Static IP for Supabase Edge Functions - Reliable SOCKS5 Connectivity for Deno Runtimes and Global Edge Clusters.
Supabase Edge Functions, powered by Deno, run at the network's edge for low-latency performance. However, connecting to secure third-party services often requires a static IP for whitelisting.
QuotaGuard's Static plan provides a straightforward SOCKS5 proxy on port 1080, which is natively supported by Deno.
This allows your edge functions to route traffic through dedicated static IPs without needing complex tunneling tools or sidecar processes that aren't supported in the edge environment.

Overcoming Runtime Restrictions in Distributed Edge Environments
While traditional cloud environments allow for the use of sidecar processes or background binaries like QGTunnel, the sandboxed Deno runtime used by Supabase Edge Functions prohibits these methods.
This necessitates a lightweight, protocol-level solution that operates within the constraints of a serverless edge worker.
QuotaGuard Static resolves this by exposing a cloud-native SOCKS5 gateway, providing the persistent IP identity required to traverse enterprise firewalls without requiring any infrastructure changes to your Supabase project.
This workflow outlines the technical steps to route your Supabase Edge Functions through QuotaGuard's high-availability SOCKS5 gateway.
By leveraging native Deno proxy support, you can establish secure, whitelisted connections to external APIs and databases using only standard environment variables and connection logic.
Sign up for a QuotaGuard Static plan.
Unlike the Shield tier, which defaults to advanced E2EE tunnels, the Static tier provides the standard SOCKS5 proxy necessary for Deno-based environments.
Retrieve your two dedicated Static IPs from your QuotaGuard dashboard.
Add these IPs to the firewall or "Network Access" settings of the destination service (e.g., MongoDB Atlas, SQL Server, or a third-party API).
In your Supabase Edge Function, initialize your HTTP client or database driver to route through the QuotaGuard SOCKS5 endpoint.
Since Deno supports this natively, you simply provide your QuotaGuard credentials and proxy address (port 1080) directly in your connection logic.

Technical Configuration and Setup for Supabase Edge Functions
QuotaGuard Shield is designed for E2EE (End-to-End Encryption) via secure tunnels like QGTunnel or QGPass.
Supabase Edge Functions operate in a sandboxed Deno runtime that does not allow the execution of background binaries or sidecar processes.
QuotaGuard Static is the correct choice because it offers a plain SOCKS5 proxy that Deno can interact with using standard web protocols.
No.
One of the primary advantages of this integration is that it requires no tunnels or sidecar processes.
The connection is handled purely at the application layer within your Deno code, making it compatible with the lightweight execution model of Supabase's edge infrastructure.
Supabase projects have configurable Network Restrictions for their PostgreSQL databases.
However, if your goal is to have traffic leaving a Supabase Edge Function and entering another secure system, you need the static outbound identity that QuotaGuard provides.
Supabase Edge Functions are distributed globally to be near your users. To minimize latency, QuotaGuard offers proxy nodes in all major global regions.
By matching your QuotaGuard gateway region to your Supabase project's primary region, you ensure that the "network hop" is optimized for performance.
Authentication is handled via the credentials embedded in your QUOTAGUARDSTATIC_URL.
When configuring your Deno fetch or database client, you must extract the username and password from this environment variable and include them in the Proxy-Authorization header or the proxy configuration object.
This ensures that every request leaving the Supabase edge is verified by the QuotaGuard gateway before being assigned a static IP.
Yes, the QuotaGuard Static SOCKS5 gateway supports any TCP-based protocol, including direct database connections (e.g., PostgreSQL or MySQL) and custom API protocols.
Because Supabase Edge Functions allow for outbound TCP connections via Deno's networking APIs, you can route non-HTTP traffic through the proxy on port 1080 without the need for additional tunneling software.
You should utilize Supabase’s Environment Variables (Secrets) to manage distinct QuotaGuard credentials for different project stages.
By setting a unique QUOTAGUARDSTATIC_URL for your staging and production branches, you can route traffic through separate static IP pairs.
This allows you to maintain independent allow-lists on your destination servers, ensuring that development traffic never originates from your production IP identity.
We don’t outsource Support to non-Engineers.
Reach out directly to the Engineers who built Shield to discuss your specific architecture, integration challenges, or compliance constraints here 👇
For over a decade, QuotaGuard has provided reliable, high-performance static IP and proxy solutions for cloud environments like Heroku, Kubernetes, and AWS.
Get the fixed identity and security your application needs today.