Supabase Outage History
Past incidents and downtime events
Complete history of Supabase outages, incidents, and service disruptions. Showing 50 most recent incidents.
April 2026(3 incidents)
Logs currently inaccessible via the Dashboard and Log Drains
4 updates
This incident has been resolved.
All log sources have been restored and logs should be available to users again now. We are keeping an eye on things to ensure ongoing stability.
The underlying logging platform has stabilized, and some log sources have been restored and are successfully ingesting logs. The team is working to restore the rest of the log sources now.
Users may see errors when attempting to retrieve logs via the Supabase dashboard or may not see new logs arriving via log drains. The team has identified the issue and is working on a fix. Underlying projects are unaffected, this is only affecting the logging service.
Increased error rates for plan upgrades
4 updates
The issue causing increased error rates during plan upgrades has been resolved. All systems are operating normally.
A fix has been applied, and we are monitoring to ensure stability.
We have identified the cause of increased error rates affecting plan upgrades and are working on a fix. We will provide further updates as progress is made.
We are currently investigating increased error rates affecting plan upgrades. Our team is actively working to identify the root cause and restore normal functionality. We will provide updates as more information becomes available.
Degraded logs ingestion
3 updates
Log ingestion has recovered and the incident is considered resolved. Some log data was lost during the incident between around 11pm to 11:45pm ETC on March 31.
We have identified the issue and a fix is in place. We will continue to monitor to ensure stability.
We are seeing degradation of logs and are currently investigating the cause of this issue.
March 2026(18 incidents)
Supabase dashboard experiencing intermittent errors in Europe region
3 updates
We have confirmed that project creation has returned to normal.
Project creation has returned to normal. We continue to actively monitor and operate our platform for stability and consistency.
We have experienced problems with project creation, the issue has been identified and mitigation steps have been implemented.
Degraded Log Ingestion
6 updates
Log ingestion has returned to normal
Our capacity mitigations have taken effect and ingestion has returned to normal. Customers should see logs returning to normal.
We continue to increase capacity in targeted areas to mitigate log ingestion degradation. It will take some time for the ingestion backlog to be eliminated.
We have implemented increase capacity and logs are returning to normal. It will take some time for the ingestion backlog to be eliminated. Some services, such as realtime, storage, and api-gateway, will have lost logs during the ingestion incident.
We have identified the issue with log ingestion. We are testing mitigation options, including bringing up additional capacity. We will continue to update this page with our progress.
We are investigating a problem with log ingestion. Users may experience delay in current log data.
Realtime services unavailable
7 updates
The issue has been resolved and Realtime services have returned to normal.
The fix has been implemented and we’re monitoring to ensure stability.
We appreciate your patience as we continue to work on a fix. We will provide updates as they become available.
We are working on a fix and we’ll continue to provide updates as progress is made.
We've identified the issue and are currently working on a fix, we will provide an update on our progress soon.
We're still investigating network connectivity issues with Realtime.
We are investigating network connectivity issues with Realtime.”
Branching access issues
3 updates
Branching access has returned to normal, this issue is resolved.
The fix has been implemented and branching access has returned to normal.
We are aware of an issue affecting users creating/updating branches. A permission error in our branching workflow is causing failures for all branches. We have identified the root cause and a fix is being deployed. We will provide an update once resolved.
Degraded Logging Ingestion impacting all regions
4 updates
This issue is now resolved. All logging ingestion has resumed in all regions.
A fix has been implemented. The system is now operating normally, and we will continue to monitor.
The cause of the issue has been identified. Our engineering team is working on a fix.
We are currently investigating an issue affecting Supabase Logs, resulting in partial log ingestion for some services. Users may experience delays or errors when accessing logs. In some cases, logs may be partially ingested or not ingested at all. Projects remain fully functional. This issue is limited to logging only. Our team is actively working to identify the root cause and restore normal performance as quickly as possible. We will provide further updates as more information becomes available.
Elevated error rates affecting Edge Functions in the eu-central-1 (Frankfurt) region
3 updates
Error rates have returned to normal. This incident has been resolved.
We carried out a controlled redeployment of the affected services to restore stability. The system is now operating normally, and we will continue to monitor.
We are currently investigating elevated error rates affecting Edge Functions in the eu-central-1 (Frankfurt) region
Project creation failures across multiple regions
4 updates
Project creation in all regions are now successful.
A fix has been implemented and we are monitoring the results.
We have identified the issue and a fix is underway.
We are currently investigating project creation failures across multiple regions.
Elevated error rates affecting storage services in the ap-northeast-1 (Tokyo) region
5 updates
The fix was implemented. All impacted projects and newly created projects in the region are now successfully connecting to storage services.
The root cause, involving task instances and batch sending events, has been identified. Our engineering team is working on a fix.
