Heroku Setup Instructions for XL Routes Static IP's
Heroku XL Routes Static IP’s
XL Routes Staticis a Heroku Static IP add-on that allows you to route inbound & outbound traffic through a static IP address. You can provide this static IP address to an API partner for an IP based allowlist and open your own firewall to access internal resources.
XL Routes Static IP’s on Heroku come in three flavors:
- Outbound HTTP proxy for accessing HTTP & HTTPS web services
- Outbound SOCKS5 proxy for TCP-level routing, such as accessing a database, SMTP, FTP, etc.
- Inbound HTTP/HTTPS proxy or reverse proxy for accessing your Heroku app on a static IP
For outbound traffic, the first decision you must make as a developer is whether to target our HTTP or SOCKS5 proxy. The SOCKS5 proxy is more versatile, because it handles TCP-level traffic, but the setup steps are more involved than the HTTP proxy. Our general rule of thumb is use HTTP if accessing a web service, otherwise use SOCKS5. There is native support across Ruby, Python, Node.js, PHP, Scala, Java, and nearly every other language for the HTTP Proxy.
For inbound traffic, we provide you with a URL to connect to. You can bring your own FQDN if you like. We provide SSL Termination with your SSL Certificates as well.
Note: Inbound proxy service is only available for the Micro plan or above.
Which XLRoutes Should I Use?
We offer three products on Heroku, XLRoutes, XL Routes Static, and XL Routes Shield.
XLRoutes routes your traffic through a dynamic set of IP addresses that may change at any time and is intended for accessing APIs like Google Maps that restrict usage based on your IP address. It should be used if you want to access these APIs without your limit being shared with other Heroku apps.
XL Routes Static IP’s routes your Heroku traffic through a pair of static IP addresses that never change. It should be used if you need your traffic to pass through a known static IP address for the purpose of firewall ingress rules or application allowlisting with a third party. XL Routes Static IP’s uses HTTP and SOCKS5 for outbound service and SSL Termination for inbound service.
XL Routes Shield Static IP’s are HIPAA compliant and built to handle Heroku traffic that contains PII and other sensitive information. XL Routes Shield routes your traffic through a pair of static IP addresses that never change with a higher level of security over XL Routes Static. The service uses HTTPS and SOCKS over TLS for outbound service and SSL Passthrough for inbound service. Like XL Routes Static, XL Routes Shield should be used if you need your traffic to pass through a known IP address for the purpose of firewall ingress rules or application allowlisting with a third party. Shield allows you to utilize Heroku’s ACM for your site or bring your own certificate.
Please send us a mail if you’d like more guidance on what service fits your needs best.
Provisioning the add-on
XL Routes Static can be added to a Heroku application via the CLI:
Note: A list of all plans available can be found here.
$ heroku addons:create xlroutesstatic:starter
-----> Adding xlroutesstatic:starter to sharp-mountain-4005... done, v18 (free)
-----> Your static IPs are [10.11.12.13, 14.15.16.17]
Once XL Routes Static has been added a xlroutesSTATIC_URL
setting
will be available in the app configuration and will contain the full URL you should use to proxy your requests. This can be
confirmed using the heroku config:get
command.
$ heroku config:get xlroutesSTATIC_URL
http://user:pass@static.xlroutes.com:9293
After installing XL Routes Static the application should be configured to fully integrate with the add-on.
What are my IPs?
You are provided with two static IP addresses as part of our fault tolerant, load balanced service. Traffic may route through either one at any time.
Your two IP addresses will be printed on the command line when you provision the add-on or you can view them on your XL Routes Static dashboard, accessible from your Heroku App page.
HTTP Proxy
The HTTP Proxy is an outbound proxy service, allowing your application to reach an external endpoint (ie: HTTPS api) with HTTP or HTTPS protocols.
How Secure is the HTTP Proxy
You can access HTTPS services via the HTTP proxy whilst still getting full SSL/TLS security. When you make a request via the proxy to an HTTPS endpoint your client will transparently issue a CONNECT request rather than a basic GET or POST request.
On receipt of this CONNECT request the proxy will open a tunnel between your client and the endpoint, allowing your client to negotiate a standard SSL session with the endpoint. Once negotiated all traffic sent between your client and the endpoint will be encrypted as if you had connected directly with them.
