Yandex Cloud
Search
Contact UsTry it for free
  • Customer Stories
  • Documentation
  • Blog
  • All Services
  • System Status
    • Featured
    • Infrastructure & Network
    • Data Platform
    • Containers
    • Developer tools
    • Serverless
    • Security
    • Monitoring & Resources
    • AI for business
    • Business tools
  • All Solutions
    • By industry
    • By use case
    • Economics and Pricing
    • Security
    • Technical Support
    • Start testing with double trial credits
    • Cloud credits to scale your IT product
    • Gateway to Russia
    • Cloud for Startups
    • Center for Technologies and Society
    • Yandex Cloud Partner program
    • Price calculator
    • Pricing plans
  • Customer Stories
  • Documentation
  • Blog
© 2025 Direct Cursus Technology L.L.C.
Yandex Managed Service for PostgreSQL
  • Getting started
    • All guides
      • Connecting to a database
      • SQL queries in Yandex WebSQL
      • Copying and populating a table
      • Managing databases
  • Access management
  • Pricing policy
  • Terraform reference
  • Monitoring metrics
  • Audit Trails events
  • Public materials
  • Release notes

In this article:

  • Configuring security groups
  • Obtaining an SSL certificate
  • PostgreSQL host FQDN
  • Special FQDNs
  • Current master
  • Most recent replica
  • Selecting an FQDN and cluster connection method
  • Connecting from graphical IDEs
  • Connecting from Yandex WebSQL
  • Connecting from pgAdmin 4
  • Connecting from Looker Studio
  • Before you connect from a Docker container
  • Connection strings examples
  • 1C:Enterprise
  • Bash
  • C++ (userver framework)
  • C# EF Core
  • Go
  • Java
  • Node.js
  • ODBC
  • PHP
  • PowerShell
  • Python
  • R
  • Ruby
  1. Step-by-step guides
  2. Databases
  3. Connecting to a database

Connecting to a database in a PostgreSQL cluster

Written by
Yandex Cloud
Improved by
Updated at December 5, 2025
  • Configuring security groups
  • Obtaining an SSL certificate
  • PostgreSQL host FQDN
  • Special FQDNs
    • Current master
    • Most recent replica
  • Selecting an FQDN and cluster connection method
  • Connecting from graphical IDEs
  • Connecting from Yandex WebSQL
  • Connecting from pgAdmin 4
  • Connecting from Looker Studio
  • Before you connect from a Docker container
  • Connection strings examples
    • 1C:Enterprise
    • Bash
    • C++ (userver framework)
    • C# EF Core
    • Go
    • Java
    • Node.js
    • ODBC
    • PHP
    • PowerShell
    • Python
    • R
    • Ruby

You can connect to Managed Service for PostgreSQL cluster hosts:

  • Over the internet, if you configured public access for the appropriate host. You can only connect to such hosts over an SSL connection.

  • From Yandex Cloud virtual machines located in the same cloud network. If there is no public access to a host, using SSL for connections from such virtual machines is not required.

  • From the Serverless Containers container. If the host is not publicly accessible, the container must be located on the same cloud network.

Warning

If only some cluster hosts have public access, an automatic master failover can make the master host unreachable from the internet.

Configuring security groupsConfiguring security groups

To connect to a cluster, security groups must include rules allowing traffic from certain ports, IP addresses, or from other security groups.

Rule settings depend on the chosen connection method:

Via the internet
From a Yandex Cloud VM

Configure all cluster security groups to allow incoming traffic on port 6432 from any IP address. To do this, create the following ingress rule:

  • Port range: 6432
  • Protocol: TCP
  • Source: CIDR
  • CIDR blocks: 0.0.0.0/0
  1. Configure all cluster security groups to allow incoming traffic on port 6432 from the target VM’s security group. To do this, create the following ingress rule in these groups:

    • Port range: 6432
    • Protocol: TCP
    • Source: Security group
    • Security group: If your cluster and VM are in the same security group, select Current (Self). Otherwise, specify the VM security group.
  2. Configure the VM security group to allow VM connections and traffic between the VM and the cluster hosts.

    For example, you can set the following rules for your VM:

    • For incoming traffic:

      • Port range: 22
      • Protocol: TCP
      • Source: CIDR
      • CIDR blocks: 0.0.0.0/0

      This rule allows VM connections over SSH.

    • For outgoing traffic:

      • Port range: 0-65535
      • Protocol: Any (Any)
      • Destination name: CIDR
      • CIDR blocks: 0.0.0.0/0

      This rule allows all outgoing traffic, thus enabling you not only to connect to the cluster but also to install the certificates and utilities your VM needs for the connection.

Note

You can specify more granular rules for your security groups, such as allowing traffic only within specific subnets.

All subnets containing cluster hosts must have properly configured security groups. With incomplete or incorrect security group settings, you may lose access to the cluster if a manual or automatic master failover occurs.

For more information about security groups, see Security groups.