We are continuing to investigate elevated error rates affecting storage services in the ap-northeast-1 (Tokyo) region. While we are still observing a higher-than-normal level of errors, initial findings indicate that the overall impact is lower than first expected. Many affected requests are succeeding upon retry. Our team is actively working to determine the root cause and will provide further updates as more information becomes available.
We are continuing to investigate elevated error rates affecting storage services in the ap-northeast-1 (Tokyo) region. Newly created projects may still experience issues connecting to storage, while existing projects remain unaffected at this time. Our team is actively working to determine the root cause and assess the full impact. We will provide further updates as more information becomes available.
We are currently investigating elevated error rates affecting storage services in the ap-northeast-1 (Tokyo) region. Newly created projects may experience issues connecting to storage, while existing projects remain unaffected at this time. We are actively working to understand the full scope of the impact and will provide further updates as more information becomes available.
Issues propagating Postgres configuration updates
4 updates
This incident has been resolved.
A fix has been implemented and we are monitoring.
We have identified the root cause and are currently working on a fix.
Some custom Postgres configurations applied through the Supabase CLI are not currently taking effect for projects running Postgres version 17.6.1.084. Projects that do not use CLI-managed Postgres configurations, or that are running earlier Postgres versions, are not affected.
Increased error rate related to Connection Pooler in ap-northeast-2 (South Korea)
4 updates
Error rates have returned to normal, and connectivity has stabilised.
A fix has been implemented and error rates have reduced. Our team is actively monitoring the system to ensure stability.
We continue to investigate increased error rates relating to the connection pooler in ap-northeast-2 (South Korea) We will provide further updates as information becomes available.
We are currently investigating increased error rates relating to the connection pooler in ap-northeast-2 (South Korea) We will provide further updates as information becomes available.
Degraded Logging Ingestion impacting all regions
3 updates
The issue affecting Supabase Log ingestion has been fully resolved. Log ingestion across all services has returned to normal operation.
A fix has been implemented and log ingestion is now stabilising. We are seeing recovery across the affected services. Our team is actively monitoring the system to ensure ingestion fully returns to normal.
We are currently investigating an issue affecting Supabase Logs that is causing partial log ingestion for some services. Users may experience delays or errors when accessing logs related to Realtime, Storage, or Edge Functions logs. The logs for these services may only be partially ingested. The services remain fully functional, this is only impacting logs. Postgres Logs are not impacted. Our team is actively working to identify the root cause and restore normal performance as quickly as possible. We will share another update as soon as more information becomes available.
Projects failing to be created
4 updates
Project creation recovery has been confirmed across all regions. Regional dashboards show error rates returned to normal, and previously failing project creation operations are succeeding again.
A fix has been implemented and we are seeing project creation recovery across regions. We're moving the incident to monitoring while we confirm full stability.
We have identified the root cause and are currently working on a fix.
We are currently investigating reports of projects failing to be created.
Storage errors in EU-Central-2
5 updates
All storage operations have returned to normal.
The upstream incident has been resolved and we have not observed any additional errors. We will continue to monitor our storage infrastructure for continued stable operations.
We are observing storage error rates returning to normal.
We have identified the cause of the storage issue in EU-Central-2. The upstream provider is working to resolve the issue.
We have noticed that storage uploads and downloads have become degraded in EU-Central-2. We are investigating.
Elevated Management API error rates across all regions
7 updates
Error rates have returned to baseline and all regions are operating as expected.
We've seen error rates return to normal levels, and all regions are now holding steady. We will continue to monitor to make sure things remain stable.
We are continuing to see some periodic spikes in error rates; however, total rate of errors are decreasing across most regions. We're continuing efforts to get all systems back to green. When error rates spike, management API functions, which would mean dashboard actions, project creation, configuration changes, and other functions remain impacted. Existing projects are unaffected and connectivity via the Data APIs, Postgres connections, and Supavisor are unaffected.
The team is continuing to deploy mitigations, and we are seeing error rates improve, but are not back to baseline yet. All management API functions, which would mean dashboard actions, project creation, configuration changes, and other functions remain impacted. Existing projects are unaffected and connectivity via the Data APIs, Postgres connections, and Supavisor are unaffected.
We have identified the source of the increased error rates, and are working on a fix now. All management API functions, which would mean dashboard actions, project creation, configuration changes, and other functions remain impacted. Existing projects are unaffected and connectivity via the Data APIs, Postgres connections, and Supavisor are unaffected.
We've expanded this to all management API functions, which would mean dashboard actions, project creation, configuration changes, and other functions would also be impacted. Error rates are currently improving, but the team is investigating the root cause to ensure continued stability. Existing projects are unaffected and connectivity via the Data APIs, Postgres connections, and Supavisor are unaffected.
We are currently investigating the cause, but users may see issues creating projects across all regions. Existing projects are not affected and remain up and stable.
Subscription Plan changes currently unavailable
4 updates
This incident has been resolved.
