When SSL is enabled, all traffic between your client and the service is encrypted, ensuring data confidentiality and integrity.
Overview
- Secure database connections using SSL/TLS.
- Works with Postgres, MySQL, MongoDB, Redis, and other TCP-based services.
- Certificates are automatically issued and managed by DCDeploy.
- Supports both public TCP URLs and private network connections.
Use Cases
- Connect to databases from external clients securely.
- Enforce SSL-only connections for compliance and security.
- Protect sensitive workloads (e.g., financial, healthcare, production apps).
Enabling SSL for TCP Proxy
When exposing a database/service over TCP, enable SSL in your service configuration.- exposeTCP: true → Enables public TCP proxy.
- ssl: true → Enforces SSL for connections.
Connecting to Databases with SSL
Postgres ExampleUsing SSL Certificates
Some clients require explicit SSL certificates for validation. DCDeploy provides:- CA Certificate – to verify server identity.
- Client Certificate & Key – for mutual TLS (optional).
Troubleshooting
- SSL connection error
- Ensure sslmode=require or equivalent flag is set.
- Check if the CA certificate is loaded correctly.
- Timeouts
- Verify the service is exposed with exposeTCP: true.
- Check firewall or VPN restrictions.
- Self-signed certificate errors
- Use sslmode=verify-full with the provided CA cert.
Best Practices
- Always enable SSL for external TCP connections.
- Use private networking if clients are inside the same DCDeploy environment.
- Rotate client certificates periodically.
- Enforce mutual TLS for sensitive workloads.
