WeSearch

Postgres connections now work through Sandbox firewall

·2 min read · 0 reactions · 0 comments · 2 views
#vercel#postgres#firewall#tls#database
Postgres connections now work through Sandbox firewall
⚡ TL;DR · AI summary

Vercel Sandbox now supports outbound connections to hosted Postgres databases such as Neon, Supabase, and AWS RDS by adapting its firewall to Postgres's TLS negotiation process. The update allows domain-based filtering without requiring changes to application code or database configurations. Users must ensure TLS is enabled, as domain policies rely on TLS handshake inspection.

Key facts
Original article
Vercel News
Read full at Vercel News →
Opening excerpt (first ~120 words) tap to expand

2 min readCopy URLCopied to clipboard!May 1, 2026Vercel Sandbox can now connect to hosted Postgres databases, including Neon, Supabase, AWS RDS, Nile, and Prisma Postgres. To enable a connection, add the database host to your Sandbox's allowed domains.Link to headingBackgroundWhen SNI based filtering is used with Vercel Sandbox, the sandbox firewall restricts outbound network access by checking the domain name during a connection's TLS handshake. This works seamlessly for HTTPS traffic, where the domain is visible at the start of the connection.Postgres, however, negotiates TLS differently. A Postgres client first opens a plain TCP connection and then upgrades to TLS.

Excerpt limited to ~120 words for fair-use compliance. The full article is at Vercel News.

Anonymous · no account needed
Share 𝕏 Facebook Reddit LinkedIn Threads WhatsApp Bluesky Mastodon Email

Discussion

0 comments

More from Vercel News