A fix has been applied by our upstream provider and we have re-enabled subscription plan upgrades and paid organization creation. We are monitoring to confirm full recovery.
We have temporarily disabled subscription plan upgrades and paid organization creation while we work with our upstream billing provider to resolve the issue. We’ll provide an update as soon as we have more information.
We are currently experiencing issues with subscription plan changes and have contacted our upstream billing provider to help investigate. Subscription Plan changes are temporarily disabled while we investigate.
Edge Functions experiencing high response times in ap-northeast-1 and ap-northeast-2
6 updates
Both regions are now working as usual.
Response times in both the ap-northeast-1 (Tokyo) and ap-northeast-2 (Seoul) regions have now stabilised. We will continue to monitor the systems closely to ensure stability.
Response times in the ap-northeast-1 (Tokyo) region have improved following mitigation efforts. We are currently rolling out the fix to the ap-northeast-2 (Seoul) region. Further updates will be provided as the rollout continues.
We are continuing to investigate reports of Edge Functions experiencing high response times in Asia Pacific regions Our team is still working to determine the underlying cause. We understand the disruption this may be causing and are treating this with high priority.
We are continuing to investigate reports of Edge Functions experiencing high response times in Asia Pacific regions Our team is still working to determine the underlying cause. We understand the disruption this may be causing and are treating this with high priority.
We are currently investigating the cause for increased response times.
Supabase Dashboard and Management API inaccessible
4 updates
This incident has been resolved.
Service has been fully recovered and we're continuing to monitor.
We've identified and reverted the change that is causing the issue, and are in the process of recovering the systems affected. Existing projects are unaffected.
Existing projects seem to be unaffected
Database issues in us-east-2
5 updates
Root cause has been confirmed to be addressed. Handful of projects still require manual intervention however. We will be reaching out to their respective owners.
We've fixed majority of the affected projects. They are very few projects that need extra steps to resolve. We are working on them at the moment.
We are currently continuing with remediation actions for affected projects. If you’re affected, you can also fix it manually by restarting your project by visiting this page in the dashboard and click on Restart Project: https://supabase.com/dashboard/project/_/settings/general
We’ve identified that this affects only a subset of projects in us-east-2. We are taking remediation actions for the affected projects. If you’re affected, you can also fix it manually by restarting your project by visiting this page in the dashboard and click on Restart Project: https://supabase.com/dashboard/project/_/settings/general
We're experiencing an increased number of errors in database operations in us-east-2 region. We'll post more details as we investigate.
February 2026(18 incidents)
Users Experiencing Network Connectivity Problems (India Region)
16 updates
Read more about incident and similar incidents in our new blog post about [Navigating Regional Network Blocks](https://supabase.com/blog/navigating-regional-network-blocks).
We are pleased to inform our community that access to Supabase’s website supabase.co has now been fully restored for all users across India. We sincerely thank the Ministry of Electronics and Information Technology (MeitY) for their prompt action and constructive engagement in resolving this matter. Access to our services has been fully restored, and we deeply appreciate the continued patience and support of builders, developers, and businesses across India.
We are pleased to inform our community that access to Supabase’s website supabase.co has now been fully restored for all users across India. We sincerely thank the Ministry of Electronics and Information Technology (MeitY) for their prompt action and constructive engagement in resolving this matter. Access to our services has been fully restored, and we deeply appreciate the continued patience and support of builders, developers, and businesses across India. If you were previously affected, you should now be able to access your Supabase projects without any interruptions. Please clear your DNS cache or restart your network connection if you still encounter issues. Additionally, please allow up to 24 hours for the provider-side changes to propagate. If you continue to see access problems after 24 hours, let us know! Thank you for your patience while we worked through this incident.
We have continuing contact with the relevant authorities to address the connectivity issues impacting some users in India. Decision makers are involved on all sides. While we don’t have a confirmed timeline to share just yet, this is top priority for our team and leadership. We will post an update once the issue is resolved or additional information becomes available.
We continue to work closely with the relevant authorities to address the connectivity issues impacting some users in India. Our discussions are progressing, and we’re seeing constructive engagement as we work towards a resolution. While we don’t have a confirmed timeline to share just yet, this is top priority for our team. We will post an update once the issue is resolved or additional information becomes available.
We acknowledge the ongoing impact this issue is having on our users in India. We have made important progress in our contact with the relevant authorities and continue to actively work towards a resolution. We continue to advise affected customers to use an alternative DNS provider or a VPN as a workaround in the interim. For some customers, custom domains may also be a viable solution. If you have any questions regarding these options, please contact Supabase support. We will post an update once the issue is resolved or additional information becomes available.
We understand many users in India continue to be blocked from accessing Supabase. We acknowledge the difficulties this is causing for our users there. Supabase continues to follow up through all available channels to resolve this issue. We continue to advise affected customers to use an alternative DNS provider or a VPN as a workaround in the interim. For some customers, custom domains may also be a viable solution. If you have any questions regarding these options, please contact Supabase support. We will post an update once the issue is resolved or additional information becomes available.