Obtaining an SSL certificateObtaining an SSL certificate

Publicly accessible PostgreSQL hosts only support encrypted connections. You must obtain an SSL certificate to connect to them:

Linux (Bash)/macOS (Zsh)
Windows (PowerShell)
mkdir -p ~/.postgresql && \
wget "https://storage.yandexcloud.net/cloud-certs/CA.pem" \
     --output-document ~/.postgresql/root.crt && \
chmod 0655 ~/.postgresql/root.crt

The certificate will be saved to the ~/.postgresql/root.crt file.

mkdir $HOME\.postgresql; curl.exe -o $HOME\.postgresql\root.crt https://storage.yandexcloud.net/cloud-certs/CA.pem

The certificate will be saved to the $HOME\.postgresql\root.crt file.

Corporate policies and antivirus software can block the download of certificates. For more information, see FAQ.

To use graphical IDEs, save a certificate to a local folder and specify the path to it in the connection settings.

PostgreSQL host FQDNPostgreSQL host FQDN

To connect to a host, you will need its FQDN. You can get it using one of the following methods:

  • Request a list of cluster hosts.

  • In the management console, copy the command for connecting to the cluster. This command contains the host FQDN. To get the command, go to the cluster page and click Connect.

  • View the FQDN in the management console:

    1. Navigate to the cluster page.
    2. Navigate to Hosts.
    3. Copy the Host FQDN column value.

Cluster hosts also use special FQDNs.

Special FQDNsSpecial FQDNs

Alongside regular FQDNs, Managed Service for PostgreSQL offers special FQDNs that can be also used for cluster connections.

In multiple-host clusters, special FQDNs may for some time (up to 10 minutes) point to the old host, even if it has changed its role (e.g., from a master to a replica). If using a special FQDN which points to the current master, some write requests may fail if routed to the replica. This is because it takes time to update DNS records for special FQDNs. If your write request returns an error, repeat it later.

Current masterCurrent master

An FQDN in c-<cluster_ID>.rw.mdb.yandexcloud.net format always points to the current master host in the cluster. You can request the cluster ID with the list of clusters in the folder.

When connecting to this FQDN, you can perform read and write operations.

Warning

Use master host special FQDN-based connections only for processes that can cope with database being unavailable for writing for up to 10 minutes.

Most recent replicaMost recent replica

An FQDN in c-<cluster_ID>.ro.mdb.yandexcloud.net format points to the most up-to-date replica. You can request the cluster ID with the list of clusters in the folder.

Specifics:

  • When connecting to this FQDN, you can only perform read operations.
  • If there are no active replicas in the cluster, this FQDN will point to the current master host.
  • Replicas with a manually configured replication source cannot be selected as most up-to-date replicas when using this FQDN.

Selecting an FQDN and cluster connection methodSelecting an FQDN and cluster connection method

You can connect to a cluster using its host FQDNs or special FQDNs: If the cluster consists of multiple hosts and has autofailover enabled, you must account for this when connecting. This is important because the current master can become a replica at any moment, and vice versa.

Warning

If automatic failover promotes a host without public access to master or most up-to-date replica, that host will be unreachable from the internet. To avoid this, enable public access for all cluster hosts.

Use one of the following methods to connect to the master host with read and write access:

  • Connect using the special FQDN pointing to the current master.

    After a master failover, this FQDN may temporarily point to the previous master, now a replica, due to the time required for the DNS record to update.

    Therefore, applications using this FQDN must be designed to handle temporary master unavailability. For example, they should retry write requests after a short delay.

    Connection example

    In this example, we use the c9qash3nb1v9******** cluster ID:

    psql "host=c-c9qash3nb1v9********.rw.mdb.yandexcloud.net \
          port=6432 \
          sslmode=verify-full \
          dbname=<DB_name> \
          user=<username>"
    
  • Connect by listing all cluster hosts and specifying target_session_attrs=read-write.

    Connection example

    Here, we list all the cluster’s hosts.

    The host IDs are rc1a-be***.mdb.yandexcloud.net, rc1b-5r***.mdb.yandexcloud.net, and rc1d-t4***.mdb.yandexcloud.net:

    psql "host=rc1a-be***.mdb.yandexcloud.net,rc1b-5r***.mdb.yandexcloud.net,rc1d-t4***.mdb.yandexcloud.net \
          port=6432 \
          sslmode=verify-full \
          dbname=<DB_name> \
          user=<username> \
          target_session_attrs=read-write"
    

Use one of the following methods to connect to the host with read access:

  • Connect using a special FQDN pointing to the most up-to-date replica.

    Connection example

    In this example, we use the c9qash3nb1v9******** cluster ID:

    psql "host=c-c9qash3nb1v9********.ro.mdb.yandexcloud.net \
          port=6432 \
          sslmode=verify-full \
          dbname=<DB_name> \
          user=<username>"
    
  • Connect by listing all cluster hosts and specifying target_session_attrs=any.

    Connection example

    Here, we list all the cluster’s hosts.

