Add support for connecting to MySQL, PostgreSQL, or SQLite databases via an SSH tunnel, allowing secure database access for development tools, GUIs (e.g. DataGrip, TablePlus, DBeaver, Sequel Pro), and scripts — without needing to expose a public port.

Ploi already offers a temporary debug access option (up to 6 hours), but this doesn't cover all real-world scenarios. An SSH tunnel approach would complement it by addressing situations where the debug port is not reachable at all:

  • Corporate or proxy firewalls that block access on non-standard ports
  • Staging and production environments where persistent, policy-compliant access is needed
  • CI/CD pipelines or scripts that need reliable database connectivity without time-limited workarounds

The ideal implementation would let users connect using the server's existing SSH key pair, forwarding the database port locally over the secure SSH connection — the same mechanism already supported by most database clients and many internal security policies.

SSH tunnel access for MySQL, PostgreSQL and SQLite databases

2 total votes
Quick Actions
Activity
View recent activity and updates
Use arrow keys to navigate