Affected customers who are using the Custom Domain feature may be able to restore connectivity by switching their Custom Domain's DNS to an alternative DNS and enabling proxying. We advise affected customers to continue to report the issue to their ISP.
We have received some reports that other ISPs in India may be impacted by access limitations. We continue to follow up through all available channels to resolve this issue. We have engaged multiple teams at Supabase communicating with multiple entities in India in an effort to do all we can to resolve the access issues our users in India are experiencing. We advise affected customers to continue to report the issue to their ISP and to use an alternative DNS provider or a VPN as a workaround in the interim. We will post an update once the issue is resolved or additional information becomes available.
We continue to follow up through all available channels to work with the ISP to resolve this issue. We advise affected customers to also report the issue to their ISP and to use an alternative DNS provider as a workaround. We will post an updated once the ISP has confirmed that the issue is resolved or additional information becomes available.
We are currently aware of an issue affecting reachability of Supabase projects for a subset of users based in India. Supabase infrastructure remains fully operational. We have confirmed that the projects of impacted users remain accessible from regions outside India. Our investigation has confirmed that a service provider in the region is not serving the correct DNS responses for Supabase projects from their internal DNS resolvers. We are following up through all available channels to work with the ISP to resolve this issue. We also advise affected customers to also report the issue to their ISP. The best workaround we have currently is for affected users to use an alternative DNS providers such as: Cloudflare: https://1.1.1.1 Google https://developers.google.com/speed/public-dns Quad9: https://quad9.net/ Alternatively users can use a VPN to avoid this issue We will post a further update once the ISP has confirmed that the issue is resolved or additional information becomes available.
We have confirmed that the projects of impacted users remain accessible from regions outside India. Our investigation is currently focused on an ISP-level block affecting users within India. We advise affected customers to also report the issue to their ISP. Supabase infrastructure remains fully operational. The best workaround we have currently is for affected users to use an alternative DNS providers such as: Cloudflare: https://1.1.1.1 Google https://developers.google.com/speed/public-dns Quad9: https://quad9.net/
We have confirmed that the projects of impacted users remain accessible from regions outside India. Our investigation is currently focused on a potential ISP-level block affecting users within India.
We continue to work with customers to address their connectivity issues. We are also contacting the relevant network providers to work with them to resolve the issue.
A DNS resolution issue is affecting customers in AP-South-1 and AP-Southeast-2. Certain ISP DNS servers appear to be unavailable, preventing connections to Supabase endpoints. Some users reported that switching to Cloudflare DNS (1.1.1.1) may restore connectivity. We advise affected customers to also report the issue to their ISP. Supabase infrastructure remains fully operational.
We have reports of customers having difficulties connecting to Supabase from locations accessing AP-south-1, including a number of reports from India. We are actively investigating the issue.
Increased Edge Function Errors across multiple regions
5 updates
The issue affecting Edge Functions has now been fully resolved, and users have reported Edge Functions operating as expected. The root cause was a denial-of-service event that led to elevated error rates and 504 responses across impacted regions. Mitigations have been implemented to restore stability. We will be publishing a full post-mortem with additional details, once our internal review is complete. Thank you for your patience while we worked to resolve this issue.
The fix has been implemented and early indicators suggest it has resolved the 504 errors affecting Edge Functions. We are continuing to monitor system performance closely to ensure stability and confirm full recovery across all affected regions. We will provide a final update once we are confident the issue is fully resolved.
We believe we have identified the underlying cause of the 504 errors affecting Edge Functions across multiple regions. The team are currently implementing corrective measures to address the issue and restore service stability.
We are continuing to investigate reports of Edge Functions returning 504 errors across multiple regions. Our team is still working to determine the underlying cause. We understand the disruption this may be causing and are treating this with high priority.
We are currently investigating reports of Edge Functions returning 504 errors across multiple regions. The team has been alerted and is actively investigating the root cause. We are working to identify the scope of affected regions. We will provide an update as soon as we have more information.
Delays in pausing projects and making read replica configuration changes in EU-West-1
6 updates
Things have remained stable, and all systems looking good. This issue has been resolved.
Project Pause requests and Replica configuration changes are back to normal. We're monitoring to ensure stability.
The job queue is continuing to decrease. The team is making further changes to help it complete faster. Note: The impact of this remains project pause and read replica configuration change delays. All projects remain up and accessible.
The queued jobs are being processed, and pause events and read replica configuration changes will complete as expected once the jobs are processed. The team is, in parallel, looking into making some adjustments to help these processes complete faster.
We've identified a spike in queued jobs in the region, which are resulting in pause and read replica actions delayed. The team is looking into this spike and remediation options.