    The host IDs are rc1a-be***.mdb.yandexcloud.net, rc1b-5r***.mdb.yandexcloud.net, and rc1d-t4***.mdb.yandexcloud.net:

    psql "host=rc1a-be***.mdb.yandexcloud.net,rc1b-5r***.mdb.yandexcloud.net,rc1d-t4***.mdb.yandexcloud.net \
          port=6432 \
          sslmode=verify-full \
          dbname=<DB_name> \
          user=<username> \
          target_session_attrs=any"
    

Note

You can use the target_session_attrs parameter when connecting via a client utilizing the libpq library.

Support for the read-write value in this parameter was introduced in libpq version 10.

How to update the library version used by psql
  • For Debian-based Linux distributions, install the postgresql-client-10 package or a newer version (e.g., from the official APT repository).
  • For RPM-based operating systems, install the PostgreSQL distribution from the yum repository.

Connecting from graphical IDEsConnecting from graphical IDEs

Connections were tested in the following environment:

  • Ubuntu 20.04, DBeaver: 22.2.4
  • MacOS Monterey 12.7:
    • JetBrains DataGrip: 2023.3.4
    • DBeaver Community: 24.0.0

From graphical IDEs, you can only connect to public cluster hosts using an SSL certificate.

To avoid connection errors, save the certificate to a local folder that does not require administrator rights to access.

DataGrip
DBeaver
  1. Create a data source:
    1. Select File → New → Data Source → PostgreSQL.
    2. Specify the connection settings on the General tab:
      • User, Password: Database user name and password.

      • URL: Connection string:

        jdbc:postgresql://<special_FQDN>:6432/<DB_name>
        

        You can also use a list of all cluster host FQDNs in the connection string:

        jdbc:postgresql://<PostgreSQL_host_1>:6432,...,<PostgreSQL_host_N>:6432/<DB_name>
        
      • Click Download to download the connection driver.

    3. On the SSH/SSL tab:
      1. Enable Use SSL.
      2. In the CA file field, specify the path to the file with an SSL certificate for the connection.
  2. Click Test Connection. If the connection is successful, you will see the connection status and information about the DBMS and driver.
  3. Click OK to save the data source.
  1. Create a new database connection:
    1. In the Database menu, select New connection.
    2. Select PostgreSQL from the database list.
    3. Click Next.
    4. Specify the connection settings on the Main tab:
      • Host: Master FQDN or regular host FQDN.
      • Port: 6432.
      • Database: Target database name.
      • Under Authentication, specify the database user name and password.
    5. On the SSL tab:
      1. Enable Use SSL.
      2. In the Root certificate field, specify the path to the saved SSL certificate file.
  2. Click Test Connection .... If the connection is successful, you will see the connection status and information about the DBMS and driver.
  3. Click Done to save the database connection settings.

Connecting from Yandex WebSQLConnecting from Yandex WebSQL

You can send SQL queries to databases in a Managed Service for PostgreSQL cluster using Yandex WebSQL.

WebSQL is a Yandex Cloud service that allows you to connect to managed database clusters, work with DBs, tables, and schemas, and run queries. It is a web-based tool that does not require additional authorization and simplifies working with SQL queries by suggesting prompts.

To connect from WebSQL to a Managed Service for PostgreSQL cluster, create a connection:

  1. Go to the folder page and select Managed Service for PostgreSQL.
  2. Click the cluster name.
  3. Enable the WebSQL access option in the cluster settings if it is not enabled yet.
  4. Select the WebSQL tab.
  5. Click Create connection and specify the connection parameters:
    • Connection name.
    • Database type: PostgreSQL.
    • Cluster: Defaults to your current PostgreSQL cluster.
    • Username you will use to connect to the database in the cluster.
    • User password.
    • Databases you want to connect to. You can only connect to the databases that exist in this cluster. The user you specified must have access to them configured.
  6. Click Create.

To open the SQL editor, click the created connection on the WebSQL tab. See a reference list of supported queries in the PostgreSQL documentation.

Note

You cannot use SQL commands to do anything that requires superuser access.

For more information about working with WebSQL, see its documentation.

Connecting from pgAdmin 4Connecting from pgAdmin 4

Connection testing was performed for pgAdmin 4 version 7.0 on Ubuntu 20.04.

Connections from pgAdmin 4 are only permitted to publicly accessible cluster hosts and require an SSL certificate.

Create a new server connection:

  1. Select Object → Register → Server...

  2. On the General tab, in the Name field, specify the cluster name to be shown in the pgAdmin 4 interface. You can set any name.

  3. In the Connection tab, specify the connection settings:

    • Host name/address: Master FQDN or regular host FQDN.
    • Port: 6432.
    • Maintenance database: Target database name.
    • Username: Username used to establish the connection.
    • Password: User password.
  4. In the Parameters tab:

    • Set the SSL mode parameter to verify-full.
    • Add a new Root certificate parameter and specify the path to the saved SSL certificate file in it.
  5. Click Save to save the server connection settings.

