Picture this: your data team is trying to connect Metabase to a Postgres instance tucked behind a private VPC. The connection keeps timing out, someone suggests using SSH tunnels, and suddenly you’re juggling keys, ports, and security rules like it’s a circus act. That’s when Metabase TCP Proxies step in to stop the madness.
Metabase itself is a clean open-source analytics tool. It turns raw SQL into dashboards and charts your execs can understand. But when your databases live behind strict firewalls or cloud boundaries, Metabase needs a secure path in. TCP Proxies solve that problem by acting as controlled bridge points. They forward traffic, authenticate requests, and let teams run queries without exposing credentials or opening unsafe ports.
A Metabase TCP Proxy sits between Metabase and your data source. Think of it as a gatekeeper that checks identity and policy before passing packets downstream. Instead of granting wide network access, you configure a target connection that maps back to trusted endpoints. Teams often pair this with AWS IAM or OIDC-based identity systems like Okta. That way, when Metabase sends traffic, the proxy can confirm that the request came from an approved user, not a rogue script.
When configured correctly, the proxy improves both speed and security. Queries travel over an encrypted channel, avoiding messy VPN setups. Role-based rules define who can reach each database. Rotation policies manage secrets automatically. Troubleshooting gets simpler too—you can trace query requests through proxy logs and tie each one back to a verified identity.
Quick answer: How do I connect Metabase through a TCP Proxy?
Deploy the proxy inside the same network as your data source, point Metabase’s database configuration to that proxy endpoint, and enforce identity using an IAM or OIDC provider. The proxy handles transport and authentication so Metabase only sees approved targets.