How It Works

Three Levels of Discovery

Squish uses statistical and ML methods to find relationships other tools miss. We prefer deterministic, explainable approaches over black-box AI.

Discovery Methods

Each level builds on the previous. Most databases have more relationships than teams realize, hidden in undeclared patterns and data overlap.

Level 1

Constraint Extraction

Surface what databases already know. Extract existing foreign keys, primary keys, unique constraints, and indexes from database metadata.

  • Declared foreign keys
  • Primary key detection
  • Unique constraint mapping
  • Index analysis
Level 2

Column Inference

Match columns by naming patterns and types. When user_id appears in multiple tables, infer the relationship across naming conventions.

  • Pattern matching (snake_case, camelCase)
  • Type compatibility analysis
  • Naming convention detection
  • Cross-schema matching
Level 3

Statistical Analysis

Compare actual data values across columns. Sample data, compute overlap statistics, and detect UUID patterns to find hidden relationships.

  • Value overlap detection
  • UUID pattern matching
  • Cardinality analysis
  • Confidence scoring

Database Support

Connect to your databases through a unified interface. Cross-database discovery finds relationships that span different services.

Relational

  • PostgreSQL
  • MySQL
  • SQL Server
  • SQLite

Cloud Warehouses

  • Snowflake
  • BigQuery
  • Redshift
  • Databricks

NoSQL

  • MongoDB

Security Model

Squish is designed for enterprise security requirements from day one. Your data stays in your databases.

Read-Only Access

Squish never writes to your databases. We only read schema metadata and sample data for statistical analysis.

Configurable Sampling

Control exactly how much data Squish can access. Set sample sizes per table or disable sampling entirely.

Encrypted Credentials

Database credentials are encrypted with customer-specific keys using GCP KMS. Never stored in plain text.

Audit Logging

Complete audit trail of who accessed what data, when, and from where. SOC2 compliance ready.

See it in action

Connect your database and discover relationships in minutes. Read-only access, configurable confidence thresholds.