KaelioDocs

Network proxy

Route database connections through SSH tunnels or Tailscale VPN for secure access to private networks.

Some databases sit behind firewalls or inside private networks that Kaelio cannot reach directly. The Network Proxy section on a connection form lets you route traffic through an intermediary so Kaelio can connect securely.

Two proxy types are supported:

Proxy typeUse case
SSH TunnelAccess databases via a bastion/jump host using SSH
TailscaleAccess databases on a Tailscale tailnet using an auth key

Configuring a proxy

The Network Proxy section appears at the bottom of every connection form that supports it (PostgreSQL, MySQL, SQL Server, Snowflake, Metabase).

Select a Proxy Type from the dropdown.

Fill in the proxy-specific fields described below.

Click Test Proxy to verify connectivity before saving the connection. A successful test shows the proxy exit IP and location.

SSH Tunnel

Route traffic through an SSH bastion host. Kaelio opens an SSH connection and forwards database traffic through it.

FieldDescription
SSH HostHostname or IP of the bastion server
SSH PortSSH port (default: 22)
SSH UsernameUser to authenticate as on the bastion
Auth MethodPassword or Private Key
SSH PasswordPassword for password authentication
Private KeyPEM-encoded private key for key authentication
PassphrasePassphrase for encrypted private keys (optional)

Tailscale

Route traffic through a Tailscale tailnet. Kaelio joins your tailnet as an ephemeral node and connects to the target database through the Tailscale network.

FieldDescription
Auth KeyTailscale auth key (tskey-auth-...). Generate one from Tailscale Keys settings with Reusable and Ephemeral enabled.
HostnameOptional node name for the ephemeral Kaelio node in your tailnet (default: kaelio-proxy)
Exit NodeTailscale IP of an exit node in your tailnet (e.g. 100.x.y.z). When set, all traffic is routed through that node. Leave empty for direct routing.

The Exit Node field is useful when the database is only reachable from a specific machine in your tailnet, or when you want traffic to egress from a particular location. The exit node must already be advertised and approved in your Tailscale admin console.

Testing the proxy

Click Test Proxy to verify that the proxy can establish a connection. On success, the test displays the proxy's exit IP address and location so you can confirm traffic is routing through the expected path.

On this page