How It Works
Three Levels of Discovery
Squish uses statistical and ML methods to find relationships other tools miss. We prefer deterministic, explainable approaches over black-box AI.
Discovery Methods
Each level builds on the previous. Most databases have more relationships than teams realize, hidden in undeclared patterns and data overlap.
Constraint Extraction
Surface what databases already know. Extract existing foreign keys, primary keys, unique constraints, and indexes from database metadata.
- Declared foreign keys
- Primary key detection
- Unique constraint mapping
- Index analysis
Column Inference
Match columns by naming patterns and types. When user_id appears in multiple tables, infer the relationship across naming conventions.
- Pattern matching (snake_case, camelCase)
- Type compatibility analysis
- Naming convention detection
- Cross-schema matching
Statistical Analysis
Compare actual data values across columns. Sample data, compute overlap statistics, and detect UUID patterns to find hidden relationships.
- Value overlap detection
- UUID pattern matching
- Cardinality analysis
- Confidence scoring
Database Support
Connect to your databases through a unified interface. Cross-database discovery finds relationships that span different services.
Relational
- PostgreSQL
- MySQL
- SQL Server
- SQLite
Cloud Warehouses
- Snowflake
- BigQuery
- Redshift
- Databricks
NoSQL
- MongoDB
Security Model
Squish is designed for enterprise security requirements from day one. Your data stays in your databases.
Read-Only Access
Squish never writes to your databases. We only read schema metadata and sample data for statistical analysis.
Configurable Sampling
Control exactly how much data Squish can access. Set sample sizes per table or disable sampling entirely.
Encrypted Credentials
Database credentials are encrypted with customer-specific keys using GCP KMS. Never stored in plain text.
Audit Logging
Complete audit trail of who accessed what data, when, and from where. SOC2 compliance ready.
See it in action
Connect your database and discover relationships in minutes. Read-only access, configurable confidence thresholds.