Access Your Database
This page is a high-level overview of the three maintenance access methods for Scalingo databases.
For detailed setup, limits, and troubleshooting steps, use the dedicated guide linked in each section.
| Method | Typical usage | Architecture models |
|---|---|---|
| Remote Console | Quick interactive maintenance from app workflows (one-off) | Only Shared Resources |
| Encrypted Tunnel | Workstation access while keeping the database private | Only Shared Resources |
| Direct Access | Client/service connects directly with the connection string | Both Shared and Dedicated Resources |
Interactive Remote Console
Remote Console is available for supported Shared Resources databases only (PostgreSQL, MySQL, MongoDB, Redis, InfluxDB). It is not available for OpenSearch or Dedicated Resources databases.
# Open a console using the `mysql` client
scalingo --app my-app mysql-console
# Open a console using the `psql` client
scalingo --app my-app pgsql-console
# Open a console using the `redis-cli` client
scalingo --app my-app redis-console
Detailed setup, compatibility, and supported tools: Interactive Remote Console.
Encrypted Tunnel
Encrypted Tunnel is available on Shared Resources and exposes the remote
database on 127.0.0.1:<localport> on your workstation.
Use this method when you need temporary access from your workstation while
keeping the database private.
scalingo --app my-app db-tunnel SCALINGO_POSTGRESQL_URL
For Shared Resources, this is the most secure way to connect from outside Scalingo because it avoids exposing the database on the public Internet.
Detailed setup, OpenSSH mode, and client usage: Encrypted Tunnel Guide.
Direct Access
Use the database connection string directly from your client when tunnel or console workflows are not applicable. Use this method when a client or service must connect directly to the database endpoint without maintaining an SSH tunnel.
On Shared Resources, direct connection from outside Scalingo requires:
- Enabling Force TLS.
- Enabling Internet Accessibility.
On Dedicated Resources, direct connection is the standard remote access method and is controlled by firewall allowlists (deny by default).
For network exposure rules, see Database Network Exposure.
Access the same database from multiple applications
To share a database across multiple applications, add the database connection string as an environment variable in each application that needs access.
In the application where the database add-on is attached, the connection string
is available as an environment variable (for PostgreSQL, typically
SCALINGO_POSTGRESQL_URL). This value includes the host and credentials, so
treat it as a secret
Copy the value, then create an environment variable in the other application and paste it there. Restart the application to apply the change.