Cannot connect to a database
Step 1. Check your network settings
Databases can work locally, on a server, or in the cloud. For server and cloud databases, you need a network connection. To verify that connection is available, use ping and telnet commands.
With the ping command, you can ensure that the destination computer is reachable from the source computer. Open a command line and type the following command: ping -a <host_IP>
, where -a
is a command option that resolves addresses to hostnames (if it is possible). If you use hostnames with the ping command, a hostname is resolved to the IP address. For example, ping -a example.com
resolves to PING example.com (93.184.216.34)
.
With the telnet command, you can test connectivity to remote computers and issue commands. If you specify a port as a parameter for the telnet
command, you can test connectivity to a remote host on the given port. If the connection is successful, you see the message: Connected to <host_IP>
.
Step 2. Check your connection properties
Each database (MySQL, PostgreSQL, Oracle, or any other vendor) has its own connection settings. Most database include the connection settings:
Host: A hostname of a computer or other device that stores a database. It can be an IP address 127.0.0.1 or a domain name localhost.
Database: A name of the database to which you want to connect. You can find the database name in the settings of your database server, or you can ask your database administrator. In some cases, it is possible to run a query in a database command line to see names of all available databases. For example, in MySQL you can run
SHOW DATABASES;
.User: A name of a user that has sufficient privileges to perform actions with a database. Run a query in a database command line to see names of all available databases. For example, in MySQL you can run
SHOW GRANTS;
.Password: A password of the user.
Port: An number that identifies a connection point between hosts. Hosts use port numbers to determine to which application, service, or process a connection must be established. Different database vendors use different ports for their databases. The following list is a list of default port numbers.
Vendor Default port Amazon Redshift 5439 Apache Derby 1527 Apache Cassandra 9042 Apache Hive 10000 (Hive Server2) or 9083 (Hive Metastore) Azure SQL Database 1433 ClickHouse 8123 Couchbase Query Query Service 11210 Exasol 8563 Greenplum 5432 H2 8082 HSQLDB 9001 IBM Db2 LUW 50000 MariaDB 3306 Microsoft SQL Server 1433 (TCP), 1434 (UDP might be required) MySQL 3306 Oracle 1521 PostgreSQL 5432 Snowflake 443 SQLite None Sybase ASE 5000 Vertica 5433
Verify that the connection settings for the selected database connection are correct. For more information about creating or changing a database connection, see Database connection.
Step 3. Check the driver version
With a JDBC driver, you can interact with a database management system (DBMS) from GoLand. Each DBMS requires its own JDBC driver. Ensure that the driver version and the DBMS version are compatible with each other.
From GoLand, you can download drivers for all supported vendors. You can check the full list of supported vendors in the Drivers list. Alternatively, you can add your own driver to an existing vendor, or create a new driver entry for the vendor that is not on the Drivers list.
To open the Drivers list, in the Database tool window ( ), click the Data Source Properties icon or press Shift+Enter.
Download a driver and select the driver version
To download drivers from the JetBrains FTP server, select a vendor from the Drivers list, and click the Download ver. <version_number> link in the Driver files pane.
To change the driver version, click the ver. <version_number> link in the Driver files pane and select the driver version that you need.
Create a connection to a database with a JDBC driver
If you cannot find a name of a database vendor in the list of data sources, download a JDBC driver for the database management system (DBMS), and create a connection in GoLand. With the JDBC driver, you can connect to DBMS and start working.
In the Database tool window ( ), click the Data Source Properties icon .
In the Data Sources and Drivers dialog, click the Add icon () and select Driver and Data Source.
Click the User Driver link.
In the Driver files pane, click the Add icon () and select Custom JARs.
Navigate to the JAR file of the JDBC driver, select it, and click OK.
In the Class field, specify the value that you want to use for the driver.
Click Apply.
Return to the created data source connection.
Specify database connection details. Alternatively, paste the JDBC URL in the URL field.
To delete a password, right-click the Password field and select Set Empty.
To ensure that the connection to the data source is successful, click Test Connection.
Configure a JDBC driver from the existing connection
You can add libraries to the existing driver or replace the driver completely.
In the Database tool window ( ), click the Data Source Properties icon .
In the Data Sources and Drivers dialog, click the Drivers tab, and select a data source where you want to change a driver.
Click the Driver link in data source settings.
Click the provided driver entry, and click Remove().
To revert changes, click the Rollback Changes icon () that is in the lower-right part of the window.
In the Driver files pane, click the Add icon () and select Custom JARs.
In the file browser, navigate to the JAR file of the JDBC driver, select it, and click OK.
In the Class field, specify the value that you want to use for the driver .
Click Apply.
Step 4. Check if the connection with SSH or SSL is required
To make a connection to a database more secure, some services require SSH or SSL usage.
SSL
The following procedure describes the SSL configuration that suits most databases. For some databases, you need to use another approach for a successful connection. You can see configuration examples for Cassandra and Heroku Postgres in the DataGrip documentation.
Connect to a database with SSL
In the Database tool window ( ), click the Data Source Properties icon .
On the Data Sources tab, select a data source that you want to modify.
Click the SSH/SSL tab and select the Use SSL checkbox.
In the CA file field, navigate to the CA certificate file (for example, mssql.pem).
In the Client certificate file field, navigate to the client certificate file (for example, client-cert.pem).
In the Client key file field, navigate to the client key file (for example, client-key.pem).
From the Mode list, select the verification mode:
Require: verifies that the server accepts SSL connections for this IP address and recognizes the client certificate.
Verify CA: verifies the server by checking the certificate chain up to the root certificate that is stored on the client.
