Allow disabling TCP Proxy on PostgreSQL HA clusters for enhanced security
bogdoslavik
PROOP

a month ago

Description:

Currently, the TCP proxy on PostgreSQL HA (HAProxy) service cannot be disabled and automatically re-establishes on every deployment. This prevents users from restricting database access to internal networks only.

Why this matters:

  • Security best practice: databases should not be publicly accessible unless explicitly required
  • Many users deploy databases in the same project as their applications and have no need for public access
  • The inability to disable public networking increases the attack surface

Requested feature: Add an option to permanently disable the TCP proxy on HA clusters, allowing databases to be accessible only via private network (.railway.internal).

Current workaround: Users must rely solely on authentication credentials to protect publicly exposed databases, which is less secure than network isolation.

Under Review

0 Threads mention this feature

0 Replies

Welcome!

Sign in to your Railway account to join the conversation.

Loading...