DCDeploy provides a TCP Proxy feature to expose databases and custom TCP-based services securely.Documentation Index
Fetch the complete documentation index at: https://docs.dcdeploy.com/llms.txt
Use this file to discover all available pages before exploring further.
When SSL is enabled, all traffic between your client and the service is encrypted, ensuring data confidentiality and integrity.
Overview
- Secure database connections using SSL/TLS.
- Works with Postgres, MySQL, MongoDB, Redis, and other TCP-based services.
- Certificates are automatically issued and managed by DCDeploy.
- Supports both public TCP URLs and private network connections.
Use Cases
- Connect to databases from external clients securely.
- Enforce SSL-only connections for compliance and security.
- Protect sensitive workloads (e.g., financial, healthcare, production apps).
Enabling SSL for TCP Proxy
When exposing a database/service over TCP, enable SSL in your service configuration.- exposeTCP: true → Enables public TCP proxy.
- ssl: true → Enforces SSL for connections.
Connecting to Databases with SSL
Postgres ExampleUsing SSL Certificates
Some clients require explicit SSL certificates for validation. DCDeploy provides:- CA Certificate – to verify server identity.
- Client Certificate & Key – for mutual TLS (optional).
Troubleshooting
- SSL connection error
- Ensure sslmode=require or equivalent flag is set.
- Check if the CA certificate is loaded correctly.
- Timeouts
- Verify the service is exposed with exposeTCP: true.
- Check firewall or VPN restrictions.
- Self-signed certificate errors
- Use sslmode=verify-full with the provided CA cert.
Best Practices
- Always enable SSL for external TCP connections.
- Use private networking if clients are inside the same DCDeploy environment.
- Rotate client certificates periodically.
- Enforce mutual TLS for sensitive workloads.
