Scalingo database add-ons

You applications need databases to store your data. As we believe your data should be located geographically close to your application servers we support the most common types of database.

We ensure your database is located at the same location as your applications. It provides the best performance and latency possible. Moreover you know where your data are.

Database types

SQL

NoSQL

Backups retention policy

If your database is in a paid plan (i.e. it’s not “free plan”), we’ll automatically make periodic backups of your database on a daily basis, at around 1:00 AM Central European Time (CET or UTC+0100). The time of your daily backup is configurable via the web dashboard of your database or using the CLI.

We keep a limited amount of backups depending on your database plan. A daily backup is retained for the last 7 days. That means that 7 backups will exist, one for each of the last 7 days. A weekly backup means that only one backup is saved over a 7 days period. A monthly backup means that only 1 backup is saved over the course of a month.

Plan Weekly Backups Retained Monthly Backup Retained
Sandbox/Free N/A N/A
Starter 4 weeks 0 months
Business 8 weeks 12 months

You can also manually trigger a backup for your database at any time you want. The number of manual backups that you can retain is limited by your plan:

Plan Backups Retained
Sandbox/Free N/A
Starter 10
Business 50

Encryption at Rest

All databases created after the 6th of January 2019 have encryption at rest enabled. In other words, all your data are encrypted before being stored on disk.

Encryption at rest on our database offer leverage a feature of the Linux Kernel allowing to encrypt data at the disk level named dm-crypt. The algorithm used is aes-xts-plain64 with a key size of 256 bytes and hashed using SHA-256. This method is considered secured and standard in the industry. To reduce the attack surface, each instance of each database has its own cryptographic key to protect its data, so getting access to one key wouldn’t allow an attacker to get plain data from another database. The keys are stored in a database which is itself encrypted and protected by authentication.


mode_edit Suggest edits