PostgreSQL (Database service)
Back to home
On this page
PostgreSQL is a high-performance, standards-compliant relational SQL database.
See the PostgreSQL documentation for more information.
Supported versions
You can select the major version. But the latest compatible minor version is applied automatically and canโt be overridden.
Patch versions are applied periodically for bug fixes and the like. When you deploy your app, you always get the latest available patches.
- 16
- 15
- 14
- 13
- 12
Note
You can’t upgrade to PostgreSQL 12 with the postgis extension enabled.
For more details, see how to upgrade to PostgreSQL 12 with postgis.
Deprecated versions
The following versions are deprecated. They’re available, but they aren’t receiving security updates from upstream and aren’t guaranteed to work. They’ll be removed in the future, so migrate to one of the supported versions.
- 11
- 10
- 9.6
- 9.5
- 9.4
- 9.3
Relationship reference
Example information available through the PLATFORM_RELATIONSHIPS environment variable
or by running upsun relationships.
Note that the information about the relationship can change when an app is redeployed or restarted
or the relationship is changed.
So your apps should only rely on the PLATFORM_RELATIONSHIPS environment variable directly rather than hard coding any values.
{
"username": "main",
"scheme": "pgsql",
"service": "postgresql12",
"fragment": null,
"ip": "169.254.38.66",
"hostname": "zydalrxgkhif2czr3xqth3qkue.postgresql12.service._.eu-3.upsunapp.com",
"port": 5432,
"cluster": "rjify4yjcwxaa-master-7rqtwti",
"host": "postgresql.internal",
"rel": "postgresql",
"path": "main",
"query": {
"is_master": true
},
"password": "ChangeMe",
"type": "postgresql:16",
"public": false,
"host_mapped": false
} Usage example
1. Configure the service
To define the service, use
the postgresql type:
services:
# The name of the service container. Must be unique within a project.
<SERVICE_NAME>:
type: postgresql:<VERSION>Note that changing the name of the service replaces it with a brand new service and all existing data is lost. Back up your data before changing the service.
2. Add the relationship
To define the relationship, use the postgresql endpoint
:
applications:
# The name of the app container. Must be unique within a project.
<APP_NAME>:
# Relationships enable access from this app to a given service.
relationships:
<RELATIONSHIP_NAME>: "<SERVICE_NAME>:postgresql"
services:
# The name of the service container. Must be unique within a project.
<SERVICE_NAME>:
type: postgresql:<VERSION>You can define <SERVICE_NAME> and <RELATIONSHIP_NAME> as you like, but it’s best if they’re distinct.
With this definition, the application container (<APP_NAME>) now has access to the service via the relationship <RELATIONSHIP_NAME>.
For PHP, enable the extension for the service:
applications:
# The name of the app container. Must be unique within a project.
<APP_NAME>:
# PHP extensions.
runtime:
extensions:
- pdo_pgsql
# Relationships enable access from this app to a given service.
relationships:
<RELATIONSHIP_NAME>: "<SERVICE_NAME>:postgresql"
services:
# The name of the service container. Must be unique within a project.
<SERVICE_NAME>:
type: postgresql:<VERSION> Example Configuration
App and Service configuration
applications:
# The name of the app container. Must be unique within a project.
myapp:
# Relationships enable access from this app to a given service.
relationships:
postgresdatabase: "dbpostgres:postgresql"
services:
# The name of the service container. Must be unique within a project.
dbpostgres:
type: postgresql:16 Use in app
To use the configured service in your app, add a configuration file similar to the following to your project.
applications:
# The name of the app container. Must be unique within a project.
myapp:
# The location of the application's code.
source:
root: "myapp"
# Relationships enable an app container's access to a service.
relationships:
postgresdatabase: "dbpostgres:postgresql"
services:
# The name of the service container. Must be unique within a project.
dbpostgres:
type: postgresql:16This configuration defines a single application myapp, whose source code exists in the directory <PROJECT_ROOT>/myapp, and has been provided access to the service (dbpostgres) via the relationship postgresdatabase.
From this, myapp can retrieve access credentials to the service through the environment variable PLATFORM_RELATIONSHIPS.