For HTTPS Proxy, check out [XL Routes Shield] (https://elements.heroku.com/addons/xlroutesshield){:target=”_blank”}. With the HTTPS Proxy your initial CONNECT request will be also encrypted, this protects proxy credentials and remote hostname but requires an additional TLS handshake.
HTTP Proxy with Ruby/Rails
Ruby has an excellent REST client that easily allows you to specify an HTTP proxy. You can run the below example in an irb session and verify that the final IP returned is one of your two static IPs.
require "rest-client"
RestClient.proxy = ENV["xlroutesSTATIC_URL"]
res = RestClient.get("http://ip.xlroutes.com")
puts "Your Static IP is: #{res.body}"
HTTP Proxy with Python/Django
Using with the Requests library
Requests is a great HTTP library for Python. It allows you to specify an authenticated proxy on a per request basis so you can pick and choose when to route through your static IP.
import requests
import os
proxies = {
"http": os.environ['xlroutesSTATIC_URL'],
"https": os.environ['xlroutesSTATIC_URL']
}
res = requests.get("http://ip.xlroutes.com/", proxies=proxies)
print(res.text)
Using with urllib2
urllib2 is a more basic library used for HTTP communication in Python and uses environment variables to set a proxy service.
In your application initialization you should set the
http_proxy
variable to match the
xlroutesSTATIC_URL
.
# Assign XLRoutes to your environment's http_proxy variable
os.environ['http_proxy'] = os.environ['xlroutesSTATIC_URL']
To test in the Python interpreter
import urllib2, os
os.environ['http_proxy'] = os.environ['xlroutesSTATIC_URL']
url = 'http://ip.xlroutes.com/'
proxy = urllib2.ProxyHandler()
opener = urllib2.build_opener(proxy)
in_ = opener.open(url)
res = in_.read()
print(res)
HTTP Proxy with Node.js
Accessing an HTTP API with Node.js
To access an HTTP API you can use the standard HTTP library in Node.js but must ensure you correctly set the “Host” header to your target hostname, not the proxy hostname.
var http, options, proxy, url;
http = require("http");
url = require("url");
proxy = url.parse(process.env.xlroutesSTATIC_URL);
target = url.parse("http://ip.xlroutes.com/");
options = {
hostname: proxy.hostname,
port: proxy.port || 80,
path: target.href,
headers: {
"Proxy-Authorization": "Basic " + (new Buffer(proxy.auth).toString("base64")),
"Host" : target.hostname
}
};
http.get(options, function(res) {
res.pipe(process.stdout);
return console.log("status code", res.statusCode);
});
Accessing an HTTPS API with Node.js
The standard Node.js HTTPS module does not handle making requests through a proxy very well. If you need to access an HTTPS API we recommend using the Request module (npm install request).
var request = require('request');
var options = {
proxy: process.env.xlroutesSTATIC_URL,
url: 'https://api.github.com/repos/joyent/node',
headers: {
'User-Agent': 'node.js'
}
};
function callback(error, response, body) {
if (!error && response.statusCode == 200) {
console.log(body);
}
}
request(options, callback);
HTTP Proxy with PHP
PHP cURL is the easiest way to make HTTP requests via XL Routes Static. This example assumes that you have set the xlroutesSTATIC_URL environment variable which is automatically set for you when you provision the add-on.
The IP address printed on screen will be one of your two static IP addresses, run it a couple of times and you’ll probably see the other one too.
<?php
function lookup(){
$xlroutes_env = getenv("xlroutesSTATIC_URL");
$xlroutes = parse_url($xlroutes_env);
$proxyUrl = $xlroutes['host'].":".$xlroutes['port'];
$proxyAuth = $xlroutes['user'].":".$xlroutes['pass'];
$url = "http://ip.xlroutes.com/";
$ch = curl_init();
curl_setopt($ch, CURLOPT_URL, $url);
curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);
curl_setopt($ch, CURLOPT_PROXY, $proxyUrl);
curl_setopt($ch, CURLOPT_PROXYAUTH, CURLAUTH_BASIC);
curl_setopt($ch, CURLOPT_PROXYUSERPWD, $proxyAuth);
$response = curl_exec($ch);
return $response;
}
$res = lookup();
print_r($res);
?>
HTTP Proxy with Java
The JVM allows you to configure a socksProxyHost
. The example below
uses Apache HttpClient, but the same configuration applies to other JVM-based clients.
