This add-on is operated by Alpine Shark, LLC
Static IPs with HA+LB for Inbound/Outbound (HTTP/SOCKS5) Encrypted Connections
QuotaGuard Static IP's
Last updated May 10, 2024
Table of Contents
- Which QuotaGuard should I use?
- Provisioning the add-on
- HTTP Proxy
- HTTP Proxy with Ruby/Rails
- HTTP Proxy with Python/Django
- HTTP Proxy with Node.js
- HTTP Proxy with PHP
- HTTP Proxy with Java
- HTTP Proxy with Clojure
- HTTP Proxy with Golang
- SOCKS5 Proxy
- SOCKS5 Proxy with QGTunnel
- Inbound Proxy
- Monitoring & logging
- Dashboard
- Local setup
- FAQs
- Migrating between plans
- Removing the add-on
- Privacy - GDPR and CCPA
- Support
Heroku QuotaGuard Static IP’s
QuotaGuard Static is a Heroku Static IP add-on that allows you to route inbound & outbound traffic through a static IP address. You can provide this static IP address to an API partner for an IP based allowlist and open your own firewall to access internal resources.
QuotaGuard Static IP’s on Heroku come in three flavors:
- Outbound HTTP proxy for accessing HTTP & HTTPS web services
- Outbound SOCKS5 proxy for TCP-level routing, such as accessing a database, SMTP, FTP, etc.
- Inbound HTTP/HTTPS proxy or reverse proxy for accessing your Heroku app on a static IP
For outbound traffic, the first decision you must make as a developer is whether to target our HTTP or SOCKS5 proxy. The SOCKS5 proxy is more versatile, because it handles TCP-level traffic, but the setup steps are more involved than the HTTP proxy. Our general rule of thumb is use HTTP if accessing a web service, otherwise use SOCKS5. There is native support across Ruby, Python, Node.js, PHP, Scala, Java, and nearly every other language for the HTTP Proxy.
For inbound traffic, we provide you with a URL to connect to. You can bring your own FQDN if you like. We provide SSL Termination with your SSL Certificates as well.
Inbound proxy service is only available for the Micro plan or above.
Which QuotaGuard should I use?
We offer three products on Heroku, QuotaGuard, QuotaGuard Static, and QuotaGuard Shield.
QuotaGuard routes your traffic through a dynamic set of IP addresses that may change at any time and is intended for accessing APIs like Google Maps that restrict usage based on your IP address. It should be used if you want to access these APIs without your limit being shared with other Heroku apps.
QuotaGuard Static IP’s routes your Heroku traffic through a pair of static IP addresses that never change. It should be used if you need your traffic to pass through a known static IP address for the purpose of firewall ingress rules or application allowlisting with a third party. QuotaGuard Static IP’s uses HTTP and SOCKS5 for outbound service and SSL Termination for inbound service.
QuotaGuard Shield Static IP’s are HIPAA compliant and built to handle Heroku traffic that contains PII and other sensitive information. QuotaGuard Shield routes your traffic through a pair of static IP addresses that never change with a higher level of security over QuotaGuard Static. The service uses HTTPS and SOCKS over TLS for outbound service and SSL Passthrough for inbound service. Like QuotaGuard Static, QuotaGuard Shield should be used if you need your traffic to pass through a known IP address for the purpose of firewall ingress rules or application allowlisting with a third party. Shield allows you to utilize Heroku’s ACM for your site or bring your own certificate.
Please send us a mail if you’d like more guidance on what service fits your needs best.
Provisioning the add-on
QuotaGuard Static can be added to a Heroku application via the CLI:
A list of all plans available can be found here.
$ heroku addons:create quotaguardstatic:starter
-----> Adding quotaguardstatic:starter to sharp-mountain-4005... done, v18 (free)
-----> Your static IPs are [10.11.12.13, 14.15.16.17]
Once QuotaGuard Static has been added a QUOTAGUARDSTATIC_URL
setting will be available in the app configuration and will contain the full URL you should use to proxy your requests. This can be confirmed using the heroku config:get
command.
$ heroku config:get QUOTAGUARDSTATIC_URL
http://user:pass@static.quotaguard.com:9293
After installing QuotaGuard Static the application should be configured to fully integrate with the add-on.
What are my IPs?
You are provided with two static IP addresses as part of our fault tolerant, load balanced service. Traffic may route through either one at any time.
