Features Requiring External Access
- GitOps Workflows: CI/CD platforms (GitHub Actions, GitLab CI, etc.) need to call Bytebase API
- SSO Authentication: OAuth2/OIDC/SAML providers need callback access
- Webhooks: External services sending events to Bytebase
Three Network Patterns
1. Bytebase Cloud
Use Bytebase Cloud for instant setup without infrastructure management. External services connect directly. Best for: Quick testing, evaluation, and small teams2. Self-Hosted Bytebase (Production)
Keep Bytebase inside your private network for security. With cloud CI/CD (GitHub.com, GitLab.com, Bitbucket, Azure DevOps):- Works without self-hosted runners
- Cloud CI/CD can call Bytebase directly (or via the required exposed endpoint)
- Install self-hosted runners/agents inside your network
- Runners connect to your internal Bytebase without exposing it to the internet
3. Self-Hosted Local Testing with Reverse Proxy
Temporarily expose local Bytebase for testing using reverse proxy tools such as:- ngrok
- VS Code port forwarding
- Other tunneling services
Important for Self-Hosted: Remember to configure the External URL in Bytebase Settings > General with your public URL for SSO callbacks and other integrations to work properly.