import java.net.*;
import java.io.*;
public class HelloWorld {
public static void main(String []args) throws IOException {
URL proxyUrl = new URL(System.getenv("xlroutesSTATIC_URL"));
String userInfo = proxyUrl.getUserInfo();
String user = userInfo.substring(0, userInfo.indexOf(':'));
String password = userInfo.substring(userInfo.indexOf(':') + 1);
URLConnection conn = null;
System.setProperty("http.proxyHost", proxyUrl.getHost());
System.setProperty("http.proxyPort", Integer.toString(proxyUrl.getPort()));
Authenticator.setDefault(new Authenticator() {
protected PasswordAuthentication getPasswordAuthentication() {
return new PasswordAuthentication(user, password.toCharArray());
}
});
URL url = new URL("http://ip.xlroutes.com");
conn = url.openConnection();
BufferedReader in = new BufferedReader(new InputStreamReader(conn.getInputStream()));
String inputLine;
while ((inputLine = in.readLine()) != null)
System.out.println(inputLine);
in.close();
}
}
You can check available proxy related JVM settings here.
HTTP Proxy with Clojure
The Clojure clj-http library allows you to configure a proxy for an HTTP request. The example below shows you how to use this with the add-on:
(defn get-xlroutes []
(let [proxy-uri (java.net.URI. (env :xlroutesstatic-url))]
(client/get "http://httpbin.org/ip"
{:proxy-host (.getHost proxy-uri)
:proxy-port (.getPort proxy-uri)
:headers {
"Proxy-Authorization"
(str "Basic " (.encode (sun.misc.BASE64Encoder.)
(.getBytes (.getUserInfo proxy-uri))))}})))
HTTP Proxy with Golang
For Golang, you can setup a per-request proxy in the http package like this:
proxyUrl, err := url.Parse("http://username:password@proxy.xlroutes.com:9293")
myClient := &http.Client{Transport: &http.Transport{Proxy: http.ProxyURL(proxyUrl)}}
Or you can configure it for all requests like this:
proxyUrl, err := url.Parse("http://username:password@proxy.xlroutes.com:9293")
http.DefaultTransport = &http.Transport{Proxy: http.ProxyURL(proxyUrl)}```
SOCKS5 Proxy
SOCKS5 is a very flexible TCP level tunneling protocol which works on a per host basis and is compatible with all programming environments. XL Routes Static provides three ways to setup SOCKS5 proxy integration within your app:
- XLRoutes Tunnel, process-based tunneling program
- XLRoutes Socksify script, routing-based tunneling program
- Framework specific support for SOCKS5
QGTunnel is an extremely versatile wrapper script for your process. It allows you to map one or more local ports to route through the XLRoutes proxy servers. It supports a DNS override mode for protocols that require the hostname stay the same (ie: HTTPS) or to minimize the impact on the code. QGTunnel also supports end-to-end encryption of your tunnel data for protocols that are not encrypted (ie: redis).
Note: We recommend QGTunnel unless you need to route all traffic within the app through the SOCKS5 proxy.
QGSocksify is a routing-based tunneling program. It allows for all or some of the outgoing traffic to be routed through the proxy server based on the destination IP or IP range. Please note: This solution includes software developed by Inferno Nettverk A/S, Norway.
Additionally, many languages support SOCKS5 proxies natively or via a add-on package.
SOCKS5 Proxy with QGTunnel
To get started with the SOCKS5 proxy utilizing QGTunnel, please follow these steps:
Download QGTunnel
Download and extract the qgtunnel
in the root directory of your app:
$ curl https://s3.amazonaws.com/xlroutes/qgtunnel-latest.tar.gz | tar xz
Setup the Tunnel
Login to our Dashboard and setup the tunnel:
$ heroku addons:open xlroutesstatic
Opening xlroutesstatic for sharp-mountain-4005...
At the top right, click Settings, then Setup. On the left, click Tunnel, then Create Tunnel. This example assumes a MySQL server.
Remote Destination: tcp://hostname.for.your.server.com:3306
Local Port: 3306
Transparent: true
Encrypted: false
This setup assumes that your server is located at “hostname.for.your.server.com” and is listening on port 3306 (the default mysql port).
Use the same port for the local port, unless you are using that port on your dyno or it is below 1024, then you will have to change this to some other port (say 3307).
Transparent mode allows XLRoutes to override the DNS for hostname.for.your.server.com to 127.0.0.1, which redirects traffic to the QGTunnel software. This means you can connect to either hostname.for.your.server.com or 127.0.0.1 to connect through the QGTunnel. More information is available on transparent mode as you follow along in these instructions.
