Deploy teable-postgres-redis
Teable with private Postgres, Redis, and persistent assets.
teable
Just deployed
/app/.assets
postgres
Just deployed
/var/lib/postgresql/data
redis
Just deployed
/data
Deploy and Host Teable + Postgres/Redis on Railway
Deploy Teable on Railway with private Postgres, private Redis, persistent app assets, and a public web service.
About Hosting Teable + Postgres/Redis
Teable is an open-source no-code database and Airtable-style workspace. This template follows Teable's Docker deployment shape with a Teable web service, Postgres for application data, Redis for cache/queue state, and persistent storage for uploaded assets.
Why Deploy Teable + Postgres/Redis on Railway
Railway gives Teable a simple one-click runtime with private networking, generated credentials, persistent volumes, and a generated public domain. The template avoids exposing Postgres or Redis and keeps the public surface limited to the Teable web app.
Common Use Cases
- Internal no-code database workspaces
- Lightweight Airtable-style CRUD tools
- Project trackers and operational tables
- Team knowledge bases with structured records
- Evaluation environments for self-hosted Teable
Dependencies for Teable + Postgres/Redis Hosting
Teable depends on Postgres for durable app data and Redis for cache/queue behavior. The Teable service also needs a stable secret key and a correct public origin for imports, uploads, and browser interactions.
Deployment Dependencies
SECRET_KEY: long random application secretPOSTGRES_PASSWORD: generated Postgres passwordRAILWAY_RUN_UID: lets Redis write to its Railway volumePUBLIC_ORIGIN: Railway public URL for the Teable web app
Template Content
PORT
SECRET_KEY
ENABLE_SIGNUP
PRISMA_DATABASE_URL
BACKEND_CACHE_PROVIDER
BACKEND_CACHE_REDIS_URI
BACKEND_PERFORMANCE_CACHE
TELEMETRY_REPORT_DISABLED
NEXT_ENV_IMAGES_ALL_REMOTE
BACKEND_SESSION_COOKIE_SECURE
postgres
postgres:15.4PGDATA
POSTGRES_DB
POSTGRES_USER
POSTGRES_PASSWORD
redis
redis:7.2.4RAILWAY_RUN_UID
