but optional for streaming replication.
Any %f> in the string is
replaced by the name of the file to retrieve from the archive,
- and any %p> is replaced by the path name to copy
- it to on the server.
+ and any %p> is replaced by the copy destination path name
+ on the server.
(The path name is relative to the current working directory,
i.e., the cluster's data directory.)
Any %r> is replaced by the name of the file containing the
last valid restart point. That is the earliest file that must be kept
to allow a restore to be restartable, so this information can be used
to truncate the archive to just the minimum required to support
- restart from the current restore. %r> would typically be
- used in a warm-standby configuration
+ restarting from the current restore. %r> is typically only
+ used by warm-standby configurations
(see ).
- Write %%> to embed an actual %> character
- in the command.
+ Write %%> to embed an actual %> character.
+
- It is important for the command to return a zero exit status if and
+ It is important for the command to return a zero exit status
only if it succeeds. The command will> be asked for file
names that are not present in the archive; it must return nonzero
when so asked. Examples:
Specifies recovering into a particular timeline. The default is
to recover along the same timeline that was current when the
- base backup was taken. You would only need to set this parameter
+ base backup was taken. You only need to set this parameter
in complex re-recovery situations, where you need to return to
a state that itself was reached after a point-in-time recovery.
See for discussion.
The ability to restore the database to a previous point in time creates
some complexities that are akin to science-fiction stories about time
- travel and parallel universes. In the original history of the database,
- perhaps you dropped a critical table at 5:15PM on Tuesday evening, but
+ travel and parallel universes. For example, in the original history of the database,
+ suppose you dropped a critical table at 5:15PM on Tuesday evening, but
didn't realize your mistake until Wednesday noon.
Unfazed, you get out your backup, restore to the point-in-time 5:14PM
Tuesday evening, and are up and running. In this> history of
- the database universe, you never dropped the table at all. But suppose
- you later realize this wasn't such a great idea after all, and would like
+ the database universe, you never dropped the table. But suppose
+ you later realize this wasn't such a great idea, and would like
to return to sometime Wednesday morning in the original history.
You won't be able
to if, while your database was up-and-running, it overwrote some of the
- sequence of WAL segment files that led up to the time you now wish you
- could get back to. So you really want to distinguish the series of
+ WAL segment files that led up to the time you now wish you
+ could get back to. Thus, to avoid this, you need to distinguish the series of
WAL records generated after you've done a point-in-time recovery from
those that were generated in the original database history.
- To deal with th
ese problems,
PostgreSQL> has a notion
- of timelines>. Whenever an archive recovery is completed,
+ To deal with th
is problem,
PostgreSQL> has a notion
+ of timelines>. Whenever an archive recovery completes,
a new timeline is created to identify the series of WAL records
generated after that recovery. The timeline
- ID number is part of WAL segment file names, and so a new timeline does
+ ID number is part of WAL segment file names so a new timeline does
not overwrite the WAL data generated by previous timelines. It is
in fact possible to archive many different timelines. While that might
seem like a useless feature, it's often a lifesaver. Consider the
until you find the best place to branch off from the old history. Without
timelines this process would soon generate an unmanageable mess. With
timelines, you can recover to any> prior state, including
- states in timeline branches that you later abandoned.
+ states in timeline branches that you abandoned earlier.
- E
ach time a new timeline is created,
PostgreSQL> creates
+ E
very time a new timeline is created,
PostgreSQL> creates
a timeline history> file that shows which timeline it branched
off from and when. These history files are necessary to allow the system
to pick the right WAL segment files when recovering from an archive that
archive area just like WAL segment files. The history files are just
small text files, so it's cheap and appropriate to keep them around
indefinitely (unlike the segment files which are large). You can, if
- you like, add comments to a history file to make your own notes about
- how and why this particular timeline came to be. Such comments will be
+ you like, add comments to a history file to record your own notes about
+ how and why this particular timeline was created. Such comments will be
especially valuable when you have a thicket of different timelines as
a result of experimentation.
The default behavior of recovery is to recover along the same timeline
- that was current when the base backup was taken. If you want to recover
+ that was current when the base backup was taken. If you wish to recover
into some child timeline (that is, you want to return to some state that
was itself generated after a recovery attempt), you need to specify the
target timeline ID in recovery.conf>. You cannot recover into
for point-in-time recovery, yet are typically much faster to backup and
restore than
pg_dump> dumps. (They are also much larger
than
pg_dump> dumps, so in some cases the speed advantage
- could be negated.)
+ might be negated.)
To prepare for standalone hot backups, set archive_mode> to
on>, and set up an archive_command> that performs
- archiving only when a <quote>switch file> exists. For example:
+ archiving only when a <emphasis>switch file> exists. For example:
archive_command = 'test ! -f /var/lib/pgsql/backup_in_progress || cp -i %p /var/lib/pgsql/archive/%f < /dev/null'
in continuous archiving mode, while each standby server operates in
continuous recovery mode, reading the WAL files from the primary. No
changes to the database tables are required to enable this capability,
- so it offers low administration overhead in comparison with some other
+ so it offers low administration overhead compared to some other
replication approaches. This configuration also has relatively low
performance impact on the primary server.
implements file-based log shipping, which means that WAL records are
transferred one file (WAL segment) at a time. WAL files (16MB) can be
shipped easily and cheaply over any distance, whether it be to an
- adjacent system, another system on the same site or another system on
+ adjacent system, another system at the same site, or another system on
the far side of the globe. The bandwidth required for this technique
varies according to the transaction rate of the primary server.
