Public Access via TCP Proxy
Last updated: May 12, 2026
Public access via TCP proxy
Databases on lowcloud Platform are private by default. When you need to connect from outside the project, for example to run a migration from your laptop, plug in a BI tool, or open a SQL client from CI, turn on External Access. lowcloud gives you a public host:port you can connect to.
Enable
Open the database service, go to Settings, and switch External Access on. lowcloud allocates an available TCP port and shows your public address:
proxy.lowcloud.co:14523
The port stays stable as long as External Access is enabled.
Connect to PostgreSQL
postgresql://myuser:<password>@proxy.lowcloud.co:14523/myapp?sslmode=require
Or with psql:
psql "host=proxy.lowcloud.co port=14523 dbname=myapp user=myuser sslmode=require"
The PostgreSQL template uses a self-signed certificate, so use sslmode=require rather than verify-full.
Connect to MariaDB
mariadb -h proxy.lowcloud.co -P 14523 -u myuser -p
Or as a URL:
mysql://myuser:<password>@proxy.lowcloud.co:14523/myapp
MariaDB 11 encrypts connections by default with a self-signed certificate. Most clients negotiate TLS automatically, so no extra flag is needed. Skip strict server certificate verification (--ssl-verify-server-cert with a CA bundle, or verify-ca / verify-identity modes in your driver).
Disable
Switch External Access off in Settings. The public address stops accepting connections; the database stays reachable from inside the project. Re-enabling later gets you a fresh port.