kisenon

Connection strings

Format, TLS, role and password rules for Kisenon endpoints.

Every Kisenon endpoint exposes a standard postgresql:// URI:

postgresql://<role>:<pwd>@<endpoint_id>.kisenon.com:5432/<database>?sslmode=require

Components

FieldMeaning
<role>A Postgres role created on the branch. The endpoint card shows the auto-created app role; you can create more via SQL.
<pwd>The role's password. Surfaced once at creation; rotate via SQL.
<endpoint_id>Stable per endpoint, e.g. ep_4f3c12a9b8e6. SNI-routed.
kisenon.comThe data-plane apex. Routes via TLS SNI to your endpoint.
5432Standard Postgres port.
<database>Default main; create more with CREATE DATABASE.
?sslmode=requireTLS is mandatory. verify-full also works and is recommended.

TLS

Endpoints terminate TLS with a Let's Encrypt certificate for *.kisenon.com. Standard Postgres clients verify against the system trust store; no custom CA needed.

sslmode=verify-full is recommended for production code. It checks the certificate chain and the hostname.

Pooling

Each endpoint accepts up to ~100 concurrent connections by default. For short-lived connections (serverless functions, edge runtimes), use a client-side pooler like PgBouncer or your driver's built-in pool.

A managed pooler endpoint is on the roadmap; until then, treat your endpoint as a single Postgres instance.

Multiple endpoints

You can spawn multiple endpoints on the same branch. They share storage but have independent connection limits and caches. Use them to isolate:

  • App vs analytics traffic.
  • Read replicas (any endpoint on a branch is essentially a read replica if you don't write to it).
  • Per-environment endpoints on dev branches.