Database Configuration
Connection URL
Complete database connection URL. Supports SQLite and PostgreSQL:
PostgreSQL Components
Alternatively, configure PostgreSQL using individual components:PostgreSQL server hostname (e.g.,
localhost, postgres.example.com, RDS endpoint)PostgreSQL server port
PostgreSQL username
PostgreSQL password (not used when AWS IAM auth is enabled)
PostgreSQL database name
PostgreSQL schema to use (ignored for SQLite)
AWS RDS IAM Authentication
Enable AWS RDS IAM database authentication. Requires
boto3 installed via pip install 'arize-phoenix[aws]'When enabled:- Do not set
PHOENIX_POSTGRES_PASSWORD - AWS credentials must be configured (environment, IAM role, or
~/.aws/credentials) - Database user must be IAM-enabled in RDS/Aurora
- SSL is required
Token lifetime for connection pool recycling (AWS tokens valid for 15 minutes)
Storage and Retention
Directory for saving, loading, and exporting data. Must be writable by Phoenix.
Automatic trace cleanup after this many days. Set to
0 to disable.Allocated storage capacity in GiB (for monitoring and alerts)
Send email alerts when storage exceeds this percentage (requires SMTP)
Block new insertions when storage exceeds this percentage
Server Configuration
Network Settings
IP address to bind Phoenix server. Use
:: for IPv6.Port for Phoenix web UI and HTTP API
Port for OpenTelemetry gRPC collector
Root path prefix for Phoenix UI and API (e.g.,
/phoenix for reverse proxy)External root URL for Phoenix (used in emails and redirects)
Performance and Limits
Maximum spans in processing queue before rejecting requests.Memory usage: ~50KiB per span means 20,000 spans ≈ 1GiB
Enable Prometheus metrics endpoint on port 9090
Telemetry and Resources
Master toggle for analytics tracking (FullStory and Scarf.sh)
Allow external resources (Google Fonts, CDNs). Set to
false in air-gapped environments.Authentication and Security
Basic Authentication
Enable authentication and authorization
Disable password-based authentication (use only OAuth2/LDAP)
Secret key for JWT signing. Must be:
- At least 32 characters
- Include at least one digit and one lowercase letter
Admin secret key for privileged operations
Initial password for default admin user
Token Expiry
Access token expiration in minutes
Refresh token expiration in minutes (30 days)
Password reset token expiration in minutes
Cookies and CORS
Enable secure cookies (required for HTTPS)
Cookie path (set when Phoenix is hosted under a sub-path)
Comma-separated list of allowed CORS origins:
Comma-separated list of trusted origins for CSRF protection:
Admin Users
Semicolon-separated list of admin users (username=email):Users created with random passwords that must be reset on first login.
LDAP Authentication
See Security Configuration for complete LDAP setup.LDAP server hostname (comma-separated for failover)
LDAP server port (389 for StartTLS, 636 for LDAPS)
TLS mode:
starttls, ldaps, or noneService account DN for LDAP binding
Comma-separated list of base DNs for user search
OAuth2/OIDC
See Security Configuration for provider setup.OAuth2 client ID (replace
{PROVIDER} with provider name in uppercase)OAuth2 client secret
OIDC discovery URL (
.well-known/openid-configuration)TLS/SSL Configuration
Enable TLS for Phoenix server
Enable TLS for HTTP endpoints
Enable TLS for gRPC endpoints
Path to TLS certificate file (PEM format)
Path to TLS private key file (PEM format)
Password for encrypted private key
Path to CA certificate for client verification (mutual TLS)
Enable client certificate verification
Email (SMTP) Configuration
SMTP server hostname
SMTP server port (typically 587 for TLS, 465 for SSL)
SMTP authentication username
SMTP authentication password
Sender email address for system emails
Validate SMTP server TLS certificates
Logging
Application logging level:
debug, info, warning, error, criticalDatabase ORM logging level
Logging format:
default or structured (JSON)Log database migration operations
OpenTelemetry Instrumentation
HTTP endpoint for Phoenix server’s own traces
gRPC endpoint for Phoenix server’s own traces
Advanced Settings
Disable database migrations (for development only)
Use
CREATE INDEX CONCURRENTLY for PostgreSQL migrations (avoids table locks)Disable API rate limiting
Mask internal errors in GraphQL/REST responses
Configuration Examples
Development (SQLite)
Production (PostgreSQL + Auth)
AWS RDS with IAM Auth
Next Steps
Security
Configure authentication and encryption
Docker
Deploy with Docker and Docker Compose
Kubernetes
Deploy with Kubernetes and Helm