Aurva

Aurva Database Proxy

Deploy the Aurva Database Proxy for inline query enforcement.

Overview

The Aurva Database Proxy is a secure intermediary that sits between database clients and the database engine itself. It enforces user-defined Guardrail policies — blocking risky queries or masking sensitive results — before they reach the database. By inspecting traffic in the data path, it adds a real-time enforcement layer that complements Aurva's monitoring agents.

This document covers the architecture and infrastructure requirements for deploying the Aurva Database Proxy inside a customer network.

High Level Architecture

Database Proxy high level architecture

Assumptions

This deployment guide assumes:

  1. Human users access the target database through a bastion host, either from inside or outside the VPC/VNet. After the proxy is deployed, the bastion host connects to the proxy rather than to the database directly, inserting the enforcement layer in between.
  2. The Aurva Data Plane controller (the DAM component) is already deployed in the same network. See Data Plane installation guides.

Infrastructure Prerequisites

The customer must provision the following infrastructure before deploying the proxy:

ComponentRequirement
Number of nodesMinimum 2 (for high availability)
Architecturex86_64 or aarch64
Supported OSUbuntu 22/24/25, RHEL 8/9/10
Compute2 vCPU, 2 GB RAM (minimum)
Storage30 GB free disk

Networking Prerequisites

SourceDestinationPortPurpose
Aurva Proxy VMTarget databasesDatabase native ports (e.g. 5432 for PostgreSQL)Proxy executes queries against the backing database
Bastion hostAurva Proxy8085Client → proxy connection
Aurva ProxyAurva Data Plane8085Relay executed queries to the Control Plane for observability

Deployment Steps

Step 1 — Download the proxy installer

Run the following commands on the deployment server (or any machine that can reach the proxy nodes):

# Create the install directory
mkdir -p /opt/aurva-dataplane
cd /opt/aurva-dataplane

# Download the bundle
curl -O https://resources.deployment.aurva.io/manifests/main/install-dbproxy-standalone-server.tar.gz

# Extract
tar -xzvf install-dbproxy-standalone-server.tar.gz

Step 2 — Configure environment variables

Open the variables file from the extracted bundle and provide:

VariableDescription
CONTROLLER_URLAurva Data Plane controller URL with port 8085
COMPANY_IDYour Aurva tenant identifier
TARGET_DB_HOSTHostname of the database the proxy fronts
TARGET_DB_PORTPort the database listens on
PROXY_PORTPort clients should connect to instead of the database

Step 3 — Run the installer

Execute the bundled main.sh on each proxy node to register it with the Data Plane and start the proxy service.

chmod +x main.sh
sudo bash main.sh

The installer registers the node, downloads the proxy binary, and creates a systemd service named aurva-dbproxy.service.

Step 4 — Update client connection strings

Once the proxy is running, repoint the bastion host (or any client application) to connect to the proxy host and PROXY_PORT instead of the database directly. The proxy presents the same wire protocol as the underlying database, so no client driver changes are required.

Verification

systemctl status aurva-dbproxy.service
journalctl -u aurva-dbproxy.service -f

You should see successful initialization, a heartbeat to the controller, and (after the first client connection) live query logs.

After verification, enable Prevention mode for the corresponding asset under Monitoring Configuration → Enabling Prevention Mode so Guardrail policies authored in Creating a Custom Policy are enforced through the proxy.