You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: installation/database-setup/private-endpoints.mdx
+11-11Lines changed: 11 additions & 11 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,7 +4,7 @@ title: "Private Endpoints"
4
4
5
5
## PowerSync Cloud: AWS Private Endpoints
6
6
7
-
To avoid exposing a database in AWS to the public internet, AWS Private Endpoints (AWS PrivateLink) is an option that provides private networking between the source database and the PowerSync service. Private Endpoints are currently available on our Team and Enterprise plans.
7
+
To avoid exposing a database in AWS to the public internet, AWS Private Endpoints ([AWS PrivateLink](https://aws.amazon.com/privatelink/)) is an option that provides private networking between the source database and the PowerSync Service. Private Endpoints are currently available on our [Team and Enterprise plans](https://www.powersync.com/pricing).
8
8
9
9
10
10
<Warning>
@@ -14,8 +14,8 @@ Do not rely on Private Endpoints as the only form of security. Always use strong
14
14
## Current Limitations
15
15
16
16
1. Private Endpoints are only supported for Postgres instances currently. [Contact us](/resources/contact-us) if you need this for MongoDB or MySQL.
17
-
2. The guide below does not handle dynamic IPs if the RDS instance's IP changes. This needs additional work to automatically update the IP - see this [AWS Blog Post](https://aws.amazon.com/blogs/database/access-amazon-rds-across-vpcs-using-aws-privatelink-and-network-load-balancer/) on the topic. This is specifically relevant if using a RDS cluster with failover support.
18
-
3. Self-service is not yet available on the PowerSync side - contact support to configure the instance.
17
+
2. The guide below does not handle dynamic IPs if the RDS instance's IP changes. This needs additional work to automatically update the IP - see this [AWS blog post](https://aws.amazon.com/blogs/database/access-amazon-rds-across-vpcs-using-aws-privatelink-and-network-load-balancer/) on the topic. This is specifically relevant if using a RDS cluster with failover support.
18
+
3. Self-service is not yet available on the PowerSync side - contact PowerSync support to configure the instance.
19
19
4. Only AWS is supported currently, other cloud providers are not supported yet.
20
20
21
21
## Endpoint Service Setup
@@ -24,7 +24,7 @@ To configure a Private Endpoint Service, a network load balancer is required to
24
24
1. Create a Target Group for the Network Load Balancer:
25
25
1. Obtain the RDS Instance's private IP address. Make sure this points to a writable instance.
26
26
2. Create a Target Group with IP addresses as target type, using the IP address from above. Use TCP protocol, and specify the database port (typically 5432 for Postgres).
27
-
3. Note: The IP address of your RDS instance may change over time. To maintain a consistent connection, consider implementing automation to monitor and update the target group's IP address as needed. See the [AWS Blog Post](https://aws.amazon.com/blogs/database/access-amazon-rds-across-vpcs-using-aws-privatelink-and-network-load-balancer/) on the topic.
27
+
3. Note: The IP address of your RDS instance may change over time. To maintain a consistent connection, consider implementing automation to monitor and update the target group's IP address as needed. See the [AWS blog post](https://aws.amazon.com/blogs/database/access-amazon-rds-across-vpcs-using-aws-privatelink-and-network-load-balancer/) on the topic.
28
28
2. Create a Network Load Balancer (NLB):
29
29
1. Select the same VPC as your RDS instance.
30
30
2. Choose at least two subnets in different availability zones.
@@ -33,7 +33,7 @@ To configure a Private Endpoint Service, a network load balancer is required to
33
33
3. Modify the security group associated with your RDS instance to permit traffic from the load balancer.
34
34
4. Create a VPC Endpoint Service:
35
35
1. In the AWS Management Console, navigate to the VPC service and select Endpoint Services.
36
-
2. Click on Create Endpoint Service.
36
+
2. Click on "Create Endpoint Service".
37
37
3. Select the Network Load Balancer created in the previous step.
38
38
4. If the load balancer is in one of the PowerSync regions (see below), it is not required to select any "Supported Region". If the load balancer is in a different region, select the region corresponding to your PowerSync instance here. Note that this will incur additional AWS charges.