Your cluster will appear in the server list located in the navigation menu.

Connecting from Looker StudioConnecting from Looker Studio

Connections from Looker Studio are only permitted to publicly accessible hosts.

  1. Save the CA.pem server certificate to a local directory.

  2. In the same directory, generate a client certificate with a private key:

    openssl req -newkey rsa:2048 -nodes -keyout private.pem -out cert.pem
    

    During certificate creation, the program will ask you to modify several settings. Press Enter to keep the default values.

    You will see two files in your local directory: cert.pem and private.pem.

  3. On the Looker Studio navigation page, select Create → Data source.

  4. Select PostgreSQL.

  5. Fill out the fields as follows:

    • Host name or IP address: Master FQDN or regular host FQDN.
    • Port: 6432.
    • Database: Target database name.
    • Username: Username used to establish the connection.
    • Password: User password.
  6. Check Enable SSL and Enable client authentication.

  7. Specify the certificate files and the client private key in the appropriate fields:

    • Server certificate: Select the CA.pem file.
    • Client certificate: Select the cert.pem file.
    • Client private key: Select the private.pem file.
  8. Click Authenticate.

Before you connect from a Docker containerBefore you connect from a Docker container

To connect to a Managed Service for PostgreSQL cluster from a Docker container, add the following lines to the Dockerfile:

Connecting without SSL
Connecting with SSL
RUN apt-get update && \
    apt-get install postgresql-client --yes

See the Yandex Serverless Containers connection example in this tutorial.

RUN apt-get update && \
    apt-get install wget postgresql-client --yes && \
    mkdir --parents ~/.postgresql && \
    wget "https://storage.yandexcloud.net/cloud-certs/CA.pem" \
         --output-document ~/.postgresql/root.crt && \
    chmod 0655 ~/.postgresql/root.crt

Connection strings examplesConnection strings examples

The examples were tested in the following environment:

  • Yandex Cloud virtual machine running Ubuntu 20.04 LTS:
    • Bash: 5.0.16.
    • Python: 3.8.2; pip3: 20.0.2.
    • PHP: 7.4.3.
    • OpenJDK: 11.0.8; Maven: 3.6.3.
    • Node.JS: 10.19.0, npm: 6.14.4.
    • Go: 1.13.8.
    • Ruby: 2.7.0p0.
    • unixODBC: 2.3.6.
  • Yandex Cloud virtual machine running Windows Server 2019 Datacenter:
    • PostgreSQL: 13.
    • PowerShell: 5.1.17763.1490 Desktop.
    • .NET 5
    • Microsoft.EntityFrameworkCore 5.0.9
    • Npgsql.EntityFrameworkCore.PostgreSQL 5.0.7

Connections to public PostgreSQL hosts require an SSL certificate. Prepare a certificate before connecting to such hosts.

The examples below assume that the root.crt SSL certificate is located in the following directory:

  • /home/<home_directory>/.postgresql/ for Ubuntu.
  • $HOME\AppData\Roaming\postgresql for Windows.

Connections without an SSL certificate are only supported for hosts that are not publicly accessible. In this case, internal cloud network traffic will not be encrypted during database connections.

You can connect to a cluster using either regular host FQDNs, including a comma-separated list of several FQDNs, or special FQDNs. In our examples, we use the special FQDN pointing to the current master host.

To see code examples with the host FQDN filled in, open the cluster page in the management console and click Connect.

1C:Enterprise1C:Enterprise

If the cluster uses a PostgreSQL version optimized to work with 1C:Enterprise, specify in the settings:

  • Secure connection: Disabled.
  • DBMS type: PostgreSQL.
  • Database server: c-<cluster_ID>.rw.mdb.yandexcloud.net port=6432.
  • Database name: <DB_name>.
  • Database user: <username>.
  • User password: <password>.
  • Create database if none present: Disabled.

BashBash

Before connecting, install the following dependencies:

sudo apt update && sudo apt install --yes postgresql-client
Connecting without SSL
Connecting via SSL
  1. Connect to a database:

    psql "host=c-<cluster_ID>.rw.mdb.yandexcloud.net \
          port=6432 \
          sslmode=disable \
          dbname=<DB_name> \
          user=<username> \
          target_session_attrs=read-write"
    

    After running the command, enter the user password to complete the connection process.

  2. To check the connection, run this query:

    SELECT version();
    
  1. Connect to a database:

    psql "host=c-<cluster_ID>.rw.mdb.yandexcloud.net \
          port=6432 \
          sslmode=verify-full \
          dbname=<DB_name> \
          user=<user_name> \
          target_session_attrs=read-write"
    

    After running the command, enter the user password to complete the connection process.

  2. To check the connection, run this query:

    SELECT version();
    

C++ (userver framework)C++ (userver framework)

The asynchronous userver framework provides a rich set of abstractions for creating utilities, services, and microservices in C++. Among other things, the framework provides opportunities to work with PostgreSQL.

