Public Access via TCP Proxy

Expose your database on a dedicated public TCP port for migrations, BI tools, and SQL clients.

Last updated: May 12, 2026

Public access via TCP proxy

Databases on lowcloud Platform are private by default. When you need to connect from outside the project, for example to run a migration from your laptop, plug in a BI tool, or open a SQL client from CI, turn on External Access. lowcloud gives you a public host:port you can connect to.

Enable

Open the database service, go to Settings, and switch External Access on. lowcloud allocates an available TCP port and shows your public address:

proxy.lowcloud.co:14523

The port stays stable as long as External Access is enabled.

Connect to PostgreSQL

postgresql://myuser:<password>@proxy.lowcloud.co:14523/myapp?sslmode=require

Or with psql:

psql "host=proxy.lowcloud.co port=14523 dbname=myapp user=myuser sslmode=require"

The PostgreSQL template uses a self-signed certificate, so use sslmode=require rather than verify-full.

Connect to MariaDB

mariadb -h proxy.lowcloud.co -P 14523 -u myuser -p

Or as a URL:

mysql://myuser:<password>@proxy.lowcloud.co:14523/myapp

MariaDB 11 encrypts connections by default with a self-signed certificate. Most clients negotiate TLS automatically, so no extra flag is needed. Skip strict server certificate verification (--ssl-verify-server-cert with a CA bundle, or verify-ca / verify-identity modes in your driver).

Disable

Switch External Access off in Settings. The public address stops accepting connections; the database stays reachable from inside the project. Re-enabling later gets you a fresh port.