39
39
5. Decide whether to require acceptance for endpoint connections. Disabling acceptance can simplify the process but may reduce control over connections.
@@ -45,14 +45,14 @@ To configure a Private Endpoint Service, a network load balancer is required to
45
45
46
46
On PowerSync, create a new instance, but do not configure the connection yet.
47
47
48
-
[Contact us](/resources/contact-us) and provide the Service Name from above, as well as the PowerSync instance id created above. We will then configure the instance to use the Endpoint Service for the database connection.
48
+
[Contact us](/resources/contact-us) and provide the Service Name from above, as well as the PowerSync instance ID created above. We will then configure the instance to use the Endpoint Service for the database connection.
49
49
50
50
## AWS Regions
51
51
52
52
PowerSync currently runs in the AWS regions below. Make sure the region matching your PowerSync instance is supported in by the Endpoint Service.
@@ -337,7 +337,7 @@ The following Compose file serves as a universal starting point for deploying th
337
337
338
338
<AccordionGroup>
339
339
340
-
<Accordion title="Step 1: Add PowerSync service to project resources" defaultOpen={false}>
340
+
<Accordion title="Step 1: Add PowerSync Service to project resources" defaultOpen={false}>
341
341
Add the PowerSync Service resource to your project by either scrolling through the `Services` section or by searching for `powersync` in the search bar.
Copy file name to clipboardExpand all lines: resources/faq.mdx
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -38,7 +38,7 @@ mode: wide
38
38
</Accordion>
39
39
40
40
<Accordiontitle="I don’t have direct database access, and can only access data via an API. Can I use PowerSync for this?">
41
-
**Right now, we don’t have support for replicating data via APIs.** A workaround would be to have custom code to replicate the data from the API to a PostgreSQL instance, then sync that with PowerSync.We may add a way in the future to replicate the data directly from an API to the PowerSync service, without a database in between.
41
+
**Right now, we don’t have support for replicating data via APIs.** A workaround would be to have custom code to replicate the data from the API to a PostgreSQL instance, then sync that with PowerSync.We may add a way in the future to replicate the data directly from an API to the PowerSync Service, without a database in between.
Copy file name to clipboardExpand all lines: resources/security.mdx
+6Lines changed: 6 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -12,6 +12,12 @@ At PowerSync, we take security very seriously and everything we do is designed t
12
12
* Additionally, customers on our [Enterprise plan](https://www.powersync.com/pricing) can request their data to be housed in managed, isolated tenants.
13
13
* SOC 2 Type 2 audit results are available to customers on our [Enterprise plan](https://www.powersync.com/pricing). On our most recent annual SOC 2 audit, we had zero exceptions.
14
14
15
+
16
+
### PowerSync Cloud: AWS Private Endpoints
17
+
18
+
See [Private Endpoints](/installation/database-setup/private-endpoints) for using a private network to your database using AWS PrivateLink.
19
+
20
+
15
21
### Client-Side Security
16
22
17
23
Refer to: [Data Encryption](/usage/use-case-examples/data-encryption)
Copy file name to clipboardExpand all lines: self-hosting/local-development.mdx
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -135,7 +135,7 @@ For some additional details on this file, see [PowerSync Service Setup](/self-ho
135
135
136
136
Next, the `client_auth` sections needs to be completed.
137
137
138
-
The PowerSync service can verify JWTs from client applications using either HMAC (HS\*) or RSA (RS\*) based algorithms. It can also obtain the necessary settings from Supabase automatically if you are using it.
138
+
The PowerSync Service can verify JWTs from client applications using either HMAC (HS\*) or RSA (RS\*) based algorithms. It can also obtain the necessary settings from Supabase automatically if you are using it.
139
139
140
140
1. In the case of Supabase, simply set the `supabase` key to `true`
141
141
2. In the case of HS\* algorithms, specify the secret as base64 encoded in the `k`field.
0 commit comments