We are seeing delays when attempting to pause projects and/or add or remove replicas in EU-West-1. The team is currently looking into this and will update
Some Users Experiencing Connectivity issues via Supavisor in EU-Central-1
3 updates
Systems have remained stable, and we are confident the issue has been resolved.
Connection and query times are back to normal levels. We will continue monitoring to ensure stability.
The team is investigating connectivity issues via Supavisor in EU-Central-1. Data API, direct connections, and connections via the dedicated pooler are unaffected. You can read more on the dedicated pooler here: https://supabase.com/docs/guides/database/connecting-to-postgres#dedicated-pooler
Resource Metrics Collection Delays in US-West-2
6 updates
Metrics collection continues to operate normally in US-West-2, and full metrics collection has been fully restored with no blips in stability.
The team has deployed additional capacity and has restored metrics collection operations. All metrics collection in region is fully operational and the team is actively monitoring the fixes deployed.
The team has deployed a fix and is actively monitoring recovery of partially degraded metrics collection. Some US-West-2 users may see metrics periodically available, but others may still see missing metrics. This does not impact project availability or functionality, which remain healthy.
The team is continuing to work on a fix for metrics collection. Some US-West-2 users may see metrics periodically available, but others may still see missing metrics. We'll continue to update here as we have more information. This does not impact project availability or functionality, which remain healthy.
We have identified the components resulting in the delayed metrics collection, and the team is working on a fix. This does not impact project availability or functionality, which remain healthy.
We have discovered an issue with metrics collection for projects in US-West-2. Some users may not be able to see metrics for these projects in the dashboard, and functions such as automatic disk resizes may be delayed as well. This does not impact project availability or functionality, which remain healthy. The team is currently investigating.
Errors across logs and observability services
10 updates
Things have remained stable, and we are confident that things are now resolved. The impact of this event was limited to log visibility and log retention. Some logs between 20:20 UTC and 23:23 UTC on Friday, Feb 20, 2026 may not be available.
The configuration update has brought error rates and stability back to normal, all logging and observability data should now be accessible. The impact of this event was limited to log visibility and log retention. Some logs between 20:20 UTC and 23:23 UTC on Friday, Feb 20, 2026 may not be available. We will continue to monitor to ensure things continue to look good.
The team is currently pushing a configuration change we hope will finish stabilizing the analytics services. We will continue to update as we have more information. Projects and services are up and running, edge function invocations are unaffected, and project creation/adjustments are unaffected. This only affects visibility of the above mentioned information.
The analytics service continues to be periodically degraded, which means some users may still periodically see issues seeing logging and observability information. We have added additional resources to the logging service to increase stability. The team is continuing their work to stabilize all analytics functionality. Projects and services are up and running, edge function invocations are unaffected, and project creation/adjustments are unaffected. This only affects visibility of the above mentioned information.
We are still seeing logging and observability services continue to stabilize, but some users may continue to see some issues. The team is continuing to working on full stabilization efforts. Projects and services are up and running, edge function invocations are unaffected, and project creation/adjustments are unaffected. This only affects visibility of the above mentioned information.
We are still seeing logging and observability services continue to stabilize, but some users may continue to see some issues. The team is continuing to working on full stabilization efforts. Projects and services are up and running, edge function invocations are unaffected, and project creation/adjustments are unaffected. This only affects visibility of the above mentioned information.
We've implemented a fix, and we are seeing the affected services begin to stabilize, but access to logs, observability metrics, and edge function invocation information may still be spotty. The team is continuing to working on full stabilization efforts. Projects and services are up and running, edge function invocations are unaffected, and project creation/adjustments are unaffected. This only affects visibility of the above mentioned information.
We have identified an issue resulting in missing log, observability, and edge function information. Projects and services are up and running, edge function invocations are unaffected, and project creation/adjustments are unaffected. This only affects visibility of the above mentioned information. We will have another update within 20 minutes.
We are investigating errors across our logs and observability services and will provide an update soon.
We are investigating errors with Edge Functions and will provide an update soon.
Degraded Supavisor performance in us-east-1
3 updates
Performance has returned to normal levels. This incident has been resolved.
We've identified degraded performance in a Supavisor cluster resulted in elevated connection latency and increased p99 response times. The problematic node has been replaced and performance is returning to normal levels. We will continue to monitor.
Starting from Feb 22:55 UTC, degraded performance in one of our Supavisor clusters resulted in elevated connection latency and increased query p99 response times.
Elevated Supavisor query response times in us-east-1
1 update
Degraded performance in a Supavisor cluster resulted in elevated connection latency and increased p99 response times between 2026-02-15 22:00 and 2026-02-16 01:00. The problematic node was replaced and performance returned to normal levels.
Outage in US-East-2 (Ohio)
8 updates
We’ve published a [post-mortem on our blog](https://supabase.com/blog/supabase-incident-on-february-12-2026).