Before connecting, access the framework in one of the following ways:

  • Create a Yandex Compute Cloud virtual machine from the userver image. This image already contains the framework and all required dependencies.
  • Manually install the framework and all required dependencies.
Connecting without SSL
Connecting via SSL
  1. Create a project based on the service template.

  2. Modify the configs/config_vars.yaml configuration file. Specify the PostgreSQL cluster connection string for the dbconnection variable:

    postgres://<username>:<user_password>@c-<cluster_ID>.rw.mdb.yandexcloud.net:6432/<DB_name>
    
  3. Build a project and run the service:

    make build-debug && \
    ./build_debug/pg_service_template -c configs/static_config.yaml --config_vars configs/config_vars.yaml
    
  1. Create a project based on the service template.

  2. Modify the configs/config_vars.yaml configuration file. Specify the PostgreSQL cluster connection string for the dbconnection variable:

    postgres://<username>:<user_password>@c-<cluster_ID>.rw.mdb.yandexcloud.net:6432/<DB_name>?ssl=true&sslmode=verify-full
    
  3. Build a project and run the service:

    make build-debug && \
    ./build_debug/pg_service_template -c configs/static_config.yaml --config_vars configs/config_vars.yaml
    

Once started, the service will wait for a POST request from the user. While waiting for a request, the service will periodically check the PostgreSQL cluster's availability by running the SELECT 1 as ping request. You can find this information in the service logs.

Example of log contents on successful connection to the cluster
tskv ... level=INFO      module=MakeQuerySpan ( userver/postgresql/src/storages/postgres/detail/connection_impl.cpp:647 )
...
db_statement=SELECT 1 AS ping
db_type=postgres
db_instance=********
peer_address=c-********.rw.mdb.yandexcloud.net:6432
...

C# EF CoreC# EF Core

To connect to a cluster, you need the Npgsql package.

Connecting via SSL
using Npgsql;

namespace ConsoleApp
{
    class Program
    {
        static async Task Main(string[] args)
        {
            var host       = "c-<cluster_ID>.rw.mdb.yandexcloud.net";
            var port       = "6432";
            var db         = "<DB_name>";
            var username   = "<username>";
            var password   = "<user_password>";
            var connString = $"Host={host};Port={port};Database={db};Username={username};Password={password};Ssl Mode=VerifyFull;";

            await using var conn = new NpgsqlConnection(connString);
            await conn.OpenAsync();

            await using (var cmd = new NpgsqlCommand("SELECT VERSION();", conn))
            await using (var reader = await cmd.ExecuteReaderAsync())
            {
                while (await reader.ReadAsync())
                {
                    Console.WriteLine(reader.GetInt32(0));
                }
            }
        }
    }
}

GoGo

Before connecting, install the following dependencies:

sudo apt update && sudo apt install --yes golang git && \
go mod init example && go get github.com/jackc/pgx/v4
Connecting without SSL
Connecting via SSL
  1. Code example:

    connect.go

    package main
    
    import (
        "context"
        "fmt"
        "os"
    
        "github.com/jackc/pgx/v4"
    )
    
    const (
      host     = "c-<cluster_ID>.rw.mdb.yandexcloud.net"
      port     = 6432
      user     = "<username>"
      password = "<user_password>"
      dbname   = "<DB_name>"
    )
    
    func main() {
    
        connstring := fmt.Sprintf(
            "host=%s port=%d dbname=%s user=%s password=%s target_session_attrs=read-write",
            host, port, dbname, user, password)
    
        connConfig, err := pgx.ParseConfig(connstring)
        if err != nil {
            fmt.Fprintf(os.Stderr, "Unable to parse config: %v\n", err)
            os.Exit(1)
        }
    
        conn, err := pgx.ConnectConfig(context.Background(), connConfig)
        if err != nil {
            fmt.Fprintf(os.Stderr, "Unable to connect to database: %v\n", err)
            os.Exit(1)
        }
    
        defer conn.Close(context.Background())
    
        var version string
    
        err = conn.QueryRow(context.Background(), "select version()").Scan(&version)
        if err != nil {
            fmt.Fprintf(os.Stderr, "QueryRow failed: %v\n", err)
            os.Exit(1)
        }
    
        fmt.Println(version)
    }
    
  2. Connecting:

    go run connect.go
    
  1. Code example:

    connect.go

    package main
    
    import (
        "context"
        "crypto/tls"
        "crypto/x509"
        "fmt"
        "io/ioutil"
        "os"
    