Encrypted mode can be used to encrypt data end-to-end, but if your protocol is already encrypted then you don’t need to spend time setting it up. More details on end-to-end encryption is below as you follow these instructions.
Note: Creating the tunnels in the dashboard is for convenience. See the last step (Harden your setup) for how to remove a dependency from your system.
Change your code (maybe)
You may have to change your code to connect through QGTunnel.
With transparent mode, and when using the same local and remote port, you should not have to change your code.
Without transparent mode, you will want to connect to 127.0.0.1:3306 (in this example). If you changed the local port, then you will need to change the port number to match.
Change your Procfile
(You have a procfile even if it’s not explicitly in your code base. To find it, log into the Heroku dashboard, click on the Resources tab, there you will see a list all of your dyno processes. The text you see (like web npm start) acts as your Procfile, if you do not have one explicitly in your code base.)
Modify your app Procfile to prepend the QGTunnel application to your standard commands:
Before:
web: bundle exec unicorn -p $PORT -c ./config/unicorn.rb
After:
web: bin/qgtunnel bundle exec unicorn -p $PORT -c ./config/unicorn.rb
Deploy
Commit and deploy your changes. Be sure to add bin/qgtunnel
. If you
are using transparent mode, be sure
vendor/nss_wrapper/libnss_wrapper.so
is also committed.
If problems arise
By default all fatal errors encountered by the qgtunnel
will be
logged to your Heroku logs. If this information is not enough, you can enable verbose output mode by setting
QGTUNNEL_DEBUG
environment variable to
true
.
$ heroku config:set QGTUNNEL_DEBUG=true
Send any information in the logs (please redact any credentials, including your XLRoutes connection URL) to support@xlroutes.com.
IMPORTANT: Harden your setup.
This step is highly recommended as we do not have any SLA on our website, which can be out due to maintenance.
By default qgtunnel
will try to fetch configuration from the
XLRoutes API, but it also supports local configuration. You should download the configuration file from the Dashboard by
pressing Download configuration on the Tunnel page.
Place the downloaded file into the root directory of your project under the
.qgtunnel
filename, commit and deploy. With this file, your
application will not depend on the availability of our website during application startup.
Transparent Mode
If your application depends on DNS based discovery process or needs local tunnel to be resolvable via the DNS name regular tunneling mode will not be enough. For this situation you should enable transparent mode for the QGTunnel in your configuration. In transparent mode, QGTunnel will alter DNS queries from your app to the local address.
Let’s say you want to access replicated MongoDB cluster using QGTunnel with 3 replicas located on the hosts:
rs01.mongodb.net:52115
,
rs02.mongodb.net:52115
and
rs1.mongodb.net:52115
. For this configuration you will need to
create 3 separate tunnels for each host on the port 52115
in
transparent mode. Once this is done, QGTunnel will alter DNS resolution process to resolve these host names to the appropriate
loopback address and auto discovery for your replicated cluster should work as intended.
End-to-end Encryption
Tunnels support communication over TLS encrypted connections. Encryption offers a high level of data protection: all data will
be decrypted only in the environments that you control. The remote destination that the tunnels connect to have to support TLS
encryption and have a valid certificate installed. If your remote destination doesn’t support encryption, you can use
stunnel. You can use self-signed certificates, however you have to
provide a custom root CA certificate, it will be added to the list of trusted roots in
qgtunnel
.
For example: You want to connect to the IP restricted Redis and encrypt all traffic between the Heroku app and Redis server.
Redis doesn’t support encryption, so you have to install stunnel
on
the Redis server or any other server within the same network. Typical stunnel configuration that you might want to use:
[redis]
accept = 6380
connect = 127.0.0.1:6379
cert = example.com.pem
With this configuration, stunnel will start TLS server on port 6380
,
it will handle encrypted traffic and will pass decrypted data to the Redis server on
127.0.0.1:6379
. As noted you will need a valid certificate, or you
can generate self-signed certificate:
- Generate private key and certificate for the custom
CA
:
$ openssl genrsa -out CA.key 2048
$ openssl req -x509 -new -key CA.key -out CA.cer -days 730
-
Generate
CSR
for your domain and sign it with customCA
:
$ openssl genrsa -out example.com.key 2048
$ openssl req -new -out example.com.req -key example.com.key
$ openssl x509 -req -in example.com.req -out example.com.cer -CAkey CA.key -CA CA.cer -days 365 -CAcreateserial -CAserial serial
- Create
PEM
bundle:
$ cat example.com.key example.com.cer > example.com.pem
Install example.com.pem
on stunnel server. Add
CA.cer
to your heroku repository and update
qgtunnel
command in your Procfile:
web: bin/qgtunnel -root_ca CA.cer bundle exec unicorn -p $PORT -c ./config/unicorn.rb
Finally enable encryption for your tunnel configuration on XLRoutes dashboard.
