Glossary
Concepts
Initial Setup
Peformance & Benchmark
Troubleshooting
FAQs
This guide explains how to connect to a database deployed on FPT Database Engine using supported connection methods and best practices.
After provisioning a database on FPT Database Engine, users can connect to it using standard database clients, application drivers, or management tools. Connectivity depends on network configuration, access control, and database credentials.
Before connecting to a database instance, you must configure appropriate network access and security policies to allow connections from your client. This usually involves creating security group rules and assigning a floating IP (public IP) if you need external access. Once network access is permitted, you can connect to your database using a database client tool.
A Security Group is a collection of firewall rules that control inbound and outbound network traffic to and from a database cluster. Each rule defines the allowed ports, protocols, and IP addresses or CIDR ranges.
Properly configuring Security Groups helps secure database connectivity, enforce the least privilege access model and reduce the risk of unauthorized access.
To ensure security and ease of management, create and configure a Security Group for the database cluster by following these steps:
Log in to the FPT Cloud Portal. After logging successfully, from the main menu, select Network > Security Groups. The Security Group Management interface will display the list of existing security groups, along with options to create, edit, or delete a security group.
On the Security Group Management page, click Create security group. The Create New Security Group screen will appear as follows:

Enter configuration details:
Name: Enter a Security Group name for easier management. The name can be up to 50 characters and may contain letters, numbers, and hyphens (-). A default name can be automatically generated by the system.
Applied Instances (optional): Select the database instance to which the Security Group will be applied.
Add tag (Optional): Assign tags (key-value pairs) to the Security Group for resource classification, cost management, operations, and auditing.
Configure security rule (optional): Configure security rules to control inbound and outbound network traffic for the database cluster.
After entering all required information, select Create security group to complete the creation process.
After successful creation, the new security group will appear in the management list, displaying information such as name, applied nodes, and creation time.
If needed, you can perform the following actions on the created security group:
Rename security group: This function allows you to modify the name of the security group. To use it, on the Security Group Management page, select Rename next to the security group you want to modify. Make the changes and click Rename to save.
Delete security group: This function allows you to remove unused security groups, keeping the management system clean and accurate. On the Security Group Management page, select Delete next to the group you want to remove. Confirm the action in the warning dialog to complete the deletion. Warning: Deleting a Security Group may disrupt network connectivity for database instances or database clusters associated with it. Once deleted, all related security rules are removed immediately, which may prevent applications from accessing the database or cause loss of connectivity between internal services. Ensure that the Security Group is not associated with any resources before proceeding with deletion.
To enable external (public) access to your database cluster or instance, you must create and assign a Floating IP to the database. A Floating IP is a static public IPv4 address that can be associated with your DBaaS resource without changing other network settings. Assigning it requires that your security group / firewall rules permit the appropriate traffic (ports, protocols) to your database.
Best Practice: Assign a Floating IP only when public access is required. If the database serves internal traffic within a VPC, consider using private static IPs to avoid exposing the service externally.
The steps to assign a Floating IP address are as follows:
Log in to the FPT Cloud Portal. After logging successfully, from the main menu, select Network > Floating IPs. The Floating IP Management interface will display the list of existing Floating IPs, along with options to create, or delete a floating IP.
On the Floating IP Management page, click Allocate IP address. The Allocate IP address popup will appear as follows:

Allocation configurations:
After completing the configuration, click Allocate floating IP to start the allocation process. The new Floating IP appears in the list with “Active” status and is associated with the selected database instance or cluster. You can use this Floating IP to connect to the database externally, provided that the configured security rules and firewall policies allow the traffic.
Release Floating IP:
When the Floating IP is no longer required, select Release IP for the corresponding address and confirm the action in the warning dialog.
Notes & Troubleshooting:
After network access is granted (via security group and floating IP), you can connect using your preferred database client (e.g., pgAdmin for PostgreSQL, MySQL Workbench for MySQL).
Database connection details are displayed on the Database Overview page in the FPT Cloud Portal. To access this page, open the Database list page, then select the database cluster ID to view the details page:

Use the following information to connect to the database:
You can connect to the database using one of the following methods:
Once the connection is successful, you will see the database structure and can execute queries directly from the client.
Note: Ensure that security groups, firewall rules, and network policies allow access to the database endpoint and port.