Your two IP addresses will be printed on the command line when you provision the add-on or you can view them on your QuotaGuard Static dashboard, accessible from your Heroku App page.
HTTP Proxy
The HTTP Proxy is an outbound proxy service, allowing your application to reach an external endpoint (ie: HTTPS api) with HTTP or HTTPS protocols.
How Secure is the HTTP Proxy
You can access HTTPS services via the HTTP proxy whilst still getting full SSL/TLS security. When you make a request via the proxy to an HTTPS endpoint your client will transparently issue a CONNECT request rather than a basic GET or POST request.
On receipt of this CONNECT request the proxy will open a tunnel between your client and the endpoint, allowing your client to negotiate a standard SSL session with the endpoint. Once negotiated all traffic sent between your client and the endpoint will be encrypted as if you had connected directly with them.
For HTTPS Proxy, check out QuotaGuard Shield. With the HTTPS Proxy your initial CONNECT request will be also encrypted, this protects proxy credentials and remote hostname but requires an additional TLS handshake.
HTTP Proxy with Ruby/Rails
Ruby has an excellent REST client that easily allows you to specify an HTTP proxy. You can run the below example in an irb session and verify that the final IP returned is one of your two static IPs.
require "rest-client"
RestClient.proxy = ENV["QUOTAGUARDSTATIC_URL"]
res = RestClient.get("http://ip.quotaguard.com")
puts "Your Static IP is: #{res.body}"
HTTP Proxy with Python/Django
Using with the Requests library
Requests is a great HTTP library for Python. It allows you to specify an authenticated proxy on a per request basis so you can pick and choose when to route through your static IP.
import requests
import os
proxies = {
"http": os.environ['QUOTAGUARDSTATIC_URL'],
"https": os.environ['QUOTAGUARDSTATIC_URL']
}
res = requests.get("http://ip.quotaguard.com/", proxies=proxies)
print(res.text)
Using with urllib2
urllib2 is a more basic library used for HTTP communication in Python and uses environment variables to set a proxy service.
In your application initialization you should set the http_proxy
variable to match the QUOTAGUARDSTATIC_URL
.
# Assign QuotaGuard to your environment's http_proxy variable
os.environ['http_proxy'] = os.environ['QUOTAGUARDSTATIC_URL']
To test in the Python interpreter
import urllib2, os
os.environ['http_proxy'] = os.environ['QUOTAGUARDSTATIC_URL']
url = 'http://ip.quotaguard.com/'
proxy = urllib2.ProxyHandler()
opener = urllib2.build_opener(proxy)
in_ = opener.open(url)
res = in_.read()
print(res)
HTTP Proxy with Node.js
Accessing an HTTP API with Node.js
To access an HTTP API you can use the standard HTTP library in Node.js but must ensure you correctly set the “Host” header to your target hostname, not the proxy hostname.
var http, options, proxy, url;
http = require("http");
url = require("url");
proxy = url.parse(process.env.QUOTAGUARDSTATIC_URL);
target = url.parse("http://ip.quotaguard.com/");
options = {
hostname: proxy.hostname,
port: proxy.port || 80,
path: target.href,
headers: {
"Proxy-Authorization": "Basic " + (new Buffer(proxy.auth).toString("base64")),
"Host" : target.hostname
}
};
http.get(options, function(res) {
res.pipe(process.stdout);
return console.log("status code", res.statusCode);
});
Accessing an HTTPS API with Node.js
The standard Node.js HTTPS module does not handle making requests through a proxy very well. If you need to access an HTTPS API we recommend using the Request module (npm install request).
var request = require('request');
var options = {
proxy: process.env.QUOTAGUARDSTATIC_URL,
url: 'https://api.github.com/repos/joyent/node',
headers: {
'User-Agent': 'node.js'
}
};
function callback(error, response, body) {
if (!error && response.statusCode == 200) {
console.log(body);
}
}
request(options, callback);
HTTP Proxy with PHP
PHP cURL is the easiest way to make HTTP requests via QuotaGuard Static. This example assumes that you have set the QUOTAGUARDSTATIC_URL environment variable which is automatically set for you when you provision the add-on.
The IP address printed on screen will be one of your two static IP addresses, run it a couple of times and you’ll probably see the other one too.