Record-based log shipping is also possible with custom-developed
failure: transactions not yet shipped will be lost. The length of the
window of data loss can be limited by use of the
archive_timeout parameter, which can be set as low
- as a few seconds if required. However such low settings will
- substantially increase the bandwidth requirements for file shipping.
+ as a few seconds if required. However such a low setting will
+ substantially increase the bandwidth required for file shipping.
If you need a window of less than a minute or so, it's probably better
- to look into record-based log shipping.
+ to consider record-based log shipping.
It is usually wise to create the primary and standby servers
so that they are as similar as possible, at least from the
perspective of the database server. In particular, the path names
- associated with tablespaces will be passed across as-is, so both
+ associated with tablespaces will be passed across unmodified, so both
primary and standby servers must have the same mount paths for
tablespaces if that feature is used. Keep in mind that if
is executed on the primary, any new mount point needed for it must
- be created on both the primary and all standby servers before the command
+ be created on the primary and all standby servers before the command
is executed. Hardware need not be exactly the same, but experience shows
that maintaining two identical systems is easier than maintaining two
dissimilar ones over the lifetime of the application and system.
In general, log shipping between servers running different major
- levels will not be possible. It is the policy of the PostgreSQL Global
+ levels is not possible. It is the policy of the PostgreSQL Global
Development Group not to make changes to disk formats during minor release
upgrades, so it is likely that running different minor release levels
on primary and standby servers will work successfully. However, no
There is no special mode required to enable a standby server. The
- operations that occur on both primary and standby servers are entirely
+ operations that occur on both primary and standby servers are
normal continuous archiving and recovery tasks. The only point of
contact between the two database servers is the archive of WAL files
that both share: primary writing to the archive, standby reading from
- the archive. Care must be taken to ensure that WAL archives for separate
+ the archive. Care must be taken to ensure that WAL archives from separate
primary servers do not become mixed together or confused. The archive
- need not be large, if it is only required for the standby operation.
+ need not be large if it is only required for standby operation.
as a
contrib> module named pg_standby>. It
should be used as a reference on how to correctly implement the logic
described above. It can also be extended as needed to support specific
- configurations or environments.
+ configurations and environments.
PostgreSQL does not provide the system
software required to identify a failure on the primary and notify
- the standby system and then the standby database server. Many such
- tools exist and are well integrated with other aspects required for
+ the standby database server. Many such tools exist and are well
+ integrated with the operating system facilities required for
successful failover, such as IP address migration.
- The means for triggering failover is an important part of planning and
- design. The restore_command> is executed in full once
- for each WAL file. The process running the restore_command>
- is therefore created and dies for each file, so there is no daemon
- or server process and so we cannot use signals and a signal
- handler. A more permanent notification is required to trigger the
- failover. It is possible to use a simple timeout facility,
- especially if used in conjunction with a known
- archive_timeout> setting on the primary. This is
- somewhat error prone since a network problem or busy primary server might
- be sufficient to initiate failover. A notification mechanism such
- as the explicit creation of a trigger file is less error prone, if
- this can be arranged.
+ The method for triggering failover is an important part of planning
+ and design. One potential option is the restore_command>
+ command. It is executed once for each WAL file, but the process
+ running the restore_command> is created and dies for
+ each file, so there is no daemon or server process, and we cannot
+ use signals or a signal handler. Therefore, the
+ restore_command> is not suitable to trigger failover.
+ It is possible to use a simple timeout facility, especially if
+ used in conjunction with a known archive_timeout>
+ setting on the primary. However, this is somewhat error prone
+ since a network problem or busy primary server might be sufficient
+ to initiate failover. A notification mechanism such as the explicit
+ creation of a trigger file is ideal, if this can be arranged.
option of the restore_command>. This option specifies the
last archive file name that needs to be kept to allow the recovery to
restart correctly. This can be used to truncate the archive once
- files are no longer required, if the archive is writable from the
+ files are no longer required, assuming the archive is writable from the
standby server.
- Set up primary and standby systems as near identically as
+ Set up primary and standby systems as nearly identical as
possible, including two identical copies of
PostgreSQL> at the same release level.