Service has been fully restored. All impacted jobs have been requeued and are currently processing normally. We will be publishing a public post-mortem with additional details about this incident.
The revert of the change helped and most of the metrics are back to the pre incident levels. We are requeuing failed jobs and monitoring to make sure the issue doesn’t come back.
We identified a potential internal networking configuration that may have caused the incident. We have since reverted that change and it appears services are recovering.
We are still investigating the root cause for this incident. us-east-2 region isn’t receiving any network traffic at this point. We are also seeing some API request errors in other US regions, but not as high as us-east-2.
We continue to see increased levels of 500 errors across US-West and US-East regions. Our engineering team is investigating the issue.
The issue identified it as a problem in US-West with some impact in US-East and the impact seems to be primarily on reads rather than writes.
We have identified increasing 500 errors in some US regions and are actively investigating the cause.
Regional network issues in Yemen
4 updates
This issue is now resolved.
We continue to work with network vendors to mitigate this issue. In the interim, using a VPN will give you access to your Supabase project.
We are actively working with network vendors to mitigate this issue.
We have noticed increase connection failures to supabase.co domains from connections originating in Yemen. Projects are up and running, this only impacts connections from this region. We are working to resolve this issue with appropriate parties and will provide an update soon. We have specifically had reports of connection issues from connections via these ISPs: Yemen Mobile Sabafon Y-Telecom Spacetel
High connection latency via shared Pooler in us-west-1
4 updates
This incident has been resolved.
The team noticed that some connection pools had workers stuck as a consequence of the previous issue. This could cause query failures. Stuck workers were now restarted.
We've removed the problematic cluster node and latency returned to the normal level. We are now monitoring.
We’re investigating high latency in us-west-1 affecting some connections to databases via our shared connection pooler.
Edge Function issues when using supabase-js@2.95.0
6 updates
Function deploys are working normally now. We are resolving this incident.
esm.sh maintainers have implemented a fix which should unblock deploys of Edge Functions that were importing supabase-js from esm.sh.
We’ve attempted several fixes on the npm registry side, but the esm.sh issue persists. We are continuing to investigate. In the meantime, use npm: or jsr: specifiers, or jsdelivr as an alternative CDN: import { createClient } from "npm:@supabase/supabase-js@2.95.0" or import { createClient } from "https://cdn.jsdelivr.net/npm/@supabase/supabase-js@2.95.0/+esm"
We are removing v2.95.0 release, so the @2 tag will resolve to v2.94.1. This should resolve majority of issues. If you have previously switched to using v2.95.0 directly, please switch to v2.94.1
We recommend importing via `npm:` or `jsr:` specifiers instead of CDN imports: `import { createClient } from "npm:@supabase/supabase-js@2.95.0"` These are more reliable than third-party CDNs. We’ve reached out to the esm.sh maintainer and are tracking the issue upstream.
Edge Functions using @supabase/supabase-js@2.95.0 from esm.sh are failing. The issue is specific to the esm.sh CDN. Workarounds: Pin to v2.94.0 or use cdn.jsdelivr.net (https://cdn.jsdelivr.net/npm/@supabase/supabase-js@2.95.0/+esm) as a workaround while we investigate.
Storage upload via S3 Protocol is degraded
2 updates
We have deployed a fix and confirmed that the issue is fully resolved.
We are aware of issues with S3 upload protocols affecting projects in us-east-1 and ap-northeast-2. We are working on a fix.
Realtime cluster instabilty
3 updates
This incident has been resolved.
We've observing a recovery for latency and error rates after the capacity increase. We will be monitoring to make sure the problem was fully resolved.
We're seeing elevated errors and latency in Realtime service. We are already working on increasing cluster capacity to stabilize it.
Reports of DNS lookup errors for some customers in the United States
6 updates
This incident has been resolved.
Our upstream provider has pushed a fix, and requests seem to be back to normal now. According to data from our partner, users in the US South were largely affected, with users in and around Texas being the most common, but some users in and around Georgia may have also seen issues, but these should all be resolved at this point. Users connecting to project URLs should no longer be seeing "DNS address could not be found" errors. We are continuing to monitor the situation.
Our upstream provider has identified the specifc issues with DNS resolution and has begun working on a fix. Projects and the underlying infrastructure are unaffected, and remain running and available for users without affected DNS Providers. Affected users will see errors similar to "DNS address could not be found"
We are continuing to work on this with our upstream network provider. Projects and the underlying infrastructure are unaffected, and remain running and available for users without affected DNS Providers. Affected users will see errors similar to "DNS address could not be found"
Our upstream network provider has identified an issue and is working on a fix. Projects and the underlying infrastructure are unaffected, and remain running and available for users without affected DNS Providers. Affected users will see errors similar to "DNS address could not be found"
We are seeing reports of DNS Lookup failures for users based in the United States. The issue does not seem to affect all DNS providers, and we are still working to narrow down affected areas. Projects and the underlying infrastructure are unaffected, and remain running and available for users without affected DNS Providers. Affected users will see errors similar to "DNS address could not be found"
Issues with setting DNS for newly created and unpaused projects
4 updates
This issue is now resolved.
