Datost connects to Microsoft SQL Server (2016+) and Azure SQL using the officialDocumentation Index
Fetch the complete documentation index at: https://datost.com/docs/llms.txt
Use this file to discover all available pages before exploring further.
mssql driver. Once connected, Datost can list schemas, inspect tables, and run read-only queries on your behalf when teammates ask questions in Slack.
What you’ll need
- A SQL Server host reachable by Datost (public) or a Tunnel Agent host (private)
- TCP port (default
1433) - Database name (defaults to
master) - A SQL Authentication user and password
Datost uses SQL Authentication. Windows / Integrated Authentication is not supported — create a dedicated SQL login for Datost.
1. Create a read-only user
Run these statements as an admin against the database you want Datost to read. Replace the password before running.2. Connect from the admin panel
Enter connection details
Provide the host, port, database, username, and password for
datost_readonly. Give the connection a name your team will recognize in Slack.Test the connection
Datost runs
SELECT @@VERSION against your server using an ephemeral pool and reports the server version on success. Fix any reported error before saving.Public vs. private instances
If your SQL Server is publicly reachable, allowlist Datost’s egress IPs on your firewall and connect directly. TLS is on by default; set SSL mode toverify-full if you want full certificate validation.
For servers inside a VPC or on-prem, install the Datost Tunnel Agent on a host that can reach your database. The agent opens an outbound connection to Datost — no inbound firewall rules, no public exposure. After the agent is online, enter the private host/port in the connection form and select your tunnel.
Azure SQL
Azure SQL Database and Azure SQL Managed Instance both work with this integration. A few specifics:- Host looks like
your-server.database.windows.net - Port is always
1433 - Username must include the server for contained users:
datost_readonly@your-server - Add Datost’s egress IPs to your Azure SQL firewall under Networking → Public access
Troubleshooting
- Login failed — user exists at server level but not in the target database, or the
db_datareaderrole was not granted. - TLS / certificate errors — lower SSL mode to
require, or install a trusted cert on the server forverify-full. - Timeouts from a private host — confirm the Tunnel Agent is online and the host is resolvable from the agent’s network.