Connect once, monitor everything. Add your database credentials and AnomalyArmor continuously monitors for schema changes, stale data, and quality issues, without installing anything in your infrastructure. Your data stays in your database. We only read metadata (table names, column types, timestamps) through a secure, read-only connection.Documentation Index
Fetch the complete documentation index at: https://docs.anomalyarmor.ai/llms.txt
Use this file to discover all available pages before exploring further.
Supported Databases
AnomalyArmor supports the most popular data platforms used by modern data teams:| Database | Version | Key Features |
|---|---|---|
| PostgreSQL | 12+ | Tables, views, schemas, materialized views |
| MySQL | 5.7+ | Tables, views, schemas |
| SQL Server | 2012+ | Tables, views, schemas, Azure SQL Database |
| Amazon Redshift | Any | Tables, views, external tables (Spectrum) |
| Databricks | Unity Catalog | Catalogs, schemas, Delta tables, views |
| ClickHouse | 21.8+ | Tables, views, materialized views, dictionaries |
PostgreSQL
Including RDS, Aurora, Supabase, and self-hosted
MySQL
Including RDS, Aurora MySQL, PlanetScale, and self-hosted
SQL Server
Including Azure SQL Database and on-premise
Amazon Redshift
Provisioned clusters and Serverless workgroups
Databricks
Unity Catalog with Delta Lake support
ClickHouse
Including ClickHouse Cloud
How Data Sources Work
When you add a data source, AnomalyArmor:- Stores credentials securely: Encrypted with AES-256
- Tests connectivity: Verifies we can reach your database
- Awaits discovery: No scanning until you trigger it
What We Access
AnomalyArmor only queries metadata from your databases:| We Access | We Never Access |
|---|---|
information_schema | Your actual data |
| System catalogs | Row contents |
| Table/column names | PII or sensitive values |
| Data types | Business data |
| Timestamps (for freshness) | Query results |
See Security Overview for detailed information about our security practices.
Adding a Data Source
Quick Steps
- Navigate to Data Sources in the sidebar
- Click Add Connection
- Select your database type
- Enter connection credentials
- Click Test Connection
- Click Save
- PostgreSQL Setup
- MySQL Setup
- SQL Server Setup
- Amazon Redshift Setup
- Databricks Setup
- ClickHouse Setup
Managing Data Sources
Editing Connections
To update a data source:- Go to Data Sources
- Click on the connection name
- Click Settings
- Update credentials or configuration
- Click Save
Deleting Connections
To remove a data source:- Go to Data Sources
- Click on the connection name
- Click Settings → Delete Connection
- Confirm deletion
- The connection and credentials
- Discovery schedule
- Associated alert rules (optional)
- Historical schema change data
- Audit logs
Connection Status
Each data source shows its status:| Status | Meaning |
|---|---|
| Connected | Last discovery succeeded |
| Error | Connection or permission issue |
| Never Run | Discovery hasn’t been triggered yet |
| Running | Discovery in progress |
Network Requirements
AnomalyArmor connects outbound to your databases. You’ll need to:1. Allow AnomalyArmor IPs
Allowlist our static IP addresses in your firewall or security group:2. Open Database Port
Ensure the database port is accessible:| Database | Default Port |
|---|---|
| PostgreSQL | 5432 |
| MySQL | 3306 |
| SQL Server | 1433 |
| Amazon Redshift | 5439 |
| Databricks | 443 (HTTPS) |
| ClickHouse | 8443 (HTTPS) |
3. SSL/TLS Configuration
We recommend (and often require) encrypted connections:- PostgreSQL: SSL Mode =
require - MySQL: SSL Mode =
require - SQL Server: Encryption enabled (required for Azure SQL)
- Amazon Redshift: SSL required by default
- Databricks: Always HTTPS
- ClickHouse: Port 8443 for HTTPS
Enterprise Options
For enhanced security, Enterprise customers can use:VPC Peering
Direct network peering between your AWS VPC and AnomalyArmor:- No public internet exposure
- Lower latency
- Private IP connectivity
AWS PrivateLink
Connect via AWS PrivateLink:- Fully private connectivity
- No firewall changes needed
- Traffic stays on AWS backbone
Best Practices
Use Read-Only Credentials
Always create a dedicated, read-only user for AnomalyArmor:Use Descriptive Names
Name your data sources clearly: Good names:Production PostgreSQLAnalytics DatabricksStaging ClickHouse
db1testconnection
Start with One Environment
Begin with your production database, then expand to staging and development environments once you’re comfortable with the setup.Troubleshooting
Connection test fails
Connection test fails
- Verify hostname and port are correct
- Check credentials are valid
- Ensure AnomalyArmor IPs are allowlisted
- Verify SSL/TLS settings match your database
Discovery finds no tables
Discovery finds no tables
- Verify user has
SELECToninformation_schema - Check schema filters aren’t excluding everything
- Confirm tables exist in the monitored schemas
Intermittent connection errors
Intermittent connection errors
- Check database availability and load
- Verify network stability
- Consider using a read replica for monitoring
Common Questions
What databases does AnomalyArmor support today?
PostgreSQL (12+), MySQL (5.7+), SQL Server (2012+, including Azure SQL), Amazon Redshift, Databricks (with Unity Catalog), and ClickHouse (21.8+). RDS, Aurora, Supabase, PlanetScale, Cloud SQL, and Azure Database are all supported via the compatible engine’s connector. Snowflake and BigQuery are in active development.Can I connect a database that’s behind a firewall or in a private VPC?
Yes. Three options: (1) allowlist AnomalyArmor’s static outbound IPs (visible in Settings → Security) in your firewall; (2) VPC peering (Enterprise); (3) AWS PrivateLink (Enterprise). SSH tunnel / bastion host is also supported for PostgreSQL and MySQL when direct connectivity is not possible.Can I monitor multiple databases from one AnomalyArmor workspace?
Yes - most customers do. Connect as many as you need; assets across all connections appear in a unified catalog. Plan limits are on monitored tables, not number of connections.Should I point AnomalyArmor at production or a replica?
Either works. A replica has zero impact on primary workload and is the recommended pattern for production-grade deployments. Freshness reflects replica timestamps, so factor in replication lag when setting SLAs.What happens if my database credentials expire or rotate?
Discovery and monitoring jobs fail and the connection moves to Error status. Update credentials under the connection’s settings and re-test; in-flight jobs will resume on the next scheduled run. Consider using credential managers (AWS Secrets Manager, Vault) and rotating via Enterprise SSO to reduce manual updates.Next Steps
Connect PostgreSQL
Full guide with RDS, Aurora, and Supabase instructions
Run Discovery
Scan your database after connecting
