The following document assumes that you understand the basics of connecting to databases on Appsmith. If not, please go over them before reading further.

Connection Settings

Appsmith needs the following parameters for connecting to a PostgreSQL database:
All required fields are suffixed with an asterisk (*).


You need to fill in the following parameters:
  • Connection Mode*: You must choose one of the following two modes:
    • Read Only: Choosing this mode gives Appsmith read-only permission on the database. This allows you to only fetch data from the database.
    • Read / Write: Choosing this mode gives Appsmith both read and write permissions on the database. This allows you to execute all CRUD queries.
  • Host Address / Port*: Fill in the database host’s address and port. If you don’t specify a port, Appsmith will try to connect to port 5432.
  • Database Name*: Fill in the name of the database that you want to connect to. This is your database’s name.


You need to fill in the following parameters:
  • Username*: Fill username required for authenticating connection requests to your database.
  • Password*: Fill password required for authenticating connection requests for the given username to the database.


The SSL Mode can be set to one of the following values:
  • Default: Same as Prefer.
  • Allow: Use SSL, only if the server insists on it.
  • Prefer: Use SSL, if the server supports it.
  • Require: Reject connection, if SSL is not available.
  • Disable: Connect without SSL, use a plain unencrypted connection.
More information available at PostgreSQL documentation.

Querying Postgres

PostgreSQL databases can be queried using the standard SQL syntax. All PostgreSQL queries return an array of objects where each object is a row returned by the query and each property in the object is a column.

Using Prepared Statement (Beta)

Normal query execution simply string concatenates the evaluated values of the javascript bindings to produce the final query. This opens up a possibility of SQL injection by merging untrusted user input to trusted data for execution. Using Prepared Statement is one strategy of mitigating this risk.
Appsmith converts the user query into a parameterized one by replacing the bindings in the query with '?'. The payload is then inserted one by one ensuring that the bindings get properly escaped and sanitized before the query is sent to the database for execution.
Let's look at a sample user query :
SELECT * FROM users WHERE id = `{{Input1.text}}` AND name = `{{Input2.text}}`;
When using Prepared Statement, the above query is converted automatically to the following by Appsmith :
SELECT * FROM users WHERE id = ? AND name = ?;
When executing this query, Appsmith first sanitizes each input to ensure protection against SQL injection. It then sets Input1.text's sanitized value as the first parameter and Input2.text's sanitized value as the second parameter.

Using Arrays in Prepared Statement

SQL IN construct is not supported out of the box in Prepared Statement. Use ANY instead.
For example for the following initial query :
SELECT * FROM users where id in ('{{ => { return }).join("','")}}')
Using ANY would require the query to be the following :
SELECT * FROM users where id = ANY ( {{ => { return }) }} )

Enable Prepared Statement

To enable Prepared Statement, go to the Settings tab and turn the toggle on for [Beta] Use Prepared Statement. Existing Postgres queries that use Javascript bindings to provide content of parameters (and not construct SQL command itself) would run as a Prepared Statement out of the box.

Using Queries in applications

Once you have successfully run a Query, you can use it in your application to
Last modified 2mo ago