        "github.com/jackc/pgx/v4"
    )
    
    const (
      host     = "c-<cluster_ID>.rw.mdb.yandexcloud.net"
      port     = 6432
      user     = "<username>"
      password = "<user_password>"
      dbname   = "<DB_name>"
      ca       = "/home/<home_directory>/.postgresql/root.crt"
    )
    
    func main() {
    
        rootCertPool := x509.NewCertPool()
        pem, err := ioutil.ReadFile(ca)
        if err != nil {
            panic(err)
        }
    
        if ok := rootCertPool.AppendCertsFromPEM(pem); !ok {
            panic("Failed to append PEM.")
        }
    
        connstring := fmt.Sprintf(
            "host=%s port=%d dbname=%s user=%s password=%s sslmode=verify-full target_session_attrs=read-write",
            host, port, dbname, user, password)
    
        connConfig, err := pgx.ParseConfig(connstring)
        if err != nil {
            fmt.Fprintf(os.Stderr, "Unable to parse config: %v\n", err)
            os.Exit(1)
        }
    
        connConfig.TLSConfig = &tls.Config{
            RootCAs:            rootCertPool,
            ServerName: "c-<cluster_ID>.rw.mdb.yandexcloud.net",
        }
    
        conn, err := pgx.ConnectConfig(context.Background(), connConfig)
        if err != nil {
            fmt.Fprintf(os.Stderr, "Unable to connect to database: %v\n", err)
            os.Exit(1)
        }
    
        defer conn.Close(context.Background())
    
        var version string
    
        err = conn.QueryRow(context.Background(), "select version()").Scan(&version)
        if err != nil {
            fmt.Fprintf(os.Stderr, "QueryRow failed: %v\n", err)
            os.Exit(1)
        }
    
        fmt.Println(version)
    }
    

    For this connection method, the code must include the full path to the root.crt certificate for PostgreSQL in the ca variable.

  2. Connecting:

    go run connect.go
    

JavaJava

Before connecting:

  1. Install the dependencies:

    sudo apt update && sudo apt install --yes default-jdk maven
    
  2. Create a folder for the Maven project:

    cd ~/ && mkdir -p project/src/java/com/example && cd project/
    
  3. Create a configuration file for Maven:

    pom.xml
    <?xml version="1.0" encoding="utf-8"?>
    <project xmlns="http://maven.apache.org/POM/4.0.0"
    xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
    xsi:schemaLocation="http://maven.apache.org/POM/4.0.0 https://maven.apache.org/xsd/maven-4.0.0.xsd">
    
      <modelVersion>4.0.0</modelVersion>
      <groupId>com.example</groupId>
      <artifactId>app</artifactId>
      <packaging>jar</packaging>
      <version>0.1.0</version>
      <properties>
        <maven.compiler.source>1.8</maven.compiler.source>
        <maven.compiler.target>1.8</maven.compiler.target>
      </properties>
      <dependencies>
        <dependency>
          <groupId>org.postgresql</groupId>
          <artifactId>postgresql</artifactId>
          <version>42.2.16</version>
        </dependency>
      </dependencies>
      <build>
        <finalName>${project.artifactId}-${project.version}</finalName>
        <sourceDirectory>src</sourceDirectory>
        <resources>
          <resource>
            <directory>src</directory>
          </resource>
        </resources>
        <plugins>
          <plugin>
            <groupId>org.apache.maven.plugins</groupId>
            <artifactId>maven-assembly-plugin</artifactId>
            <executions>
              <execution>
                <goals>
                  <goal>attached</goal>
                </goals>
                <phase>package</phase>
                <configuration>
                  <descriptorRefs>
                    <descriptorRef>
                    jar-with-dependencies</descriptorRef>
                  </descriptorRefs>
                  <archive>
                    <manifest>
                      <mainClass>com.example.App</mainClass>
                    </manifest>
                  </archive>
                </configuration>
              </execution>
            </executions>
          </plugin>
          <plugin>
            <groupId>org.apache.maven.plugins</groupId>
            <artifactId>maven-jar-plugin</artifactId>
            <version>3.1.0</version>
            <configuration>
              <archive>
                <manifest>
                  <mainClass>com.example.App</mainClass>
                </manifest>
              </archive>
            </configuration>
          </plugin>
        </plugins>
      </build>
    </project>
    

    Current dependency version for Maven: postgresql.

Connecting without SSL
Connecting via SSL
  1. Code example:

    src/java/com/example/App.java

    package com.example;
    
    import java.sql.*;
    
    public class App {
      public static void main(String[] args) {
        String DB_URL     = "jdbc:postgresql://c-<cluster_ID>.rw.mdb.yandexcloud.net:6432/<DB_name>?targetServerType=master&ssl=false&sslmode=disable";
        String DB_USER    = "<username>";
        String DB_PASS    = "<user_password>";
    
        try {
          Class.forName("org.postgresql.Driver");
    
          Connection conn = DriverManager.getConnection(DB_URL, DB_USER, DB_PASS);
          ResultSet q = conn.createStatement().executeQuery("SELECT version()");
          if(q.next()) {System.out.println(q.getString(1));}
    
          conn.close();
        }
        catch(Exception ex) {ex.printStackTrace();}
      }
    }
    
