This section describes how applications connect to databases in a DBaaS environment, including endpoints, access models, and network security controls.
A Database Endpoint is an access point provided for applications to connect to the database. Depending on the deployment model, the endpoint may point to:
Using endpoints decouples application logic from database architecture and minimizes the impact of topology changes or failover events.
The FPT Database Engine supports two access models:
Choosing an access model should consider security, performance, and application architecture requirements.
In a DBaaS environment, Security Groups and Floating IPs are used to control and manage network access to databases in a flexible and secure manner.
A Security Group is a set of stateful firewall rules that allow or deny inbound and outbound traffic to a database instance based on:
Security Groups enforce the least privilege principle, allowing database access only from authorized sources such as:
Changes to Security Group rules take effect immediately and do not require database restarts.
A Floating IP is a public IP address that can be dynamically associated or disassociated with a database instance, enabling Internet access when required. Floating IPs are commonly used for:
When a Floating IP is enabled, users must combine it with Security Groups to: