Supabase Managed Postgres in private alpha

Supabase is GA now and from their blog post they will do a Fly announcement this week :slight_smile:

2 Likes

Folks, Supabase on Fly.io is now in public beta. Here’s the post!

2 Likes

When I spin up a database in Fly I get a DATABASE_URL and DATABASE_POOLER_URL. How can I get a service role key, database password, and project ID given that information? I’m hoping to do this all through scripting.

Sorry to reiterate on this, but has there been any movement here? Any tutorial or blog post?

I envision something more reliable than just doing a pg_dump and pg_restore. Maybe setting up a logical replication, then switch.

1 Like

Actually, this makes me believe that securely using Supabase as public db with Fly.io might not be feasible at all. Since Fly.io doesn’t offer static outbound IPs, configuring network restrictions becomes impossible (unless you another 3rd party https://usefixie.com)

There’s no official tooling for migration, yet. However, setting up logical replication is pretty straightforward, as you can see in this recently minted guide.

We’d love to write something up, or even work on tooling to automate a migration, but we’re now focused on reliability. Once we get to beta, we can revisit this topic.

Thank you!

I looked into logical replication, of course, but it seems it’s not supported from the Supabase side: Roles, superuser access and unsupported operations | Supabase Docs

or is there some special setup/environment for Fly customers?

Yes, you’re right, I had forgotten about this change. There’s no special setup, but we’re discussing the possibility of opening it up for the db initialization phase.

1 Like

These are on the horizon, actually… They were mentioned recently in the (excellent but much overlooked) Infrastructure Log:

Steve has had a fun week. He’s working on shipping (you heard it here first) static IP address assignments for individual Fly Machines — this means Fly Machines can make direct requests to the Internet (for instance, to internal on-prem APIs) with predictable IP addresses.

And subsequently…

Steve finished up the provisioning tooling for the fou-tunnel-and-SNAT monstrosity that we talked about last week: giving Fly Machines static IP addresses, for people who talk to IP-restricted 3rd party APIs.

Whether or not it helps with security, :black_cat:, it definitely will improve compatibility.

Would be awesome if these were cross posted to the forum so we can be notified.

1 Like

Oh this is great news! Would still be nice if we could run it from within our fly network obviously so it’s not even open to the Internet but I’ll take static IPs

1 Like