That variable is a base64-encoded JSON object, but can be decoded at runtime (using the built-in tool jq) to provide more accessible environment variables to use within the application itself:
# Decode the built-in credentials object variable.
export RELATIONSHIPS_JSON=$(echo $PLATFORM_RELATIONSHIPS | base64 --decode)
# Set environment variables for individual credentials.
export DB_CONNECTION=="$(echo $RELATIONSHIPS_JSON | jq -r '.postgresdatabase[0].scheme')"
export DB_USERNAME="$(echo $RELATIONSHIPS_JSON | jq -r '.postgresdatabase[0].username')"
export DB_PASSWORD="$(echo $RELATIONSHIPS_JSON | jq -r '.postgresdatabase[0].password')"
export DB_HOST="$(echo $RELATIONSHIPS_JSON | jq -r '.postgresdatabase[0].host')"
export DB_PORT="$(echo $RELATIONSHIPS_JSON | jq -r '.postgresdatabase[0].port')"
export DB_DATABASE="$(echo $RELATIONSHIPS_JSON | jq -r '.postgresdatabase[0].path')"
# Surface connection string variable for use in app.
export DATABASE_URL="${DB_CONNECTION}://${DB_USERNAME}:${DB_PASSWORD}@${DB_HOST}:${DB_PORT}/${DB_DATABASE}"The above file โ .environment in the myapp directory โ is automatically sourced by Upsun into the runtime environment, so that the variable DATABASE_URL can be used within the application to connect to the service.
Note that DATABASE_URL, and all Upsun-provided environment variables like PLATFORM_RELATIONSHIPS, are environment-dependent. Unlike the build produced for a given commit, they can’t be reused across environments and only allow your app to connect to a single service instance on a single environment.
A file very similar to this is generated automatically for your when using the upsun ify command to migrate a codebase to Upsun.
Access the service directly
Access the service using the Upsun CLI by running upsun sql.
You can also access it from your app container via SSH.
From your relationship data, you need: username, host, and port.
Then run the following command:
psql -U USERNAME -h HOST -p PORTUsing the values from the example, that would be:
psql -U main -h postgresql.internal -p 5432Note that the information about the relationship can change when an app is redeployed or restarted
or the relationship is changed.
So your apps should only rely on the PLATFORM_RELATIONSHIPS environment variable directly rather than hard coding any values.
Exporting data
The easiest way to download all data in a PostgreSQL instance is with the Upsun CLI. If you have a single SQL database, the following command exports all data using the pg_dump command to a local file:
upsun db:dumpIf you have multiple SQL databases it prompts you which one to export. You can also specify one by relationship name explicitly:
upsun db:dump --relationship databaseBy default the file is uncompressed. If you want to compress it, use the --gzip (-z) option:
upsun db:dump --gzipYou can use the --stdout option to pipe the result to another command. For example, if you want to create a bzip2-compressed file, you can run:
upsun db:dump --stdout | bzip2 > dump.sql.bz2 Importing data
Make sure that the imported file contains objects with cleared ownership and IF EXISTS clauses. For example, you can create a DB dump with following parameters:
pg_dump --no-owner --clean --if-existsThe easiest way to load data into a database is to pipe an SQL dump through the upsun sql command, like so:
upsun sql < my_database_backup.sqlThat runs the database backup against the SQL database on Upsun. That works for any SQL file, so the usual caveats about importing an SQL dump apply (for example, it’s best to run against an empty database). As with exporting, you can also specify a specific environment to use and a specific database relationship to use, if there are multiple.
upsun sql --relationship database -e BRANCH_NAME < my_database_backup.sqlNote
Importing a database backup is a destructive operation. It overwrites data already in your database. Taking a backup or a database export before doing so is strongly recommended.
Sanitizing data
To ensure people who review code changes can’t access personally identifiable information stored in your database, sanitize your preview environments.
Multiple databases
If you are using version 10, 11, 12, 13, or later of this service,
it’s possible to define multiple databases as well as multiple users with different permissions.
To do so requires defining multiple endpoints.
Under the configuration key of your service there are two additional keys:
-
databases: This is a YAML array listing the databases that should be created. If not specified, a single database namedmainis created.Note that removing a schema from the list of
schemason further deployments results in the deletion of the schema. -
endpoints: This is a nested YAML object defining different credentials. Each endpoint may have access to one or more schemas (databases), and may have different levels of permission for each. The valid permission levels are:ro: Using this endpoint onlySELECTqueries are allowed.rw: Using this endpointSELECTqueries as well asINSERT/UPDATE/DELETEqueries are allowed.admin: Using this endpoint all queries are allowed, including DDL queries (CREATE TABLE,DROP TABLE, etc.).