<?php
function lookup(){
$quotaguard_env = getenv("QUOTAGUARDSTATIC_URL");
$quotaguard = parse_url($quotaguard_env);
$proxyUrl = $quotaguard['host'].":".$quotaguard['port'];
$proxyAuth = $quotaguard['user'].":".$quotaguard['pass'];
$url = "http://ip.quotaguard.com/";
$ch = curl_init();
curl_setopt($ch, CURLOPT_URL, $url);
curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);
curl_setopt($ch, CURLOPT_PROXY, $proxyUrl);
curl_setopt($ch, CURLOPT_PROXYAUTH, CURLAUTH_BASIC);
curl_setopt($ch, CURLOPT_PROXYUSERPWD, $proxyAuth);
$response = curl_exec($ch);
return $response;
}
$res = lookup();
print_r($res);
?>
HTTP Proxy with Java
The JVM allows you to configure a socksProxyHost
. The example below uses Apache HttpClient, but the same configuration applies to other JVM-based clients.
import java.net.*;
import java.io.*;
public class HelloWorld {
public static void main(String []args) throws IOException {
URL proxyUrl = new URL(System.getenv("QUOTAGUARDSTATIC_URL"));
String userInfo = proxyUrl.getUserInfo();
String user = userInfo.substring(0, userInfo.indexOf(':'));
String password = userInfo.substring(userInfo.indexOf(':') + 1);
URLConnection conn = null;
System.setProperty("http.proxyHost", proxyUrl.getHost());
System.setProperty("http.proxyPort", Integer.toString(proxyUrl.getPort()));
Authenticator.setDefault(new Authenticator() {
protected PasswordAuthentication getPasswordAuthentication() {
return new PasswordAuthentication(user, password.toCharArray());
}
});
URL url = new URL("http://ip.quotaguard.com");
conn = url.openConnection();
BufferedReader in = new BufferedReader(new InputStreamReader(conn.getInputStream()));
String inputLine;
while ((inputLine = in.readLine()) != null)
System.out.println(inputLine);
in.close();
}
}
You can check available proxy related JVM settings here.
HTTP Proxy with Clojure
The Clojure clj-http library allows you to configure a proxy for an HTTP request. The example below shows you how to use this with the add-on:
(defn get-quota-guard []
(let [proxy-uri (java.net.URI. (env :quotaguardstatic-url))]
(client/get "http://httpbin.org/ip"
{:proxy-host (.getHost proxy-uri)
:proxy-port (.getPort proxy-uri)
:headers {
"Proxy-Authorization"
(str "Basic " (.encode (sun.misc.BASE64Encoder.)
(.getBytes (.getUserInfo proxy-uri))))}})))
HTTP Proxy with Golang
For Golang, you can setup a per-request proxy in the http package like this:
proxyUrl, err := url.Parse("http://username:password@proxy.quotaguard.com:9293")
myClient := &http.Client{Transport: &http.Transport{Proxy: http.ProxyURL(proxyUrl)}}
Or you can configure it for all requests like this:
proxyUrl, err := url.Parse("http://username:password@proxy.quotaguard.com:9293")
http.DefaultTransport = &http.Transport{Proxy: http.ProxyURL(proxyUrl)}```
SOCKS5 Proxy
SOCKS5 is a very flexible TCP level tunneling protocol which works on a per host basis and is compatible with all programming environments. QuotaGuard Static provides three ways to setup SOCKS5 proxy integration within your app:
- QuotaGuard Tunnel, process-based tunneling program
- QuotaGuard Socksify script, routing-based tunneling program
- Framework specific support for SOCKS5
QGTunnel is an extremely versatile wrapper script for your process. It allows you to map one or more local ports to route through the QuotaGuard proxy servers. It supports a DNS override mode for protocols that require the hostname stay the same (ie: HTTPS) or to minimize the impact on the code. QGTunnel also supports end-to-end encryption of your tunnel data for protocols that are not encrypted (ie: redis).
We recommend QGTunnel unless you need to route all traffic within the app through the SOCKS5 proxy.
QGSocksify is a routing-based tunneling program. It allows for all or some of the outgoing traffic to be routed through the proxy server based on the destination IP or IP range. Please note: This solution includes software developed by Inferno Nettverk A/S, Norway.
Additionally, many languages support SOCKS5 proxies natively or via a add-on package.