  2. Building and connecting:

    mvn clean package && \
    java -jar target/app-0.1.0-jar-with-dependencies.jar
    
  1. Code example:

    src/java/com/example/App.java

    package com.example;
    
    import java.sql.*;
    
    public class App {
      public static void main(String[] args) {
        String DB_URL     = "jdbc:postgresql://c-<cluster_ID>.rw.mdb.yandexcloud.net:6432/<DB_name>?targetServerType=master&ssl=true&sslmode=verify-full";
        String DB_USER    = "<username>";
        String DB_PASS    = "<user_password>";
    
        try {
          Class.forName("org.postgresql.Driver");
    
          Connection conn = DriverManager.getConnection(DB_URL, DB_USER, DB_PASS);
          ResultSet q = conn.createStatement().executeQuery("SELECT version()");
          if(q.next()) {System.out.println(q.getString(1));}
    
          conn.close();
        }
        catch(Exception ex) {ex.printStackTrace();}
      }
    }
    
  2. Building and connecting:

    mvn clean package && \
    java -jar target/app-0.1.0-jar-with-dependencies.jar
    

Node.jsNode.js

Before connecting, install the following dependencies:

sudo apt update && sudo apt install --yes nodejs npm && \
npm install pg
Connecting without SSL
Connecting via SSL

app.js

"use strict";
const pg = require("pg");

const config = {
    connectionString:
        "postgres://<username>:<user_password>@c-<cluster_ID>.rw.mdb.yandexcloud.net:6432/<DB_name>"
};

const conn = new pg.Client(config);

conn.connect((err) => {
    if (err) throw err;
});
conn.query("SELECT version()", (err, q) => {
    if (err) throw err;
    console.log(q.rows[0]);
    conn.end();
});

app.js

"use strict";
const fs = require("fs");
const pg = require("pg");

const config = {
    connectionString:
        "postgres://<username>:<user_password>@c-<cluster_ID>.rw.mdb.yandexcloud.net:6432/<DB_name>",
    ssl: {
        rejectUnauthorized: true,
        ca: fs
            .readFileSync("/home/<home_directory>/.postgresql/root.crt")
            .toString(),
    },
};

const conn = new pg.Client(config);

conn.connect((err) => {
    if (err) throw err;
});
conn.query("SELECT version()", (err, q) => {
    if (err) throw err;
    console.log(q.rows[0]);
    conn.end();
});

For this connection method, the code must include the full path to the root.crt certificate for PostgreSQL in the ca variable.

You can get the cluster ID with a list of clusters.

Connecting:

node app.js

ODBCODBC

Before connecting, install the following dependencies:

sudo apt update && sudo apt install --yes unixodbc odbc-postgresql

The PostgreSQL ODBC driver will be registered automatically in /etc/odbcinst.ini.

Connecting without SSL
Connecting via SSL
  1. Code example:

    /etc/odbc.ini

    [postgresql]
    Driver=PostgreSQL Unicode
    Servername=c-<cluster_ID>.rw.mdb.yandexcloud.net
    Username=<username>
    Password=<user_password>
    Database=<DB_name>
    Port=6432
    Pqopt=target_session_attrs=read-write
    
  2. Connecting:

    isql -v postgresql
    

    After connecting to the DBMS, run the SELECT version(); command.

  1. Code example:

    /etc/odbc.ini

    [postgresql]
    Driver=PostgreSQL Unicode
    Servername=c-<cluster_ID>.rw.mdb.yandexcloud.net
    Username=<username>
    Password=<user_password>
    Database=<DB_name>
    Port=6432
    Pqopt=target_session_attrs=read-write
    Sslmode=verify-full
    
  2. Connecting:

    isql -v postgresql
    

    After connecting to the DBMS, run the SELECT version(); command.

PHPPHP

Before connecting, install the following dependencies:

sudo apt update && sudo apt install --yes php php-pgsql
Connecting without SSL
Connecting via SSL
  1. Code example:

    connect.php

    <?php
      $conn = pg_connect("
          host=c-<cluster_ID>.rw.mdb.yandexcloud.net
          port=6432
          sslmode=disable
          dbname=<DB_name>
          user=<username>
          password=<user_password>
          target_session_attrs=read-write
      ");
    
    $q = pg_query($conn, "SELECT version()");
    $result = pg_fetch_row($q);
    echo $result[0];
    
    pg_close($conn);
    ?>
    
  2. Connecting:

    php connect.php
    
  1. Code example:

    connect.php

    <?php
      $conn = pg_connect("
          host=c-<cluster_ID>.rw.mdb.yandexcloud.net
          port=6432
          sslmode=verify-full
          dbname=<DB_name>
          user=<username>
          password=<user_password>
          target_session_attrs=read-write
      ");
    
    $q = pg_query($conn, "SELECT version()");
    $result = pg_fetch_row($q);
    echo $result[0];
    
    pg_close($conn);
    ?>
    
  2. Connecting:

    php connect.php
    

PowerShellPowerShell

Before connecting, install the same version of PostgreSQL for Windows that is used in the cluster. Select the Command Line Tools install only.

