Concepts
Initial Setup
Peformance & Benchmark
Troubleshooting
FAQs
Glossary
This section describes how applications connect to database clusters in a FPT Database Engine environment, including endpoints, access models, and network security controls.
A database endpoint is an access point provided for applications to connect to the database cluster. Depending on the deployment model, the endpoint may point to:
Using endpoints decouples application logic from database cluster architecture and minimizes the impact of topology changes or failover events.
The FPT Database Engine supports two access models:
Choosing an access model should consider security, performance, and application architecture requirements.
In a DBaaS environment, Security Groups and Floating IPs are used to control and manage network access to database clusters in a flexible and secure manner.
A Security Group is a set of stateful firewall rules that allow or deny inbound and outbound traffic to a database instance based on:
Security Groups enforce the least privilege principle, allowing database cluster access only from authorized sources such as:
Changes to Security Group rules take effect immediately and do not require database cluster restarts.
A Floating IP is a public IP address that can be dynamically associated or disassociated with a database instance, enabling Internet access when required. Floating IPs are commonly used for:
When a Floating IP is enabled, users must combine it with Security Group to: