

MongoDB
Heroku’s Common Runtime architecture utilizes ephemeral AWS nodes where application traffic originates from a rotating pool of thousands of dynamic IP addresses across shifting cloud regions. Attempting to whitelist Heroku natively in MongoDB Atlas is a significant security risk, as it would require opening your database to massive AWS IP ranges (0.0.0.0/0) that change without notice. QuotaGuard provides a dedicated, fixed gateway that remains constant even as your Heroku dynos scale, restart, or migrate across different underlying infrastructure.
- Static Identity for MongoDB Atlas: Provide your specific Heroku project with a dedicated pair of outbound exit points. This allows you to restrict Atlas "Network Access" to only your QuotaGuard IPs, ensuring your database cluster remains secure while your app scales horizontally.
- Transparent SOCKS5 Proxying via QGTunnel: MongoDB’s distributed architecture and replica sets can be difficult to route through standard proxies. QuotaGuard uses QGTunnel to handle network routing at the process level, allowing you to use standard
mongodb+srv://connection strings without modifying your application code or driver logic. - Reliable Inbound Connectivity (Static Inbound): QuotaGuard provides a stable inbound entry point for third-party services or webhooks that require a single, static destination IP to communicate with your app. This ensures that your incoming integrations never break when Heroku rotates its routing layer or dyno IPs.
- Production-Grade Redundancy: Every QuotaGuard account includes two static IPs situated on separate proxy nodes to eliminate single points of failure. If one node experiences a latency spike or outage, traffic is automatically rerouted to the secondary IP, maintaining a stable connection to your MongoDB shards.
- Compliance Hardening with E2EE: For organizations handling sensitive data, QuotaGuard Shield provides mandatory End-to-End Encryption (E2EE). This architecture ensures that data is encrypted at the dyno and only decrypted at the destination, satisfying the strict privacy requirements for HIPAA, PCI, and SOC2 compliance.
- Low-Latency Regional Routing: Co-locate your QuotaGuard gateway in the same geographic region as your Heroku dynos and MongoDB Atlas nodes (e.g., US-East, EU-West, or Sydney). This minimizes "network hop" overhead and ensures sub-millisecond latency for high-frequency database queries.