With this configuration, all the traffic handled by qgtunnel
will be
encrypted with your certificate and all data will be passing proxies in encrypted format.
Setting up MySQL access from Rails
Note: This assumes that you have already followed the steps to download and install the SOCKS5 wrapper script as detailed in the section above.
To connect to a MySQL host via the proxy you need to add an extra line to your database.yml config file to ensure no connect_timeout is set. Without this option your app will not be able to connect to the database and will hang indefinitely.
The value is deliberately left out to force the mysql2 adapter to use nil as the timeout.
connect_timeout:
Your full database.yml might look something like this (example values only).
common: &common
adapter: mysql2
username: secureuser
password: securepassword
encoding: utf8
pool: 5
connect_timeout:
development:
<<: *common
database: myapp_development
test:
<<: *common
database: myapp_test
production:
<<: *common
SOCKS5 Proxy for a MySQL Database in Node.js
To use a SOCKS5 proxy for any reason in Node.js we recommend socksjs as this is one of the only Node.js SOCKS modules to support authentication.
npm install socksjs
This sample creates a connection to a SOCKS5 connection to our proxy and uses that for all MySQL requests.
var mysql = require('mysql2'),
url = require('url'),
SocksConnection = require('socksjs');
var remote_options = {
host:'your-database.eu-west-1.rds.amazonaws.com',
port: 3306
};
var proxy = url.parse(process.env.xlroutesSTATIC_URL),
auth = proxy.auth,
username = auth.split(':')[0],
pass = auth.split(':')[1];
var sock_options = {
host: proxy.hostname,
port: 1080,
user: username,
pass: pass
};
var sockConn = new SocksConnection(remote_options, sock_options);
var dbConnection = mysql.createConnection({
user: 'dbuser',
database: 'dbname',
password: 'dbpassword',
stream: sockConn
});
dbConnection.query('SELECT 1+1 as test1;', function(err, rows, fields) {
if (err) throw err;
console.log('Result: ', rows);
sockConn.dispose();
});
dbConnection.end();
Inbound Proxy
The Inbound Proxy allows you to always access your Heroku app on a Static IP address. This feature is available on our Micro plan and above.
Once you have provisioned the add-on you just need to visit the XL Routes Static Dashboard to complete your setup. You can do this from your Heroku Dashboard by clicking on our icon or from your command line:
$ heroku addons:open xlroutesstatic
Opening xlroutesstatic for sharp-mountain-4005...
Visit the Setup page and enter in the full URL of your Heroku app, e.g. http://cool-api.herokuapp.com
We then create for you a unique URL that you can use to access your web application: e.g. a62b1d0b4983db763450411fd393b3ce-eu-west-1.getstatica.com.
This corresponds to a DNS A name record that resolves to your two XL Routes Static IPs. You should include both IP addresses in any firewall rules or allowlists.
Open this URL in your browser and you should see your own web application. If you are using HTTPS or filter based on the domain name, you may need to add a custom domain in our dashboard. Follow the instructions on the dashboard to setup your custom domain.
Note: Please note it may take up to 10 minutes for configuration and DNS changes to propagate.
In your firewall you can now just open access to the two XL Routes Static IPs in order to work with your cloud app.
SSL setup
Our self-service automated setup supports SSL by default. For custom domains you have to upload valid certificate to enable SSL. In both cases SSL will be terminated on XLRoutes proxies.
Monitoring & Logging
Real-time and historical usage stats can be displayed on the XL Routes Static Dashboard accessible from your Heroku Dashboard.
Dashboard
The XL Routes Static dashboard allows you to view your real-time and historical usage of every API.
The dashboard can be accessed via the CLI:
$ heroku addons:open xlroutesstatic
Opening xlroutesstatic for sharp-mountain-4005...
or by visiting the Heroku apps web interface and selecting the application in question. Select XL Routes Static from the Add-ons menu.
