All posts

Air-Gapped Postgres Binary Protocol Proxy

The server was locked in a bunker. No internet. No cloud relay. No way in—except through an air-gapped Postgres binary protocol proxy. Air-gapped environments are designed to be silent. No direct network route to the outside world. For most databases, that means impossible queries, blocked analysis, and weeks of manual sync work. But the Postgres binary protocol allows a path—if you can proxy it without breaking the gap, without leaking data, and without slowing things to a crawl. An air-gappe

Free White Paper

Database Proxy (ProxySQL, PgBouncer) + GCP Binary Authorization: The Complete Guide

Architecture patterns, implementation strategies, and security best practices. Delivered to your inbox.

Free. No spam. Unsubscribe anytime.

The server was locked in a bunker. No internet. No cloud relay. No way in—except through an air-gapped Postgres binary protocol proxy.

Air-gapped environments are designed to be silent. No direct network route to the outside world. For most databases, that means impossible queries, blocked analysis, and weeks of manual sync work. But the Postgres binary protocol allows a path—if you can proxy it without breaking the gap, without leaking data, and without slowing things to a crawl.

An air-gapped Postgres binary protocol proxy speaks in the database’s native tongue. No translation to HTTP. No dumping or exporting tables to plain files. It streams over raw wire protocol, authenticates like Postgres itself, and relays only what’s needed. When built right, it passes queries to the source system as if the two nodes were in the same rack, even if one of them is offline from the public internet forever.

Continue reading? Get the full guide.

Database Proxy (ProxySQL, PgBouncer) + GCP Binary Authorization: Architecture Patterns & Best Practices

Free. No spam. Unsubscribe anytime.

The main challenges are speed, state mapping, and strict isolation. Standard SSH tunnels won’t cut it—they leak the abstraction. You need a purpose-built binary protocol bridge that understands prepared statements, portal binding, protocol version negotiation, and TLS requirements. On the far end of the air gap, a capturing agent queues request packets in a secure buffer. On the outside, a dispatcher delivers responses through a narrow, audited channel. Every byte is shaped around protocol-level consistency, which makes client drivers happy and keeps the database safe.

Air-gapped database proxying also changes how you think about monitoring and debugging. You can’t attach a remote psql client on the fly. Logs need to be replayable. Metrics need secure extraction. The proxy needs deep visibility into message types—Parse, Bind, Describe, Execute, Sync—and must fail safe on error. Handling Postgres extensions, custom OIDs, and non-standard encodings requires a full implementation of the binary protocol, not a stripped-down subset.

Done right, this approach makes air-gapped Postgres servers fully queryable from a controlled environment without lifting security restrictions. No table dumps crossing the gap. No hidden channels. Just native queries, answer packets, and strict policy governance. It’s a permanent solution to a problem most teams assume is unsolvable.

You can watch this in action and see an air-gapped Postgres binary protocol proxy live in minutes at hoop.dev. It’s the fastest way to prove this works in the real world—without touching production, without breaking the air gap, and without waiting weeks for the next manual sync.

Get started

See hoop.dev in action

One gateway for every database, container, and AI agent. Deploy in minutes.

Get a demoMore posts