Deployment options
Last updated
Last updated
LogicLoop is SOC2 Type II Compliant and handles your data with the most stringent levels of care.
We don't store the all data from the sources that you connect directly on our servers. Instead, we make a connection request to your database and only retrieve the information that is needed. Results retrieved are temporarily stored in our encrypted AWS RDS instance and deleted after 30 days. We don’t share/sell your data to any third parties.
Depending on your company's security policies, you may wish to explore one or more of our following deployment options:
The fastest option to get started is signing up for our SaaS product and simply entering your database credentials to integrate directly with LogicLoop. Some strategies for doing this for security-sensitive companies:
If your database has a firewall such that it can only connect to a pre-defined set of IP addresses, you will need to whitelist our IP addresses. Email hi@getlogicloop.com for a list of our static IP addresses.
Connect LogicLoop to your secondary database instead of your primary
Connect LogicLoop to your data warehouse instead of your production database
Create a specific user with read-only permissions, or permissions to only read from specific tables.
Some companies may have stricter firewall policies. Instead of LogicLoop connecting to your database directly, we can set up an SSH tunnel to connect to your database behind a bastion host.
To enable this option, we assume you have a database that lies behind a firewall, protected by a bastion host that has access to the database. You will want to create a LogicLoop specific user in your bastion host with our public key so we can SSH into the bastion host to connect to the database. Please email us at hi@getlogicloop.com if you would like to get this set up.
Reverse SSH tunneling is available for Enterprise customers
A reverse SSH tunnel is similar to a regular SSH tunnel, except instead of LogicLoop SSH-ing into your bastion host, your bastion host SSHs into LogicLoop's application and creates a connection between your database port and LogicLoop's port to establish the connection.
To enable this option, we assume you have a database that lies behind a firewall, protected by a bastion host that has access to the database. Next, we will share with you credentials for SSH-ing into your LogicLoop instance. Within your bastion host, you can then set up an autossh connection to forward connections from your database port to LogicLoop's port. Please email us at hi@getlogicloop.com if you would like to get this set up.
The most conservative security option is to host your LogicLoop application completely on your own company's infrastructure. LogicLoop's software is cleanly packed up into Docker containers so we can give you access to our application's underlying source code and you can run the entire application in your own local cloud network. LogicLoop never accesses or touches any of your internal data.
Our application is packaged in Docker containers for ease of deployment in any cloud environment. We also provide AWS AMIs for ease of spin-up for those in the AWS environment. Email us at hi@getlogicloop.com to get started.