

Supabase Edge Functions
Supabase Edge Functions operate on a sandboxed Deno runtime where outbound requests originate from an ephemeral, global pool of IP addresses. This dynamic nature presents a major security hurdle, as whitelisting Supabase natively would require opening your destination firewalls to massive, shifting cloud ranges. Because edge environments prohibit the execution of background binaries or sidecar processes like QGTunnel, QuotaGuard Static provides a protocol-level gateway that your functions connect to natively, ensuring a consistent network identity even as your edge infrastructure scales across global nodes.
- Native Deno & Edge Compatibility: Unlike traditional proxy solutions that require sidecars, QuotaGuard Static exposes a standard SOCKS5 gateway on port 1080 that is natively supported by the Deno networking stack. This allows your Supabase Edge Functions to route traffic through a static IP using standard code logic, satisfying runtime restrictions while maintaining an enterprise-grade security perimeter.
- Secure Access to Firewalled Databases: Many corporate databases (SQL Server, Oracle, MongoDB Atlas) require a fixed IP or CIDR block to permit a connection. QuotaGuard acts as a secure bridge, allowing your Supabase functions to communicate with firewalled data sources through a stable IP pair instead of exposing your sensitive database ports to the entire public internet.
- Enterprise API Allow-Listing: High-security APIs, such as those used in banking, healthcare, and legacy corporate systems, often reject requests from dynamic cloud providers. By using QuotaGuard as your "Front Door," you provide these services with a permanent, dedicated IP identity, ensuring your critical integrations never break when Supabase scales its underlying edge infrastructure.
- High-Availability Redundancy: Every QuotaGuard account is architected with two static IP addresses situated on separate proxy nodes to eliminate any single point of failure. If one node experiences a latency spike or outage, your traffic is automatically failover-routed to the secondary IP, ensuring that your production edge functions maintain a persistent and reliable database connection.
- Low-Latency Global Routing: To minimize the performance overhead of the "network hop," QuotaGuard maintains proxy gateways in every major global region where Supabase operates. By co-locating your static gateway with your Supabase project's primary data center, you ensure sub-millisecond latency and stay within the strict execution timeouts of the edge runtime.
- Streamlined Secret Management: QuotaGuard integrates seamlessly with Supabase Environment Variables, allowing you to manage your
QUOTAGUARDSTATIC_URLas a secure secret. This makes it easy to maintain distinct static IP identities for your development, staging, and production environments, ensuring that testing traffic is isolated from your production allow-lists.
Maintain a consistent static identity for your dynamic Supabase Edge Functions.
Go directly to the Supabase Integration Guide.