Skip to main content
FILESS.IO
Documentation

Filess Documentation

A living knowledge base for how Filess provisions, isolates, and protects managed databases.

Learn how to deploy, monitor, and secure production-ready databases with automated backups, point-in-time recovery, and enterprise-grade monitoring built-in.

Documentation phasePlatform overview
Deployment modelsShared · Dedicated
Engine catalogMySQL · MariaDB · PostgreSQL · MongoDB

Navigate the platform

Use the current documentation drop to understand how Filess splits responsibilities between Shared and Dedicated runtimes before we publish deeper tutorials.

Shared runtime

Spin up secure dev and test databases backed by shared CPU/RAM pools and isolated storage.

  • Best effort performance with noisy-neighbor protections
  • Managed logical backups plus automated suspend/resume
  • REST-native automation for preview environments
Deep dive into Shared

Dedicated runtime

Single-tenant clusters with root access, PITR, and full-stack observability for production workloads.

  • Reserved CPU, memory, and NVMe-backed storage
  • Physical backups with point-in-time recovery (PITR)
  • Firewalls, Tailscale, and SSH tunneling out of the box
Deep dive into Dedicated

Engine catalog

Consistent versions of MySQL, MariaDB, PostgreSQL (TimescaleDB/PostGIS), and MongoDB across tiers.

  • Same drivers from prototype to production
  • Version pinning & security updates handled by Filess
  • Specialized Postgres builds for time series and GIS
Review engine support

Start documenting your rollout

Until new guides arrive, use these steps to capture internal decisions about runtimes, automation, and access patterns.

Read About the Platform
01

Map your workload to a runtime

Use the About the Platform guide to decide whether Shared or Dedicated fits your latency, compliance, and budget requirements.

02

Provision through Console or API

Issue a handful of CLI or REST calls to create databases, rotate credentials, and wire them into CI/CD flows.

03

Instrument and secure access

Enable built-in monitoring, configure IP filters or Tailscale, and document PITR or backup policies for your team.

Reference links inside the overview

Jump directly to the sections that matter most for your evaluation.