SOCKS5 Proxy with QGTunnel
To get started with the SOCKS5 proxy utilizing QGTunnel, please follow these steps:
Download QGTunnel
Download and extract the qgtunnel
in the root directory of your app:
$ curl https://s3.amazonaws.com/quotaguard/qgtunnel-latest.tar.gz | tar xz
Setup the Tunnel
Login to our dashboard and setup the tunnel:
$ heroku addons:open quotaguardstatic
Opening quotaguardstatic for sharp-mountain-4005...
At the top right, click Settings, then Setup. On the left, click Tunnel, then Create Tunnel. This example assumes a MySQL server.
Remote Destination: tcp://hostname.for.your.server.com:3306
Local Port: 3306
Transparent: true
Encrypted: false
This setup assumes that your server is located at “hostname.for.your.server.com” and is listening on port 3306 (the default mysql port).
Use the same port for the local port, unless you are using that port on your dyno or it is below 1024, then you will have to change this to some other port (say 3307).
Transparent mode allows QuotaGuard to override the DNS for hostname.for.your.server.com to 127.0.0.1, which redirects traffic to the QGTunnel software. This means you can connect to either hostname.for.your.server.com or 127.0.0.1 to connect through the QGTunnel. More information is available on transparent mode as you follow along in these instructions.
Encrypted mode can be used to encrypt data end-to-end, but if your protocol is already encrypted then you don’t need to spend time setting it up. More details on end-to-end encryption is below as you follow these instructions.
Creating the tunnels in the dashboard is for convenience. See the last step (Harden your setup) for how to remove a dependency from your system.
Change your code (maybe)
You may have to change your code to connect through QGTunnel.
With transparent mode, and when using the same local and remote port, you should not have to change your code.
Without transparent mode, you will want to connect to 127.0.0.1:3306 (in this example). If you changed the local port, then you will need to change the port number to match.
Change your Procfile
(You have a procfile even if it’s not explicitly in your code base. To find it, log into the Heroku dashboard, click on the Resources tab, there you will see a list all of your dyno processes. The text you see (like web npm start) acts as your Procfile, if you do not have one explicitly in your code base.)
Modify your app Procfile to prepend the QGTunnel application to your standard commands:
Before:
web: bundle exec unicorn -p $PORT -c ./config/unicorn.rb
After:
web: bin/qgtunnel bundle exec unicorn -p $PORT -c ./config/unicorn.rb
Deploy
Commit and deploy your changes. Be sure to add bin/qgtunnel
. If you are using transparent mode, be sure vendor/nss_wrapper/libnss_wrapper.so
is also committed.
If problems arise
By default all fatal errors encountered by the qgtunnel
will be logged to your Heroku logs. If this information is not enough, you can enable verbose output mode by setting QGTUNNEL_DEBUG
environment variable to true
.
$ heroku config:set QGTUNNEL_DEBUG=true
Send any information in the logs (please redact any credentials, including your QuotaGuard connection URL) to support@quotaguard.com.
IMPORTANT: Harden your setup.
This step is highly recommended as we do not have any SLA on our website, which can be out due to maintenance.
By default qgtunnel
will try to fetch configuration from the QuotaGuard API, but it also supports local configuration. You should download the configuration file from the Dashboard by pressing Download configuration on the Tunnel page.
Place the downloaded file into the root directory of your project under the .qgtunnel
filename, commit and deploy. With this file, your application will not depend on the availability of our website during application startup.
Transparent Mode
If your application depends on DNS based discovery process or needs local tunnel to be resolvable via the DNS name regular tunneling mode will not be enough. For this situation you should enable transparent mode for the QGTunnel in your configuration. In transparent mode, QGTunnel will alter DNS queries from your app to the local address.
Let’s say you want to access replicated MongoDB cluster using QGTunnel with 3 replicas located on the hosts: rs01.mongodb.net:52115
, rs02.mongodb.net:52115
and rs1.mongodb.net:52115
. For this configuration you will need to create 3 separate tunnels for each host on the port 52115
in transparent mode. Once this is done, QGTunnel will alter DNS resolution process to resolve these host names to the appropriate loopback address and auto discovery for your replicated cluster should work as intended.
End-to-end Encryption
Tunnels support communication over TLS encrypted connections. Encryption offers a high level of data protection: all data will be decrypted only in the environments that you control. The remote destination that the tunnels connect to have to support TLS encryption and have a valid certificate installed. If your remote destination doesn’t support encryption, you can use stunnel. You can use self-signed certificates, however you have to provide a custom root CA certificate, it will be added to the list of trusted roots in qgtunnel
.