Local setup
Environment setup
After provisioning the add-on you can locally replicate the config vars so your development environment can operate against the service. This should be used for initial testing only as usage will count against your daily limits.
Though less portable it’s also possible to set local environment variables using
export xlroutesSTATIC_URL=value
.
Use Heroku Local to configure, run and manage process types specified in your app’s
Procfile. Heroku Local reads configuration variables from a .env file. Use the following command
to add the xlroutesSTATIC_URL
value retrieved from heroku config to
.env
.
$ heroku config -s | grep xlroutesSTATIC_URL >> .env
$ more .env
Note: Credentials and other sensitive configuration values should not be committed to source-control. In Git
exclude the .env file with: echo .env >> .gitignore
.
FAQs
Do you offer Dedicated Static IPs?
Yes - dedicated IP addresses are available on request for subscriptions on the Enterprise plan and above. As they require dedicated infrastructure we only provision these on request so please contact us if you want a dedicated Static IP address.
What happens when I reach my usage limit?
To make sure we grow in harmony with your application XL Routes Static operates initially with a soft limit. When you reach your plan’s monthly usage limit your requests will continue going through but we will reach out to you via e-mail to ask that you upgrade your plan.
If you repeatedly exceed your limits without upgrading then hard limits may be placed on your account but this is a very last resort.
I’ve forgotten what my Static IPs are!
Both IPs are shown on your Dashboard which you can get to either from your Heroku Apps page or via the CLI.
Can I access your Brazilian instance in Sao Paulo?
XL Routes Static is deployed in the Heroku US & Europe regions and you are automatically assigned to an instance in the same region as your app. If you would like to use our South America instance located in Sao Paulo please contact us and we can manually relocate you. This will change your Static IP address.
$ heroku addons:open xlroutesstatic
Opening xlroutesstatic for sharp-mountain-4005...
Why have you given me two Static IP addresses?
We believe all apps should be built for scalability and high availability. Our commitment to this means we only provide load balanced, high availability services. Load balancing our nodes allows one node to fail or be brought down for maintenance with no impact to your application. Each IP you are given represents one proxy node that is running behind a load balancer.
If you want to use just one IP address, you can change your xlroutesSTATIC_URL environment variable to point to one of the two IPs following this format:
http://USERNAME:PASSWORD@IPADDRESS:9293
Contact support@xlroutes.com if you have any issues utilizing just one of the two IPs.
What region does XL Routes Static run in?
We have instances in the US, EU, SA, EA, and AP regions. When you provision the add-on you will be assigned static IPs in the same region as your Heroku app ensuring we can always process your requests with ultra low latency.
Can I access MySQL or Postgres through this?
Yes we have many users doing this. The easiest way for most languages is to use our SOCKS5 proxy wrapper(installation details higher up the page). If you are using Node.js you can also configure the SOCKS5 proxy in your Javascript code without using the wrapper (details also on this page).
Migrating between plans
Note: Application owners can migrate at any time with no interruption to your service.
Use the heroku addons:upgrade
command to migrate to a new plan.
$ heroku addons:upgrade xlroutesstatic:large
-----> Upgrading xlroutesstatic:large to sharp-mountain-4005... done, v18 ($90/mo)
Your plan has been updated to: xlroutesstatic:large
Note: The xlroutesSTATIC_URL will revert back to it’s original setting when you change plans. Be prepared to reset this if you have changed it.
Removing the add-on
XL Routes Static can be removed via the CLI.
Warning: This will destroy all associated data and cannot be undone!
$ heroku addons:destroy xlroutesstatic
-----> Removing xlroutesstatic from sharp-mountain-4005... done, v20 (free)
Privacy - GDPR and CCPA
All three XLRoutes services are a GDPR and CCPA compliant.
Please review our Privacy Policy and GDPR/CCPA compliance information at [xlroutes.com’s Privacy Policy page] (https://www.xlroutes.com/privacy){:target=”_blank”}.
In addition, we also answer many questions around Privacy, Security, and GDPR at [xlroutes.com FAQ’s] (https://www.xlroutes.com/privacy-security-and-gdpr-faqs){:target=”_blank”}.
If you need a DPA for your customers, or from us as a sub-contractor of your services, please contact us via our Support channel (details below) so we can get you the right DPA contract for your review.
Support
All XL Routes Static support and runtime issues should be submitted to our Support.