Production databases are isolated by design. For Firetiger, whose AI agents autonomously administer Postgres, MySQL, and ClickHouse instances, that isolation has been a hard constraint — until now. The company has launched Network Transports, a connectivity layer that lets its DBA agents reach databases sitting entirely behind private network boundaries. The first supported transport is Tailscale, the WireGuard-based mesh VPN that infrastructure teams have broadly adopted for its zero-configuration approach to private networking.
The integration works by adding Firetiger to a user's Tailnet as an ephemeral device, the company says. It inherits whichever access controls are already defined in the organisation's Tailscale ACLs and disappears when a session ends, leaving no persistent node. The setup involves three steps: updating Tailscale ACLs, generating OAuth credentials scoped to a dedicated Firetiger device tag, and registering the transport in the Firetiger dashboard. Any Postgres, MySQL, or ClickHouse connection can then be routed through the Tailnet without VPC peering, AWS PrivateLink, or bastion host configuration.
That matters because Firetiger's agents don't operate in isolation. According to the company's documentation, its multi-agent architecture allows individual agents to communicate with one another, self-manage activation states, and maintain structured knowledge graphs about customer infrastructure. Reaching private-network segments is a prerequisite for that architecture to function on the databases where it's most relevant.
The near-term limitation is straightforward: the feature only helps teams already running Tailscale. Organisations using AWS PrivateLink, HashiCorp Boundary, or their cloud provider's native private connectivity tooling will need to wait — Firetiger describes Tailscale as the first of multiple planned transports but hasn't published a roadmap for what follows. For infrastructure teams that have standardised on Tailscale, the integration removes a genuine obstacle to deploying database agents against sensitive, air-gapped infrastructure. For everyone else, private network support remains a gap.