one or more security groups to a Greenplum® cluster. To connect to a cluster, security groups must include rules allowing traffic on port 6432 from certain IP addresses or other security groups.

Note

A security group assigned to a cluster controls traffic between the cluster and other cloud or external resources. You do not need to configure interaction between cluster hosts, as it is controlled by a separate system security group.

Rule settings depend on the chosen connection method:

Over the internet
From a VM in Yandex Cloud
  1. For incoming traffic:

    • Port range: 6432.
    • Protocol: TCP.
    • Source: CIDR.
    • CIDR blocks: Range of addresses to connect from.
  2. For outgoing traffic:

    • Port range: 0-65535.
    • Protocol: Any (Any).
    • Source: CIDR.
    • CIDR blocks: 0.0.0.0/0.

    This rule enables Yandex MPP Analytics for PostgreSQL to use external data sources, e.g., PXF or GPFDIST.

  1. Add the following rules to the cluster security group:

    1. For incoming traffic:

      • Port range: 6432.
      • Protocol: TCP.
      • Source: Security group.
      • Security group: If your cluster and VM share the same security group, select Current. Otherwise, specify the VM security group.
    2. For outgoing traffic:

      • Port range: 0-65535.
      • Protocol: Any.
      • Source: CIDR.
      • CIDR blocks: 0.0.0.0/0.

      This rule enables Yandex MPP Analytics for PostgreSQL to use external data sources, e.g., PXF or GPFDIST.

  2. Configure the VM security group to allow connections to the VM as well as traffic between the VM and the cluster hosts.

    • For inbound traffic:

      • Port range: 22.
      • Protocol: TCP.
      • Source: CIDR.
      • CIDR blocks: Range of addresses to connect from.

      This rule allows VM connections over SSH.

    • For outbound traffic:

      • Port range: 0-65535.
      • Protocol: Any.
      • Destination name: CIDR.
      • CIDR blocks: 0.0.0.0/0.

      This rule permits all outbound traffic, allowing you to install any necessary certificates and tools on your VM.

Obtaining an SSL certificateObtaining an SSL certificate

To use an SSL connection, get a certificate:

Linux (Bash)/macOS (Zsh)
Windows (PowerShell)
mkdir -p ~/.postgresql && \
wget "https://storage.yandexcloud.net/cloud-certs/CA.pem" \
     --output-document ~/.postgresql/root.crt && \
chmod 0655 ~/.postgresql/root.crt

The certificate will be saved to the ~/.postgresql/root.crt file.

mkdir $HOME\.postgresql; curl.exe -o $HOME\.postgresql\root.crt https://storage.yandexcloud.net/cloud-certs/CA.pem

The certificate will be saved to the $HOME\.postgresql\root.crt file.

Corporate policies and antivirus software can block the download of certificates. For more information, see FAQ.

To use graphical IDEs, save a certificate to a local folder and specify the path to it in the connection settings.

What's nextWhat's next

  • Get the FQDN of the host you want to connect to.
  • Connect to the cluster from a graphical IDE, pgAdmin 4 or Docker container.
  • Integrate the cluster connection into your application code.

Greenplum® and Greenplum Database® are registered trademarks or trademarks of Broadcom Inc. in the United States and/or other countries.

Was the article helpful?

Previous
Deleting a cluster
Next
FQDNs of hosts
© 2026 Direct Cursus Technology L.L.C.