# Connection Pooling
⚠ Work in Progress ⚠️
There's more to document here. In the meantime, you can check our community forum for answers.
Want to contribute? Redwood welcomes contributions and loves helping people become contributors. You can edit this doc here. If you have any questions, just ask for help! We're active on the forums and on discord.
Production Redwood apps should enable connection pooling in order to properly scale with your Serverless functions.
# Prisma Pooling with PgBouncer
PgBouncer holds a connection pool to the database and proxies incoming client connections by sitting between Prisma Client and the database. This reduces the number of processes a database has to handle at any given time. PgBouncer passes on a limited number of connections to the database and queues additional connections for delivery when space becomes available.
To use Prisma Client with PgBouncer from a serverless function, add the ?pgbouncer=true
flag to the PostgreSQL connection URL:
postgresql://USER:PASSWORD@HOST:PORT/DATABASE?pgbouncer=true
Typically, your PgBouncer port will be 6543 which is different than the Postgres default of 5432.
Note that since Prisma Migrate uses database transactions to check out the current state of the database and the migrations table, if you attempt to run Prisma Migrate commands in any environment that uses PgBouncer for connection pooling, you might see an error.
To work around this issue, you must connect directly to the database rather than going through PgBouncer when migrating.
For more information on Prisma and PgBouncer, please refer to Prisma's Guide on Configuring Prisma Client with PgBouncer.
# Supabase
For Postgres running on Supabase see: PgBouncer is now available in Supabase.
All new Supabase projects include connection pooling using PgBouncer.
We recommend that you connect to your Supabase Postgres instance using SSL which you can do by setting sslmode
to require
on the connection string:
// not pooled typically uses port 5432
postgresql://postgres:mydb.supabase.co:5432/postgres?sslmode=require
// pooled typically uses port 6543
postgresql://postgres:mydb.supabase.co:6543/postgres?sslmode=require&pgbouncer=true
# Heroku
For Postgres, see Postgres Connection Pooling.
Heroku does not officially support MySQL.
# Digital Ocean
For Postgres, see How to Manage Connection Pools
Connection Pooling for MySQL is not yet supported.
# AWS
Use Amazon RDS Proxy for MySQL or PostgreSQL.
From the AWS Docs:
Your RDS Proxy must be in the same VPC as the database. The proxy can't be publicly accessible.
Because of this limitation, with out-of-the-box configuration, you can only use RDS Proxy if you're deploying your Lambda Functions to the same AWS account. Alternatively, you can use RDS directly, but you might require larger instances to handle your production traffic and the number of concurrent connections.
# Why Connection Pooling?
Relational databases have a maximum number of concurrent client connections.
- Postgres allows 100 by default
- MySQL allows 151 by default
In a traditional server environment, you would need a large amount of traffic (and therefore web servers) to exhaust these connections, since each web server instance typically leverages a single connection.
In a Serverless environment, each function connects directly to the database, which can exhaust limits quickly. To prevent connection errors, you should add a connection pooling service in front of your database. Think of it as a load balancer.