Consider the following illustrative example:
services:
# The name of the service container. Must be unique within a project.
dbpostgres:
type: "postgresql:16"
configuration:
databases:
- main
- legacy
endpoints:
admin:
privileges:
main: admin
legacy: admin
reporter:
default_database: main
privileges:
main: ro
importer:
default_database: legacy
privileges:
legacy: rwThis example creates a single PostgreSQL service named dbpostgres. The server has two databases, main and legacy with three endpoints created.
admin: has full access to both databases.reporter: hasSELECTquery access to themaindatabase, but no access tolegacy.importer: hasSELECT/INSERT/UPDATE/DELETEaccess (but not DDL access) to thelegacydatabase. It doesn’t have access tomain.
If a given endpoint has access to multiple databases you should also specify which is listed by default in the relationships array. If one isn’t specified, the path property of the relationship is null. While that may be acceptable for an application that knows the name of the database it’s connecting to, automated tools like the Upsun CLI can’t access the database on that relationship. For that reason, defining the default_database property is always recommended.
Once these endpoints are defined, you need to expose them to your application as a relationship. Continuing with the above example, your relationships in .upsun/config.yaml might look like:
applications:
# The name of the app container. Must be unique within a project.
myapp:
relationships:
database: "dbpostgres:admin"
reports: "dbpostgres:reporter"
imports: "dbpostgres:importer"
services:
# The name of the service container. Must be unique within a project.
dbpostgres:
type: "postgresql:16"
configuration:
databases:
- main
- legacy
endpoints:
admin:
privileges:
main: admin
legacy: admin
reporter:
default_database: main
privileges:
main: ro
importer:
default_database: legacy
privileges:
legacy: rwEach database is accessible to your application through the database, reports, and imports relationships. They’ll be available in the PLATFORM_RELATIONSHIPS environment variable and all have the same structure documented above, but with different credentials. You can use those to connect to the appropriate database with the specified restrictions using whatever the SQL access tools are for your language and application.
A service configuration without the configuration block defined is equivalent to the following default values:
services:
# The name of the service container. Must be unique within a project.
dbpostgres:
type: "postgresql:16"
configuration:
databases:
- main
endpoints:
postgresql:
default_database: main
privileges:
main: adminIf you do not define database but endpoints are defined, then the single database main is created with the following assumed configuration:
services:
# The name of the service container. Must be unique within a project.
dbpostgres:
type: "postgresql:16"
configuration:
databases:
- main
endpoints: <your configuration>Alternatively, if you define multiple databases but no endpoints, a single user main is created with admin access to each of your databases, equivalent to the configuration below:
services:
# The name of the service container. Must be unique within a project.
dbpostgres:
type: "postgresql:16"
configuration:
databases:
- firstdb
- seconddb
- thirddb
endpoints:
main:
firstdb: admin
seconddb: admin
thirddb: admin Password generation
When you connect your app to a database, an empty password is generated for the database by default. This can cause issues with your app.
To generate real passwords for your database, define custom endpoints in your service configuration. For each custom endpoint you create, you get an automatically generated password, similarly to when you create multiple databases. Note that you can’t customize these automatically generated passwords.
After your custom endpoints are exposed as relationships in your app configuration,
you can retrieve the password for each endpoint
through the PLATFORM_RELATIONSHIPS environment variable within your application containers.
The password value changes automatically over time, to avoid downtime its value has to be read dynamically by your app.
Globally speaking, having passwords hard-coded into your codebase can cause security issues and should be avoided.
When you switch from the default configuration with an empty password to custom endpoints, make sure your service name remains unchanged. Failure to do so results in the creation of a new service, which removes any existing data from your database.
Service timezone
To change the timezone for the current session, run SET TIME ZONE TIMEZONE;.
Extensions
Upsun supports a number of PostgreSQL extensions. To enable them, list them under the configuration.extensions key in your .upsun/config.yaml file, like so:
services:
# The name of the service container. Must be unique within a project.
dbpostgres:
type: "postgresql:16"
configuration:
extensions:
- pg_trgm
- hstoreIn this case, you have pg_trgm installed, providing functions to determine the similarity of text based on trigram matching, and hstore providing a key-value store.
