Creating, reading and changing data.

This core reference entry is suited for beginner-level builders.

Most Bubble apps will be managing data stored in a database. This section of the reference covers how you access data, manages and compares results, searching and setting up security.

Data sources: the source from which you fetch data

Data sources are where you get your data from when building a dynamic expression. It is going to be the first section of the expression. Sources of data can be the current user, a search from the database, data from an external API, some page and browser information, etc.

List of data sources

Operators and comparisons: change, evaluate and compare data

Operators and comparisons are used to work with the results of the data from the data source. For example:

Change (manipulate the data in real-time)

  • Change a text to uppercase

  • Add a number to an existing number

  • Add a number of days to a date

Evaluate/compare (return a yes or a no)

  • Check if data has a certain value (i.e. Name equals John)

  • Check if the current user is logged in

  • Check if a date is bigger than today's date

  • Check if the current user's age is the same as another user's age

List of Operators and Comparisons

Search: find the data you are looking for in the database

Searching is used to find specific data in the database. To do that, you instruct Bubble:

  • What kind of data you are looking for (i.e. Users or Products)

  • Provide constraints

List of search tools and settings

Privacy: setting up your database securely to maintain your user's privacy

Privacy and security are cornerstones of all apps that handle sensitive data.

List of privacy rule settings

Privacy and security can be a very important part of your app's structure, and we highly recommend that you familiarize yourself with the different tools Bubble offers. The core reference explains each setting, but if you are new to the subject, we encourage you to read through our user manual security guide:

User manual article series: Protecting data with privacy rules

Last updated