Full Verification: verifies the server host to ensure that it matches the name stored in the server certificate. The SSL connection fails if the server certificate cannot be verified.
To ensure that the connection to the data source is successful, click Test Connection.
Disable SSL connection to a database
In the Database tool window ( ), click the Data Source Properties icon .
On the Data Sources tab, select a data source that you want to modify.
Click the SSH/SSL tab and clear the Use SSL checkbox.
Click Apply.
Copy SSL settings from other data sources
If you configured SSL settings for one data source, you can copy them for another data source.
In the Database tool window ( ), click the Data Source Properties icon .
On the Data Sources tab, select a data source that you want to modify.
Click the SSH/SSL tab and select the Use SSL checkbox.
Click the Copy from link and select the configuration that you want to copy.
SSH
Secure Shell or SSH is a network protocol that is used to encrypt a connection between a client and a server.
All created SSH connections are shared between all the data sources that you have in a project. If you do not want to share a connection between projects, select the Visible only for this project checkbox in the SSH connection settings.
Connect to a database with SSH
In the Database tool window ( ), click the Data Source Properties icon .
Select a data source profile where you want to change connection settings.
Click the SSH/SSL tab and select the Use SSH tunnel checkbox.
Click the Add SSH configuration button ().
In the SSH dialog, click the Add button.
If you do not want to share the configuration between projects, select the Visible only for this project checkbox.
In Host, User name, and Port fields, specify your connection details.
From the Authentication type list, you can select an authentication method:
Password: to access the host with a password. To save the password in GoLand, select the Save password checkbox.
Key pair (OpenSSH or PuTTY): to use SSH authentication with a key pair. To apply this authentication method, you must have a private key on the client machine and a public key on the remote server. GoLand supports private keys that are generated with the OpenSSH utility.
Specify the path to the file where your private key is stored and type the passphrase (if any) in the corresponding fields. To have GoLand remember the passphrase, select the Save passphrase checkbox.
OpenSSH config and authentication agent: to use SSH keys that are managed by a credentials helper application (for example, Pageant on Windows or ssh-agent on macOS and Linux).
Disable SSH connection to a database
In the Database tool window ( ), click the Data Source Properties icon .
Select a data source profile where you want to change connection settings.
Click the SSH/SSL tab and clear the Use SSH tunnel checkbox.
Click Apply.
Create the SSH tunnel with PuTTY (Windows)
Download and run the latest version of the PuTTY SSH and Telnet client (download the client from https://www.putty.org/).
In the PuTTY Configuration dialog, navigate to .
In the Private key file for authentication field, specify the path to your private key file and click Open.
In the command line window, specify the username that you use for the SSH tunnel and press Enter. Do not close the command line window.
In the Database window (Data Source Properties icon on the toolbar.
), click theSelect a data source profile where you want to change connection settings.
Click the SSH/SSL tab and select the Use SSH tunnel checkbox.
From the Auth type list, select OpenSSH config and authentication agent.
In Proxy host, Proxy user, and Port fields, specify connection details.
To ensure that the connection to the data source is successful, click Test Connection.
Create the SSH tunnel with Pageant (Windows)
Pageant is an SSH authentication agent for PuTTY, PSCP, PSFTP, and Plink. Pageant stores your private key, and as long as it is running, it provides the unlocked private key to PuTTY or other tools like GoLand. You can find the Pageant icon in the Windows taskbar.
Download the latest version of Pageant (download the client from https://www.putty.org/).
In the Windows taskbar, right-click the Pageant icon and select Add Key.
In the Select Private Key File dialog, navigate to the private key file (the PPK file) and click Open.
(Optional) Enter the private key passphrase and press Enter.
In the Database window (Data Source Properties icon on the toolbar.
), click theSelect a data source profile where you want to change connection settings.
Click the SSH/SSL tab and select the Use SSH tunnel checkbox.
From the Auth type list, select OpenSSH config and authentication agent.
In Proxy host, Proxy user, and Port fields, specify connection details.
To ensure that the connection to the data source is successful, click Test Connection.
Create the SSH tunnel with the ssh-agent (macOS and Linux)
Run all commands for ssh-agent in the command line.
Ensure that ssh-agent is running.
ssh-agentAdd your key to the agent (in the following example, the key path is ~/.ssh/id_rsa).
ssh-add ~/.ssh/id_rsa(Optional) On macOS, you can add
-K
option to thessh-add
command to store passphrases in your keychain. On macOS Sierra and later, you need to create the config file in ~/.ssh/ with the following text:Host * UseKeychain yes AddKeysToAgent yes IdentityFile ~/.ssh/id_rsaIf you have other private keys in the .ssh directory, add an
IdentityFile
line for each key. For example, if the second key has the id_ed25519 name, addIdentityFile ~/.ssh/id_ed25519
as an additional line for the second private key.List all added keys.
ssh-add -LIn the Database window (Data Source Properties icon on the toolbar.
), click theSelect a data source profile where you want to change connection settings.
Click the SSH/SSL tab and select the Use SSH tunnel checkbox.
From the Auth type list, select OpenSSH config and authentication agent.
In Proxy host, Proxy user, and Port fields, specify connection details.
To ensure that the connection to the data source is successful, click Test Connection.
Step 5. Write to us if you still need help
Write to the GoLand team
Email our team at goland-support@jetbrains.com. Describe your problem, and attach all available materials that can speed up troubleshooting (code samples, screenshots, logs, animations, videos, and other materials).
For more information about other troubleshooting sources, see Troubleshooting materials.