For example: You want to connect to the IP restricted Redis and encrypt all traffic between the Heroku app and Redis server. Redis doesn’t support encryption, so you have to install stunnel
on the Redis server or any other server within the same network. Typical stunnel configuration that you might want to use:
[redis]
accept = 6380
connect = 127.0.0.1:6379
cert = example.com.pem
With this configuration, stunnel will start TLS server on port 6380
, it will handle encrypted traffic and will pass decrypted data to the Redis server on 127.0.0.1:6379
. As noted you will need a valid certificate, or you can generate self-signed certificate:
- Generate private key and certificate for the custom
CA
:
$ openssl genrsa -out CA.key 2048
$ openssl req -x509 -new -key CA.key -out CA.cer -days 730
- Generate
CSR
for your domain and sign it with customCA
:
$ openssl genrsa -out example.com.key 2048
$ openssl req -new -out example.com.req -key example.com.key
$ openssl x509 -req -in example.com.req -out example.com.cer -CAkey CA.key -CA CA.cer -days 365 -CAcreateserial -CAserial serial
- Create
PEM
bundle:
$ cat example.com.key example.com.cer > example.com.pem
Install example.com.pem
on stunnel server. Add CA.cer
to your heroku repository and update qgtunnel
command in your Procfile:
web: bin/qgtunnel -root_ca CA.cer bundle exec unicorn -p $PORT -c ./config/unicorn.rb
Finally enable encryption for your tunnel configuration on QuotaGuard dashboard.
With this configuration, all the traffic handled by qgtunnel
will be encrypted with your certificate and all data will be passing proxies in encrypted format.
Setting up MySQL access from Rails
This assumes that you have already followed the steps to download and install the SOCKS5 wrapper script as detailed in the section above.
To connect to a MySQL host via the proxy you need to add an extra line to your database.yml config file to ensure no connect_timeout is set. Without this option your app will not be able to connect to the database and will hang indefinitely.
The value is deliberately left out to force the mysql2 adapter to use nil as the timeout.
connect_timeout:
Your full database.yml might look something like this (example values only).
common: &common
adapter: mysql2
username: secureuser
password: securepassword
encoding: utf8
pool: 5
connect_timeout:
development:
<<: *common
database: myapp_development
test:
<<: *common
database: myapp_test
production:
<<: *common
Inbound Proxy
The Inbound Proxy allows you to always access your Heroku app on a Static IP address. This feature is available on our Micro plan and above.
Once you have provisioned the add-on you just need to visit the QuotaGuard Static Dashboard to complete your setup. You can do this from your Heroku Dashboard by clicking on our icon or from your command line:
$ heroku addons:open quotaguardstatic
Opening quotaguardstatic for sharp-mountain-4005...
Visit the Setup page and enter in the full URL of your Heroku app, e.g. http://cool-api.herokuapp.com
We then create for you a unique URL that you can use to access your web application: e.g. a62b1d0b4983db763450411fd393b3ce-eu-west-1.getstatica.com.
This corresponds to a DNS A name record that resolves to your two QuotaGuard Static IPs. You should include both IP addresses in any firewall rules or allowlists.
Open this URL in your browser and you should see your own web application. If you are using HTTPS or filter based on the domain name, you may need to add a custom domain in our dashboard. Follow the instructions on the dashboard to setup your custom domain.
Please note it may take up to 10 minutes for configuration and DNS changes to propagate.
In your firewall you can now just open access to the two QuotaGuard Static IPs in order to work with your cloud app.
SSL setup
Our self-service automated setup supports SSL by default. For custom domains you have to upload valid certificate to enable SSL. In both cases SSL will be terminated on QuotaGuard proxies.
Monitoring & logging
Real-time and historical usage stats can be displayed on the QuotaGuard Static Dashboard accessible from your Heroku Dashboard.
Dashboard
The QuotaGuard Static dashboard allows you to view your real-time and historical usage of every API.
The dashboard can be accessed via the CLI:
$ heroku addons:open quotaguardstatic
Opening quotaguardstatic for sharp-mountain-4005...
or by visiting the Heroku apps web interface and selecting the application in question. Select QuotaGuard Static from the Add-ons menu.
