Database Endpoints let you expose a Database to the public internet.
Creating a Database Endpoint
A Database Endpoint can be created in the following ways:
aptible endpoints:database:create
commandLike App Endpoints, Database Endpoints support IP Filtering to restrict connections to your Database to a set of pre-approved IP addresses.
Configuring IP Filtering
IP Filtering can be configured in the following ways:
To ensure that you connect to the Database you intend to, you should ensure that your client performs full verification of the server certificate. Doing so will prevent Man-in-the-middle attacks of various types, such as address hijacking or DNS poisoning. You should consult the documentation for your client library to understand how to ensure it is properly configured to validate the certificate chain and the hostname.
For MySQL and PostgreSQL, you will need to retrieve a CA certificate using the aptible environment:ca_cert
command in order to perform validation. After the Endpoint has been provisioned, the Database will also need to be restarted in order to update the Database’s certificate to include the Endpoint’s hostname. See the Database Encryption in Transit page for more details.
If the remote service is not able to validate your database certificate, please contact support for assistance.
Create Database Users with the least privileges needed to use for integrations. For example, granting only “read” privileges to specific tables, such as those that do not contain your user’s hashed passwords, is recommended when integrating a business intelligence reporting tool.
Please refer to database-specific documentation for guidance on user and permission management.
Database Endpoints let you expose a Database to the public internet.
Creating a Database Endpoint
A Database Endpoint can be created in the following ways:
aptible endpoints:database:create
commandLike App Endpoints, Database Endpoints support IP Filtering to restrict connections to your Database to a set of pre-approved IP addresses.
Configuring IP Filtering
IP Filtering can be configured in the following ways:
To ensure that you connect to the Database you intend to, you should ensure that your client performs full verification of the server certificate. Doing so will prevent Man-in-the-middle attacks of various types, such as address hijacking or DNS poisoning. You should consult the documentation for your client library to understand how to ensure it is properly configured to validate the certificate chain and the hostname.
For MySQL and PostgreSQL, you will need to retrieve a CA certificate using the aptible environment:ca_cert
command in order to perform validation. After the Endpoint has been provisioned, the Database will also need to be restarted in order to update the Database’s certificate to include the Endpoint’s hostname. See the Database Encryption in Transit page for more details.
If the remote service is not able to validate your database certificate, please contact support for assistance.
Create Database Users with the least privileges needed to use for integrations. For example, granting only “read” privileges to specific tables, such as those that do not contain your user’s hashed passwords, is recommended when integrating a business intelligence reporting tool.
Please refer to database-specific documentation for guidance on user and permission management.