Quick Diagnosis
Use this decision tree to identify your issue:| Error Message | Likely Cause | Jump To |
|---|---|---|
| ”Connection refused” | Network/firewall issue | Connection refused |
| ”Authentication failed” | Credentials issue | Authentication failed |
| ”SSL required” | SSL configuration issue | SSL required |
| ”Permission denied” | Database permissions issue | Permission denied |
| ”Timeout” | Network latency issue | Timeout |
Connection Test Failures
”Connection refused”
What it means: AnomalyArmor can’t reach your database at all. What you’ll see: When you click “Test Connection” in the Add Connection form, you’ll see a red destructive toast notification with:- Title: “Error”
- Message: “Connection refused - Could not connect to database at mydb.us-east-1.rds.amazonaws.com:5432”
- Details: A list of possible causes:
- Firewall/security group blocking connection
- Incorrect hostname or port
- Database not running
- Firewall/security group blocking the connection
- Wrong hostname or port
- Database not running or not accepting connections
1. Verify hostname and port
1. Verify hostname and port
Double-check the hostname. Typos are common:
2. Check firewall/security group
2. Check firewall/security group
AnomalyArmor needs inbound access on your database port.AWS RDS/Aurora:
- Go to RDS Console → Your instance → Security Groups
- Add inbound rule:
- Type: PostgreSQL (or your DB type)
- Port: 5432 (or your port)
- Source: AnomalyArmor IPs (see Settings → Security)
- Go to SQL Console → Your instance → Connections
- Under “Authorized Networks”, add AnomalyArmor IPs
3. Verify database is running
3. Verify database is running
Can you connect from another location?
4. Check for VPC/private network issues
4. Check for VPC/private network issues
If your database is in a private subnet:
- It may not be accessible from the internet
- You may need VPC peering or PrivateLink (Enterprise)
- Contact us about private connectivity options
”Authentication failed”
What it means: AnomalyArmor reached your database but the credentials were rejected. What you’ll see: A red error notification appears with a message like: Common causes:- Wrong username or password
- User doesn’t exist
- User doesn’t have permission to connect
1. Verify credentials
1. Verify credentials
Copy-paste to avoid typos:
- Copy the username exactly as it appears in your database
- Copy the password (watch for leading/trailing spaces)
- Check for special characters that may need escaping
2. Confirm user exists
2. Confirm user exists
Connect to your database and check:
3. Reset the password
3. Reset the password
If unsure, reset the password:Then update the password in AnomalyArmor.
4. Check pg_hba.conf (PostgreSQL)
4. Check pg_hba.conf (PostgreSQL)
For self-hosted PostgreSQL, check Reload PostgreSQL after changes:
pg_hba.conf allows the connection:“SSL required” / “SSL connection error”
What it means: The database requires SSL but the connection isn’t using it (or vice versa). What you’ll see: A red error notification appears with a message like: Troubleshooting steps:1. Enable SSL in AnomalyArmor
1. Enable SSL in AnomalyArmor
Edit your connection:
- Go to Data Sources → Your connection → Settings
- Set SSL Mode to
require - Save and test
2. Try different SSL modes
2. Try different SSL modes
| Mode | Description |
|---|---|
disable | No SSL (not recommended) |
require | SSL required, no certificate verification |
verify-ca | Verify server certificate |
verify-full | Verify certificate and hostname |
require for most cloud databases.3. Check cloud provider requirements
3. Check cloud provider requirements
- AWS RDS: Requires SSL by default, use
require - Aurora: Requires SSL, use
require - Supabase: Requires SSL, use
require - Google Cloud SQL: Requires SSL, use
require - ClickHouse Cloud: Always HTTPS on port 8443
”Timeout” / “Connection timed out”
What it means: The connection attempt took too long. Common causes:- Network latency
- Firewall silently dropping packets
- Database under heavy load
1. Check network path
1. Check network path
Test connectivity from your own machine:
2. Check security groups
2. Check security groups
If the security group doesn’t have an explicit allow rule, packets may be silently dropped (causing timeout instead of refused).
3. Try during off-peak hours
3. Try during off-peak hours
If the database is under heavy load, connections may time out.
”Permission denied” / “Access denied”
What it means: Connection succeeded but the user can’t access the required data. Troubleshooting steps:1. Grant CONNECT permission
1. Grant CONNECT permission
2. Grant schema access
2. Grant schema access
3. Grant table access
3. Grant table access
4. Verify with test query
4. Verify with test query
Connect as the anomalyarmor user and run:If this fails, you need more permissions.
Discovery Failures
If connection tests pass but discovery fails:“No tables found”
Causes:- User can connect but can’t see tables
- Schema filter excluding all schemas
- Connected to wrong database
- Check schema filter settings
- Verify user has SELECT on
information_schema - Confirm database name is correct
”Discovery timeout”
Causes:- Very large database (10,000+ tables)
- Slow network
- Database under load
- Exclude unnecessary schemas
- Run during off-peak hours
- Consider using a read replica
Provider-Specific Issues
- AWS RDS
- Databricks
- ClickHouse
Common issues:
- Security group not allowing AnomalyArmor IPs
- Using private subnet without public access
- Wrong endpoint (cluster vs instance)
- Add AnomalyArmor IPs to security group
- Enable “Publicly accessible” or use VPC peering
- Use the correct endpoint for your use case
Still Stuck?
If you’ve tried everything above and still can’t connect:-
Collect diagnostic info:
- Error message (exact text)
- Database type and version
- Cloud provider (if applicable)
- Network setup (public/private subnet)
-
Contact support:
- Email: support@anomalyarmor.ai
- Include the diagnostic info above
- We can help troubleshoot complex network setups
Contact Support
Get help from our team