New project creation and unpauses are now available. We are working on remediation of projects impacted during the incident and will continue to monitor.
We have identified the issue and are working towards a resolution.
We are investigating issues affecting instance operations globally. This may impact new project creation and project unpauses. Existing projects remain unaffected.
Project Clone Failures (Beta Feature)
4 updates
This issue is now resolved. Affected customers should delete any failed cloned projects and try again with a new clone.
A fix has been implemented and we are monitoring the results.
The issue has been identified and a fix is being implemented.
We are currently investigating an issue with our beta project cloning feature (Restore to a New Project). This has been disabled while we conduct our investigations and we will provide an update soon.
Degraded performance for Supavisor (multi-tenant connection pooler) in us-east-1
3 updates
This incident has been resolved.
A fix has been implemented and we are monitoring the results.
We are currently investigating this issue.
January 2026(7 incidents)
Errors when Updating auth configs with github branching
4 updates
This incident has been resolved.
A fix has been implemented and we are monitoring the results.
We have identified the issue causing errors for these changes, and the team is working on a fix.
Some users are seeing errors when attempting to update auth configs on branches with github branching. This is only affecting branches, and is not affecting production projects. The team is currently investigating.
Project Creation Issues - eu-west-1
7 updates
This incident has been resolved.
Project actions (creation, unpauses, read replica creation, upgrades) have been re-enabled, and the team is monitoring.
We have received word from our upstream partner that their issue has been resolved. The team is currently testing all functionality on our side and cleaning up previously errored requests. Once we're confident things are back to normal, we'll resume project actions in the region.
We are continuing to monitor for resolution of the upstream provider incident.
We continue to monitor for resolution of the upstream provider incident.
Instance operations in eu-west-1 are impacted by an ongoing infrastructure provider incident causing network issues in the region. Affected operations include new project creation, unpauses, read replica creation, and upgrades. Existing projects are unaffected. Our provider is aware of the issue and we already see error rates and latency trending down. We will update as the situation progresses.
We are investigating issues affecting instance operations in the eu-west-1 region. This may impact new project creation, project unpauses, read replica creation, and upgrades. Existing projects remain unaffected.
Degraded Performance for Supavisor
1 update
Between 6am and 7am UTC our Supavisor cluster experienced instability, resulting in elevated error rates and increased client reconnects. The issue has since been resolved, and the service is operating normally. We are currently reviewing preventative measures to reduce the likelihood of recurrence.
Edge Function increased error rate in EU-West-1
4 updates
This incident has been resolved.
A fix has been implemented and we are monitoring the results.
The issue has been identified and a fix is being implemented.
We are currently investigating this issue.
Elevated real-time error rates in ap-se-1
4 updates
We've confirmed that the elevated 5xx errors and high response times were isolated to the ap-southeast-1 region. Other regions remained healthy throughout the incident. Dashboards showed a sharp spike in 5xx errors and response times for ap-southeast-1, with metrics rapidly recovering after remediation steps. For more details, see the realtime-service combined dashboard. The incident was the result of a resource constraint. We have added the required resources and will take this into account in our future planning. We're continuing to monitor system health to confirm stability.
We are continuing to monitor for any further issues.
The performance of the impacted components has improved.
We're currently investigating increased error rates across all regions
Some edge function deployment operations are timing out
4 updates
ESM has resolved their issue. All function deploy actions should now be working.
To address function deploy issues, replace esm.sh with npm: or jsr imports instead. This workaround is confirmed to work.
For users experiencing this issue: esm.sh is having issues. Users can replace esm.sh with npm: or jsr imports to get function deploys to work.
We are seeing increased timeouts when deploying edge functions and are currently investigating. Already deployed functions are not affected.
Degraded log ingestion
6 updates
This incident has been resolved.
Log ingestion has been fully restored across all services. We will continue to monitor the system to ensure stability.
We are continuing to work on restoring full log ingestion for Postgres, PostgREST, and Auth services.
We have stabilized the ingestion servers. Error rates are back to normal and the Logflare dashboard is functioning. Our team is now working to restore log ingestion for Postgres, PostgREST, and Auth services.
We continue to see degraded log ingestion across all regions. Logflare dashboard may be temporarily unavailable as well while we take steps to mitigate the issue and restore normal service. Our engineering team is actively working on a resolution. We will provide further updates as we make progress.
We are seeing degradation in log ingestion in all regions, our engineering team is investigating this issue.
December 2025(4 incidents)
Shared SMTP service has low deliverability for some users
11 updates
This incident has been resolved.
A fix has been deployed, all new projects are fully operational. We've finished backporting the fix to affected projects and now monitoring.
