Add support for connecting to MySQL, PostgreSQL, or SQLite databases via an SSH tunnel, allowing secure database access for development tools, GUIs (e.g. DataGrip, TablePlus, DBeaver, Sequel Pro), and scripts — without needing to expose a public port.
Ploi already offers a temporary debug access option (up to 6 hours), but this doesn't cover all real-world scenarios. An SSH tunnel approach would complement it by addressing situations where the debug port is not reachable at all:
- Corporate or proxy firewalls that block access on non-standard ports
- Staging and production environments where persistent, policy-compliant access is needed
- CI/CD pipelines or scripts that need reliable database connectivity without time-limited workarounds
The ideal implementation would let users connect using the server's existing SSH key pair, forwarding the database port locally over the secure SSH connection — the same mechanism already supported by most database clients and many internal security policies.
-
Dennis moved item to board Planned
2 weeks ago -
Gregory Van der Steen moved item to project Services
2 weeks ago -
Gregory Van der Steen created the item
2 weeks ago