You applications need databases to store your data. As we believe your data should be located geographically close to your application servers we support the most common types of database.
We ensure your database is located at the same location as your applications. It provides the best performance and latency possible. Moreover you know where your data are.
Backups retention policy
If your database is in a paid plan (i.e. it’s not “free plan”), we’ll automatically make periodic backups of your database on a daily basis, at around 1:00 AM Central European Time (CET or UTC+0100). The time of your daily backup is configurable via the web dashboard of your database or using the CLI.
We keep a limited amount of backups depending on your database plan. A daily backup is retained for the last 7 days. That means that 7 backups will exist, one for each of the last 7 days. A weekly backup means that only one backup is saved over a 7 days period. A monthly backup means that only 1 backup is saved over the course of a month.
|Plan||Weekly Backups Retained||Monthly Backup Retained|
|Starter||4 weeks||0 months|
|Business||8 weeks||12 months|
You can also manually trigger a backup for your database at any time you want. The number of manual backups that you can retain is limited by your plan:
Encryption at Rest
All databases created after the 6th of January 2019 have encryption at rest enabled. In other words, all your data are encrypted before being stored on disk.
Encryption at rest on our database offer leverage a feature of the Linux Kernel
allowing to encrypt data at the disk level named
dm-crypt. The algorithm used
aes-xts-plain64 with a key size of 256 bytes and hashed using SHA-256. This
method is considered secured and standard in the industry. To reduce the attack
surface, each instance of each database has its own cryptographic key to protect
its data, so getting access to one key wouldn’t allow an attacker to get plain
data from another database. The keys are stored in a database which is itself
encrypted and protected by authentication.