Skip to main content
Skip table of contents

Network and connectivity requirements for PostgreSQL environments

Overview

This topic covers the general network and connectivity requirements for the Delphix Engine, including connection requirements, port allocation, and firewall and Intrusion Detection System (IDS) considerations. For platform-specific network and connectivity requirements, see the relevant topics under the Requirements section for each platform.

General outbound from the Delphix engine port allocation

Protocol

Port Numbers

Use

TCP

25

Connection to a local SMTP server for sending email

TCP/UDP

53

Connections to local DNS servers

UDP

123

Connection to an NTP server

UDP

162

Sending SNMP TRAP messages to an SNMP Manager

TCP

443

HTTPS connections from the Delphix Engine to the Delphix Support upload server

TCP/UDP

636

Secure connections to an LDAP server

TCP

8415

Connections to a Delphix replication target. See Configuring Replication

TCP

50001

Connections to source and target environments for network performance tests.

General inbound to the Delphix Engine port allocation

Protocol

Port Numbers

Use

TCP

22

SSH connections to the Delphix Engine

TCP

80

HTTP connections to the Delphix GUI

UDP

161

Messages from an SNMP Manager to the Delphix Engine

TCP

443

HTTPS connections to the Delphix Management Application

TCP

8415

Delphix Session Protocol connections from all DSP-based network services including Replication, SnapSync for Oracle, V2P, and the Delphix Connector.

TCP

50001

Connections from source and target environments for network performance tests via the Delphix CLI. See Network Performance Tool

Firewalls and Intrusion Detection Systems (IDS)

Production databases on source environments (for dSources) are often separated from the non-production environment by firewalls. Firewalls can add milliseconds to the latency between servers. Accordingly, for best performance, there should be no firewalls between the Delphix Engine and the virtual database (VDB) target environments. If the Delphix Engine is separated from a source environment by a firewall, the firewall must be configured to permit network connections between the Delphix Engine and the source environments for the application protocols (ports) listed above.

Intrusion detection systems (IDSs) should also be made permissive to the Delphix Engine deployment. IDSs should be made aware of the anticipated high volumes of data transfer between dSources and the Delphix Engine.

SSHD Configuration

Target Unix environments are required to have sshd running and configured such that the Delphix Engine can connect over ssh.

The Delphix platform expects to maintain long-running, highly performant ssh connections with remote Unix environments.

Network and connectivity requirements for PostgreSQL

  • IP connections must exist between the Delphix Engine and the target environments.

  • The Delphix Engine uses an SSH connection to each target environment, NFS connections from each target environment to the Delphix Engine, and PostgreSQL client connections to the virtual databases on the target environment.

  • Once connected to a staging target environment through SSH, the Delphix Engine initiates a PostgreSQL replication client connection from the target environment to the source environment.

Port allocation for PostgreSQL environments

The following diagram describes the port allocations for PostgreSQL environments. It illustrates the ports that we recommend to be open from Delphix to remote services, to the Delphix Engine, and to the Target Environments. 

Outbound from the Delphix Engine port allocation

Protocol

Port Numbers

Use

TCP

22

SSH connections to the target database environment

TCP

xxx

PostgreSQL client connections to the PostgreSQL instances on the target environments (port 5432 by default) 

Inbound to the Delphix Engine port allocation

Protocol

Port Number

Use

TCP/UDP

111

Remote Procedure Call (RPC) port mapper used for NFSv3 mounts

TCP

1110

Network Status Monitor (NSM) client from target hosts to the Delphix Engine

TCP

2049

NFS client from target hosts to the Delphix Engine (NFSv3 and NFSv4)

TCP

54043

Client mount daemon (NFSv3 only)

TCP

54044

Lock state notification service (NFSv3 only)

TCP

54045

Network Lock Manager (NLM) client from target hosts to Delphix Engine (NFSv3 only)

UDP

33434 - 33464

Traceroute from the target database server to the Delphix Engine (optional)

Port allocation between source and staging target environments

Outgoing

Incoming

Protocol

Port Number

Use

Target Environment

Source Environment

PostgreSQL replication client

xxx

PostgreSQL replication client connection to the PostgreSQL instances on the source environment (port 5432 by default)

JavaScript errors detected

Please note, these errors can depend on your browser setup.

If this problem persists, please contact our support.