apps/docs/content/guides/database/postgres/timeouts.mdx
Dashboard and Client queries have a max-configurable timeout of 60 seconds. For longer transactions, use Supavisor or direct connections.
</Admonition>You can change the Postgres timeout at the:
Session level settings persist only for the duration of the connection.
Set the session timeout by running:
set statement_timeout = '10min';
Because it applies to sessions only, it can only be used with connections through Supavisor in session mode (port 5432) or a direct connection. It cannot be used in the Dashboard, with the Supabase Client API, nor with Supavisor in Transaction mode (port 6543).
This is most often used for single, long running, administrative tasks, such as creating an HSNW index. Once the setting is implemented, you can view it by executing:
SHOW statement_timeout;
See the full guide on changing session timeouts.
This works with the Database REST API when called from the Supabase client libraries:
create or replace function myfunc()
returns void as $$
select pg_sleep(3); -- simulating some long-running process
$$
language sql
set statement_timeout TO '4s'; -- set custom timeout
This is mostly for recurring functions that need a special exemption for runtimes.
This sets the timeout for a specific role.
The default role timeouts are:
anon: 3sauthenticated: 8sservice_role: none (defaults to the authenticator role's 8s timeout if unset)postgres: none (capped by default global timeout to be 2min)Run the following query to change a role's timeout:
alter role example_role set statement_timeout = '10min'; -- could also use seconds '10s'
If you are changing the timeout for the Supabase Client API calls, you will need to reload PostgREST to reflect the timeout changes by running the following script:
NOTIFY pgrst, 'reload config';
Unlike global settings, the result cannot be checked with SHOW statement_timeout. Instead, run:
select
rolname,
rolconfig
from pg_roles
where
rolname in (
'anon',
'authenticated',
'postgres',
'service_role'
-- ,<ANY CUSTOM ROLES>
);
This changes the statement timeout for all roles and sessions without an explicit timeout already set.
alter database postgres set statement_timeout TO '4s';
Check if your changes took effect:
show statement_timeout;
Although not necessary, if you are uncertain if a timeout has been applied, you can run a quick test:
create or replace function myfunc()
returns void as $$
select pg_sleep(601); -- simulating some long-running process
$$
language sql;
The Supabase Dashboard contains tools to help you identify timed-out and long-running queries.
Go to the Logs Explorer, and run the following query to identify timed-out events (statement timeout) and queries that successfully run for longer than 10 seconds (duration).
select
cast(postgres_logs.timestamp as datetime) as timestamp,
event_message,
parsed.error_severity,
parsed.user_name,
parsed.query,
parsed.detail,
parsed.hint,
parsed.sql_state_code,
parsed.backend_type
from
postgres_logs
cross join unnest(metadata) as metadata
cross join unnest(metadata.parsed) as parsed
where
regexp_contains(event_message, 'duration|statement timeout')
-- (OPTIONAL) MODIFY OR REMOVE
and parsed.user_name = 'authenticator' -- <--------CHANGE
order by timestamp desc
limit 100;
Go to the Query Performance page and filter by relevant role and query speeds. This only identifies slow-running but successful queries. Unlike the Log Explorer, it does not show you timed-out queries.
Each API server uses a designated user for connecting to the database:
| Role | API/Tool |
|---|---|
supabase_admin | Used by Realtime and for project configuration |
authenticator | PostgREST |
supabase_auth_admin | Auth |
supabase_storage_admin | Storage |
supabase_replication_admin | Synchronizes Read Replicas |
postgres | Supabase Dashboard and External Tools (e.g., Prisma, SQLAlchemy, PSQL...) |
| Custom roles | External Tools (e.g., Prisma, SQLAlchemy, PSQL...) |
Filter by the parsed.user_name field to only retrieve logs made by specific users:
-- find events based on role/server
... query
where
-- find events from the relevant role
parsed.user_name = '<ROLE>'