Available extensions
The following is the extensive list of supported extensions. Note that you can’t currently add custom extensions not listed here.
address_standardizer- Used to parse an address into constituent elements. Generally used to support geocoding address normalization step.address_standardizer_data_us- For standardizing addresses based on US dataset exampleadminpack- administrative functions for PostgreSQLautoinc- functions for auto-incrementing fieldsbloom- bloom access method - signature file based index (requires 9.6 or higher)btree_gin- support for indexing common data types in GINbtree_gist- support for indexing common data types in GiSTchkpass- data type for auto-encrypted passwordscitext- data type for case-insensitive character stringscube- data type for multidimensional cubesdblink- connect to other PostgreSQL databases from within a databasedict_int- text search dictionary template for integersdict_xsyn- text search dictionary template for extended synonym processingearthdistance- calculate great-circle distances on the surface of the Earthfile_fdw- foreign-data wrapper for flat file accessfuzzystrmatch- determine similarities and distance between stringshstore- data type for storing sets of (key, value) pairsinsert_username- functions for tracking who changed a tableintagg- integer aggregator and enumerator (obsolete)intarray- functions, operators, and index support for 1-D arrays of integersisn- data types for international product numbering standardslo- Large Object maintenanceltree- data type for hierarchical tree-like structuresmoddatetime- functions for tracking last modification timepageinspect- inspect the contents of database pages at a low levelpg_buffercache- examine the shared buffer cachepg_freespacemap- examine the free space map (FSM)pg_prewarm- prewarm relation data (requires 9.6 or higher)pg_stat_statements- track execution statistics of all SQL statements executedpg_trgm- text similarity measurement and index searching based on trigramspg_visibility- examine the visibility map (VM) and page-level visibility info (requires 9.6 or higher)pgcrypto- cryptographic functionspgrouting- pgRouting Extension (requires 9.6 or higher)pgrowlocks- show row-level locking informationpgstattuple- show tuple-level statisticsplpgsql- PL/pgSQL procedural languagepostgis- PostGIS geometry, geography, and raster spatial types and functionspostgis_sfcgal- PostGIS SFCGAL functionspostgis_tiger_geocoder- PostGIS tiger geocoder and reverse geocoderpostgis_topology- PostGIS topology spatial types and functionspostgres_fdw- foreign-data wrapper for remote PostgreSQL serversrefint- functions for implementing referential integrity (obsolete)seg- data type for representing line segments or floating-point intervalssslinfo- information about SSL certificatestablefunc- functions that manipulate whole tables, includingcrosstabtcn- Triggered change notificationstimetravel- functions for implementing time traveltsearch2- compatibility package for pre-8.3 text search functions (obsolete, only available for 9.6 and 9.3)tsm_system_rows- TABLESAMPLE method which accepts number of rows as a limit (requires 9.6 or higher)tsm_system_time- TABLESAMPLE method which accepts time in milliseconds as a limit (requires 9.6 or higher)unaccent- text search dictionary that removes accentsuuid-ossp- generate universally unique identifiers (UUIDs)vector- Open-source vector similarity search for PostgreSQL 11+xml2- XPath querying and XSLT
Note
You can’t upgrade to PostgreSQL 12 with the postgis extension enabled.
For more details, see how to upgrade to PostgreSQL 12 with postgis.
Notes
Could not find driver
If you see this error: Fatal error: Uncaught exception 'PDOException' with message 'could not find driver', this means you are missing the pdo_pgsql PHP extension. You need to enable it in your .upsun/config.yaml (see above).
Upgrading
PostgreSQL 10 and later include an upgrade utility that can convert databases from previous versions to version 10 or later. If you upgrade your service from a previous version of PostgreSQL to version 10 or above, it upgrades automatically.
The utility can’t upgrade PostgreSQL 9 versions, so upgrades from PostgreSQL 9.3 to 9.6 aren’t supported. Upgrade straight to version 11 instead.
Note
Make sure you first test your migration on a separate branch.
Also, be sure to take a backup of your production environment before you merge this change.
Warning
Downgrading isn’t supported. If you need to downgrade, dump to SQL, remove the service, recreate the service, and import your dump.
Upgrade to PostgreSQL 12 with the postgis extension
You can’t upgrade to PostgreSQL 12 with the postgis extension enabled.
It involves a change to a major version that results in a failed deployment that requires support intervention to fix.
Upgrading from 12 to a higher version is possible.
If you need to upgrade to version 12, follow the same steps recommended for downgrading:
- Dump the database.
- Remove the service.
- Create a new service with PostgreSQL 12.
- Import the dump to that service.