Skip to content
GitHubLinkedIn

TCP proxy

This page lists the DNS endpoints we use for databases on the LEF private network.

This is currently used for database connectivity (*.db.lef). It can be extended to proxy other TCP services if/when needed.

These hostnames typically point at np-proxy (HAProxy) on proxy.core.lef, which routes TCP traffic to the correct backend.

  • SQL Server: tcp://<database>.db.lef:1433
  • PostgreSQL (if applicable): tcp://<database>.db.lef:5432
HostnamePortBackendNotes
pivot.db.lef1433coragem.core.lef:6010Pivot environment
pivoted.db.lef1433coragem.core.lef:8010Pivoted environment
trainee.db.lef1433lab.core.lef:7010Trainee environment
concepts.db.lef1433lab.core.lef:9010Concepts environment
sicoob.db.lef1433lab.core.lef:12010Sicoob environment
solutions.db.lef1433alma.core.lef:5010Solutions environment
unimed.db.lef1433alma.core.lef:10010Unimed environment
sapore.db.lef1433alma.core.lef:11010Sapore environment
tokio.db.lef1433tokio.core.lef:4010Tokio environment
tokio-prod.db.lef1433See EVEO DBaaSEVEO DBaaS (managed SQL)
HostnamePortBackendNotes
tools.db.lef5432alma.core.lef:5432Tooling database
  • Prefer *.db.lef hostnames over hardcoded IPs in configs and connection strings.
  • Don’t store database passwords in Git; use Vault or the approved secret manager.
  • If a DB endpoint is down, check np-proxy health first (HAProxy routing) and then the target backend host.
  • HAProxy stats (VPN/LAN): http://proxy.core.lef:8404/haproxy?stats
  • Not on VPN → db.lef hostnames won’t route.
  • Wrong DNS or stale cache → you hit the wrong backend.
  • HAProxy is down → multiple DB endpoints appear down at once.