Local setup
Environment setup
After provisioning the add-on you can locally replicate the config vars so your development environment can operate against the service. This should be used for initial testing only as usage will count against your daily limits.
Though less portable it’s also possible to set local environment variables using
export QUOTAGUARDSTATIC_URL=value
.
Use Heroku Local to configure, run and manage process types specified in your app’s Procfile. Heroku Local reads configuration variables from a .env file. Use the following command to add theQUOTAGUARDSTATIC_URL
value retrieved from heroku config to .env
.
$ heroku config -s | grep QUOTAGUARDSTATIC_URL >> .env
$ more .env
Credentials and other sensitive configuration values should not be committed to source-control. In Git exclude the .env file with: echo .env >> .gitignore
.
FAQs
Do you offer Dedicated Static IPs?
Yes - dedicated IP addresses are available on request for subscriptions on the Enterprise plan and above. As they require dedicated infrastructure we only provision these on request so please contact us if you want a dedicated Static IP address.
What happens when I reach my usage limit?
To make sure we grow in harmony with your application QuotaGuard Static operates initially with a soft limit. When you reach your plan’s monthly usage limit your requests will continue going through but we will reach out to you via e-mail to ask that you upgrade your plan.
If you repeatedly exceed your limits without upgrading then hard limits may be placed on your account but this is a very last resort.
I’ve forgotten what my Static IPs are!
Both IPs are shown on your Dashboard which you can get to either from your Heroku Apps page or via the CLI.
Can I access your Brazilian instance in Sao Paulo?
QuotaGuard Static is deployed in the Heroku US & Europe regions and you are automatically assigned to an instance in the same region as your app. If you would like to use our South America instance located in Sao Paulo please contact us and we can manually relocate you. This will change your Static IP address.
$ heroku addons:open quotaguardstatic
Opening quotaguardstatic for sharp-mountain-4005...
Why have you given me two Static IP addresses?
We believe all apps should be built for scalability and high availability. Our commitment to this means we only provide load balanced, high availability services. Load balancing our nodes allows one node to fail or be brought down for maintenance with no impact to your application. Each IP you are given represents one proxy node that is running behind a load balancer.
If you want to use just one IP address, you can change your QUOTAGUARDSTATIC_URL environment variable to point to one of the two IPs following this format:
http://USERNAME:PASSWORD@IPADDRESS:9293
Contact support@quotaguard.com if you have any issues utilizing just one of the two IPs.
What region does QuotaGuard Static run in?
We have instances in the US, EU, SA, EA, and AP regions. When you provision the add-on you will be assigned static IPs in the same region as your Heroku app ensuring we can always process your requests with ultra low latency.
Can I access MySQL or Postgres through this?
Yes we have many users doing this. The easiest way for most languages is to use our SOCKS5 proxy wrapper(installation details higher up the page). If you are using Node.js you can also configure the SOCKS5 proxy in your Javascript code without using the wrapper (details also on this page).
Migrating between plans
Application owners can migrate at any time with no interruption to your service.
Use the heroku addons:upgrade
command to migrate to a new plan.
$ heroku addons:upgrade quotaguardstatic:large
-----> Upgrading quotaguardstatic:large to sharp-mountain-4005... done, v18 ($90/mo)
Your plan has been updated to: quotaguardstatic:large
The QUOTAGUARDSTATIC_URL will revert back to it’s original setting when you change plans. Be prepared to reset this if you have changed it.
Removing the add-on
QuotaGuard Static can be removed via the CLI.
This will destroy all associated data and cannot be undone!
$ heroku addons:destroy quotaguardstatic
-----> Removing quotaguardstatic from sharp-mountain-4005... done, v20 (free)
Privacy - GDPR and CCPA
All three QuotaGuard services are a GDPR and CCPA compliant. Please review our Privacy Policy and GDPR/CCPA compliance information at QuotaGuard.com’s Privacy Policy page. In addition, we also answer many questions around Privacy, Security, and GDPR at QuotaGuard.com FAQ’s. If you need a DPA for your customers, or from us as a sub-contractor of your services, please contact us via our Support channel (details below) so we can get you the right DPA contract for your review.
Support
All QuotaGuard Static support and runtime issues should be submitted via the Heroku Support channels or directly to our QuotaGuard Static IP Customer Support site. Any non-support related issues or product feedback is welcome at QuotaGuard’s Heroku Static IP site.