Connecting without SSL
Connecting via SSL
  1. Set the environment variables for the connection:

    $Env:PGSSLMODE="disable"; $Env:PGTARGETSESSIONATTRS="read-write"
    
  2. Connect to a database:

    & "C:\Program Files\PostgreSQL\<version>\bin\psql.exe" `
          --host=c-<cluster_ID>.rw.mdb.yandexcloud.net `
          --port=6432 `
          --username=<username> `
          <DB_name>
    

    After running the command, enter the user password to complete the connection process.

  3. To check the connection, run this query:

    SELECT version();
    
  1. Set the environment variables for the connection:

    $Env:PGSSLMODE="verify-full"; $Env:PGTARGETSESSIONATTRS="read-write"
    
  2. Connect to a database:

    & "C:\Program Files\PostgreSQL\<version>\bin\psql.exe" `
      --host=c-<cluster_ID>.rw.mdb.yandexcloud.net `
      --port=6432 `
      --username<username> `
      <DB_name>
    

    After running the command, enter the user password to complete the connection process.

  3. To check the connection, run this query:

    SELECT version();
    

PythonPython

Before connecting, install the following dependencies:

sudo apt update && sudo apt install -y python3 python3-pip && \
pip3 install psycopg2-binary
Connecting without SSL
Connecting via SSL
  1. Code example:

    connect.py

    import psycopg2
    
    conn = psycopg2.connect("""
        host=c-<cluster_ID>.rw.mdb.yandexcloud.net
        port=6432
        sslmode=disable
        dbname=<DB_name>
        user=<username>
        password=<user_password>
        target_session_attrs=read-write
    """)
    
    q = conn.cursor()
    q.execute('SELECT version()')
    
    print(q.fetchone())
    
    conn.close()
    
  2. Connecting:

    python3 connect.py
    
  1. Code example:

    connect.py

    import psycopg2
    
    conn = psycopg2.connect("""
        host=c-<cluster_ID>.rw.mdb.yandexcloud.net
        port=6432
        sslmode=verify-full
        dbname=<DB_name>
        user=<username>
        password=<user_password>
        target_session_attrs=read-write
    """)
    
    q = conn.cursor()
    q.execute('SELECT version()')
    
    print(q.fetchone())
    
    conn.close()
    
  2. Connecting:

    python3 connect.py
    

RR

Before connecting:

  1. Install the dependencies:

    sudo apt update && sudo apt install libpq-dev r-base --yes
    
  2. Install the RPostgres library:

    sudo R --interactive
    install.packages("RPostgres")
    quit()
    
Connecting without SSL
Connecting via SSL
  1. Code example:

    connect.r

    library(DBI)
    
    conn <- dbConnect(RPostgres::Postgres(),
        dbname="<DB_name>",
        host="c-<cluster_ID>.rw.mdb.yandexcloud.net",
        port=6432,
        user="<username>",
        password="<user_password>"
    )
    
    res <- dbSendQuery(conn, "SELECT VERSION();")
    dbFetch(res)
    dbClearResult(res)
    
    dbDisconnect(conn)
    
  2. Connecting:

    R connect.r
    
  1. Code example:

    connect.r

    library(DBI)
    
    conn <- dbConnect(RPostgres::Postgres(),
        dbname="<DB_name>",
        host="c-<cluster_ID>.rw.mdb.yandexcloud.net",
        port=6432,
        sslmode="verify-full",
        user="<username>",
        password="<user_password>"
    )
    
    res <- dbSendQuery(conn, "SELECT VERSION();")
    dbFetch(res)
    dbClearResult(res)
    
    dbDisconnect(conn)
    
  2. Connecting:

    R connect.r
    

RubyRuby

Before connecting, install the following dependencies:

sudo apt update && sudo apt install --yes ruby ruby-pg
Connecting without SSL
Connecting via SSL
  1. Code example:

    connect.rb

    require "pg"
    
    conn = PG.connect("
            host=c-<cluster_ID>.rw.mdb.yandexcloud.net
            port=6432
            dbname=<DB_name>
            user=<username>
            password=<user_password>
            target_session_attrs=read-write
            sslmode=disable
    ")
    
    q = conn.exec("SELECT version()")
    puts q.getvalue 0, 0
    
    conn.close()
    
  2. Connecting:

    ruby connect.rb
    
  1. Code example:

    connect.rb

    require "pg"
    
    conn = PG.connect("
            host=c-<cluster_ID>.rw.mdb.yandexcloud.net
            port=6432
            dbname=<DB_name>
            user=<username>
            password=<user_password>
            target_session_attrs=read-write
            sslmode=verify-full
    ")
    
    q = conn.exec("SELECT version()")
    puts q.getvalue 0, 0
    
    conn.close()
    
  2. Connecting:

    ruby connect.rb
    

If your cluster connection and test query are successful, you will see the PostgreSQL version. One exception is the userver framework example, where the SELECT 1 as ping test query will be executed for periodic PostgreSQL cluster availability checks.

Was the article helpful?

Previous
Deleting a cluster
Next
SQL queries in Yandex WebSQL
© 2025 Direct Cursus Technology L.L.C.