A fix has been deployed, all new projects are fully operational. We're currently backporting the fix to affected projects (69% complete). An immediate workaround is to use custom SMTP. More information available on configuring that here: https://supabase.com/docs/guides/auth/auth-smtp
We've deployed a fix and confirmed all new projects are fully operational. Remediation for previously affected projects is underway and 50% complete. An immediate workaround is to use custom SMTP. More information available on configuring that here: https://supabase.com/docs/guides/auth/auth-smtp
A fix has been deployed, all new projects are now fully operational. We're currently backporting the fix to affected projects (30% complete). An immediate workaround is to use custom SMTP. More information available on configuring that here: https://supabase.com/docs/guides/auth/auth-smtp
We have implemented a fix, and all new projects should now be fully operational. We are rolling out a backporting fix to the affected projects; this is going to take around 3 hours. An immediate workaround is to use custom SMTP. More information available on configuring that here: https://supabase.com/docs/guides/auth/auth-smtp
We have implemented a fix, and all new projects should now be fully operational. We are now working on backporting it to the affected projects. An immediate workaround is to use custom SMTP. More information available on configuring that here: https://supabase.com/docs/guides/auth/auth-smtp
We have identified the issue, and we are working on the fix. An immediate workaround is to use custom SMTP. More information available on configuring that here: https://supabase.com/docs/guides/auth/auth-smtp
We are continuing to investigate this issue. An immediate workaround is to use custom SMTP. More information available on configuring that here: https://supabase.com/docs/guides/auth/auth-smtp
We are currently investigating an issue where some users have reported failures when sending email via the Shared SMTP service. This is also impacting newly creating projects. If you are impacted, and need email services working immediately, you can work around this immediately by following best practice for production use cases and configure custom SMTP: https://supabase.com/docs/guides/auth/auth-smtp
We are currently investigating an issue where some users have reported failures when sending email via the Shared SMTP service. If you are impacted, and need email services working immediately, you can work around this immediately by following best practice for production use cases and configure custom SMTP: https://supabase.com/docs/guides/auth/auth-smtp
Shared SMTP service has low deliverability
9 updates
We worked with our email provider to restore the shared SMTP service, and email delivery has now fully returned to normal. All emails are being delivered as expected. We’ll be following up internally to implement preventative measures to reduce the likelihood of this happening again.
We are continuing to work on a solution for this issue. To clarify the impact: This only affects the shared SMTP service, which is intended for testing use only. The team is, in parallel, continuing to work with our mail provider and is preparing a migration to a different service - we will go with whichever solution happens the earliest; however, this migration must be done carefully to avoid further issues. If you need email services working immediately, you can still work around this immediately by following best practice for production use cases and configure custom SMTP: https://supabase.com/docs/guides/auth/auth-smtp We expect to have an update no later than December 22 at 0900 UTC; however, we will share more information if it becomes available earlier.
We are continuing to work on a solution for this issue. You can still work around this immediately by following best practice for production use cases and configure custom SMTP: https://supabase.com/docs/guides/auth/auth-smtp
We are working with the email provider for shared SMTP services. For now, users without Custom SMTP will continue to see email deliverability issues for auth-related emails. We are also exploring other provider options in the event we need to migrate in the near term. You can still work around this immediately by following best practice for production use cases and configure custom SMTP: https://supabase.com/docs/guides/auth/auth-smtp
We have identified the issues with sending mail via the shared SMTP service and are working on a fix. For any production workloads, we would still strongly encourage setting up custom SMTP on your projects. More information available on configuring that here: https://supabase.com/docs/guides/auth/auth-smtp
All projects using Supabase shared SMTP are experiencing emails going undelivered. We are currently investigating, but an immediate workaround is to use custom SMTP. More information available on configuring that here: https://supabase.com/docs/guides/auth/auth-smtp
We are continuing to investigate this issue.
All projects using Supabase shared SMTP are experiencing emails going undelivered. We are currently investigating, but an immediate workaround is to use custom SMTP. More information available on configuring that here: https://supabase.com/docs/guides/auth/auth-smtp
All projects using Supabase shared SMTP are experiencing emails going undelivered. We are currently investigating, but an immediate workaround is to use custom SMTP. More information available on configuring that here: https://supabase.com/docs/guides/auth/auth-smtp
Elevated 5xx error rates
1 update
An upstream provider was experiencing an issue which led to increase 5xx error rates between 11:19 UTC and 12:34 UTC
Increased latency and occasional timeouts on requests to Data APIs for projects in US-East-1
4 updates
This incident has been resolved.
A fix has been implemented and we are monitoring the results.
We have identified increased errors with an upstream provider. We are currently working with them on resolution.
We are currently investigating this issue.
📡 Tired of checking Supabase status manually?
Better Stack monitors uptime every 30 seconds and alerts you instantly when Supabase goes down.