PostgreSQL connector

The PostgreSQL connector supports all modern versions of PostgreSQL from version 9.x up.

It fully supports SSL connections from database clients if a valid certificate and private key are provided in the project.


This connector takes the following parameters:

Connection name

Can be any name you want.


If checked, then this connection will be active any time Gallium Data is running, meaning that the local port will be open and listening for requests. If you uncheck this (and then click Publish), then the connection is "commented out" -- it's as if it didn't exist, but you can still keep it around for later.


The type of database for this connection. This is selected when you create the connection and cannot be changed afterwards.

Server host

The name or address of the database server. This can be a partial name (like dbserver), a full name (like, an IP4 address (like or an IP6 address if your network supports IP6 (e.g. 266a:1790:2920:69e0:35c:d8ac:da8e:15e0).

If you are running Gallium Data as a Docker container, and the database server is on the host machine, you can use host.docker.internal (on Windows or Mac, but see here for Linux).

Local address

The address on which to listen for requests. This is typically only relevant if your server has more than one address. By default, Gallium Data will listen on all addresses (which is equivalent to

Server port

The port on the database server. For Postgres, it's usually 5432 but it can also be something else.

Local port

The port number in the Gallium Server that will be listening to requests from database clients.

Use SSL to server

whether to use SSL when connecting to the database server. There are three options:

  • never: disables SSL completely when talking to the server

  • always: always use SSL when talking to the server

  • on request: use SSL if the client uses SSL

Note that, if you want to use SSL (i.e. either always or on request), the database server's certificate must be trusted by Gallium Data, meaning that either the database server uses a certificate that is signed by a well-known certificate authority, or the certificate is installed in the Gallium Data project's trust (under Project > Properties). You can also use the Trust server certificate option (see below).

Use SSL to client

Similarly, three values are possible:

  • never: disable SSL from clients, SSL connection attempts will be rejected

  • always: always require SSL for client connections, non-SSL connections will be rejected

  • on request: accept SSL connections from clients, as well as non-SSL requests

If you use always or on request, you must install a private key, as well as any certificates going with it, in the project's key area (under Project > Properties).

Trust server certificate

Whether to accept the Postgres server's SSL certificate at face value, or not. If this is false, and SSL is required, then the Postgres server's certificate will be verified, either by being signed by a well-known certificate authority, or by verifying it with the chain of certificates provided in the project's Trust entry. If this is true, then the Postgres server's SSL certificate will be accepted without verification.

Timeout to server

This specifies the number of milliseconds to wait when establishing a connection to the database server. The default value (10 seconds) is usually adequate for most cases.



Once the required parameters are filled, and published to the server, you can press the Test button to verify that Gallium Data can talk to the specified database server. This will attempt to open a connection to the database server, thereby establishing basic network connectivity. In addition, if the Use SSL to server option is either Always or On request, Gallium Data will also attempt to establish an SSL connection to verify that certificates are properly installed. Note that no login is performed, since Gallium Data does not have any database credentials.

Delete this connection

Will delete the connection after confirmation. This is not undoable, unless you recover from a backup.

About host names and addresses

If you are running Gallium Data as a Docker container, keep in mind that IP addresses and host names need to be from the perspective of the Docker container. If, for instance, you are running a Postgres database on your local machine, and you usually connect to it using host name localhost or (or maybe ::1 if you use IP6), the same name or address will not work from the Docker container (since localhost would refer to the Docker virtual machine, not the host machine).

The host name of your machine, as seen from a Docker container running on the same machine, is usually host.docker.internal on Windows and Mac. For Linux and other operating systems, you may need to dig a little deeper.

If you are running both Gallium Data and the database server(s) in Docker, you can make connectivity easy by running them in the same Docker network, but there are many other ways to accomplish the same goal if you're running in a managed environment like Kubernetes or OpenShift.

Packet types

Postgres defines a number of packet types, described in the Packet types page.