- Set up continuous archiving from the primary to a WAL archive located
- in a directory on the standby server. Ensure that
+ Set up continuous archiving from the primary to a WAL archive
+ directory on the standby server. Ensure that
,
and
- If the primary server fails and then immediately restarts, you must have
- a mechanism for informing it that it is no longer the primary. This is
- sometimes known as STONITH (Shoot the Other Node In The Head), which is
+ If the primary server fails and the standby server becomes the
+ new primary, and then the old primary restarts, you must have
+ a mechanism for informing old primary that it is no longer the primary. This is
+ sometimes known as STONITH (Shoot The Other Node In The Head), which is
necessary to avoid situations where both systems think they are the
primary, which will lead to confusion and ultimately data loss.
either on the former primary system when it comes up, or on a third,
possibly new, system. Once complete the primary and standby can be
considered to have switched roles. Some people choose to use a third
- server to provide backup to the new primary until the new standby
+ server to provide backup for the new primary until the new standby
server is recreated,
though clearly this complicates the system configuration and
operational processes.
to find out the file name and the exact byte offset within it of
the current end of WAL. It can then access the WAL file directly
and copy the data from the last known end of WAL through the current end
- over to the standby server(s). With this approach, the window for data
+ over to the standby servers. With this approach, the window for data
loss is the polling cycle time of the copying program, which can be very
- small, but there is no wasted bandwidth from forcing partially-used
+ small, and there is no wasted bandwidth from forcing partially-used
segment files to be archived. Note that the standby servers'
- restore_command> scripts still deal in whole WAL files,
+ restore_command> scripts can only deal with whole WAL files,
so the incrementally copied data is not ordinarily made available to
the standby servers. It is of use only when the primary dies —
then the last partial WAL file is fed to the standby before allowing
- it to come up. So correct implementation of this process requires
+ it to come up. The correct implementation of this process requires
cooperation of the restore_command> script with the data
copying program.
- If we take a backup of the standby server's data directory while it is processing
- logs shipped from the primary, we will be able to reload that data and
+ If we take a file system backup of the standby server's data
+ directory while it is processing
+ logs shipped from the primary, we will be able to reload that backup and
restart the standby's recovery process from the last restart point.
- We no longer need to keep WAL files from before the restart point.
+ We no longer need to keep WAL files from before the standby's restart point.
If we need to recover, it will be faster to recover from the incrementally
updated backup than from the original base backup.
backup. You can do this by running
pg_controldata>
on the standby server to inspect the control file and determine the
current checkpoint WAL location, or by using the
- log_checkpoints> option to print values to the server log.
+ log_checkpoints> option to print values to the standby's
+ server log.
- As a general rule, the internal data storage format is subject to
- change between major releases of
PostgreSQL> (where
- the number after the first dot changes). This does not apply to
- different minor releases under the same major release (where the
- number after the second dot changes); these always have compatible
- storage formats. For example, releases 8.1.1, 8.2.3, and 8.3 are
- not compatible, whereas 8.2.3 and 8.2.4 are. When you update
- between compatible versions, you can simply replace the executables
- and reuse the data directory on disk. Otherwise you need to back
- up your data and restore it on the new server. This has to be done
- using
pg_dump>; file system level backup methods
- obviously won't work. There are checks in place that prevent you
- from using a data directory with an incompatible version of
-
PostgreSQL, so no great harm can be done by
- trying to start the wrong server version on a data directory.
+
PostgreSQL> major versions are represented by the
+ first two digit groups of the version number, e.g. 8.4.
+
PostgreSQL> minor versions are represented by the
+ the third group of version digits, i.e., 8.4.2 is the second minor
+ release of 8.4. Minor releases never change the internal storage
+ format and are always compatible with earlier and later minor
+ releases of the same major version number, i.e. 8.4.2 is compatible
+ with 8.4, 8.4.1 and 8.4.6. To update between compatible versions,
+ you simply replace the executables while the server is down and
+ restart the server. The data directory remains unchanged —
+ minor upgrades are that simple.
+
+
+ For
major> releases of PostgreSQL>, the
+ internal data storage format is subject to change. When migrating
+ data from one major version of
PostgreSQL> to another,
+ you need to back up your data and restore it on the new server.
+ This must be done using
pg_dump>; file system level
+ backup methods will not work. There are checks in place that prevent
+ you from using a data directory with an incompatible version of
+
PostgreSQL, so no great harm can be done
+ by trying to start the wrong server version on a data directory.
It is recommended that you use the
pg_dump> and
pg_dumpall> programs from the newer version of
-
PostgreSQL>, to take advantage of any enhancements
+
PostgreSQL>, to take advantage of enhancements
that might have been made in these programs. Current releases of the
dump programs can read data from any server version back to 7.0.
pg_dumpall -p 5432 | psql -d postgres -p 6543
- to transfer your data. Or use an intermediate file if you want.
- Then you can shut down the old server and start the new server at
- the port the old one was running at. You should make sure that the
+ to transfer your data. Or use an intermediate file if you wish.
+ Then you can shut down the old server and start the new server using
+ the port the old one was running on. You should make sure that the
old database is not updated after you begin to run
pg_dumpall>, otherwise you will lose that data. See
linkend="client-authentication"> for information on how to prohibit
If you cannot or do not want to run two servers in parallel, you can
do the backup step before installing the new version, bring down
- the server, move the old version out of the way, install the new
+ the old server, move the old version out of the way, install the new
version, start the new server, and restore the data. For example:
pg_dumpall > backup
pg_ctl stop
mv /usr/local/pgsql /usr/local/pgsql.old
+# Rename any tablespace directories as well
cd ~/postgresql-&version;
gmake install
initdb -D /usr/local/pgsql/data
This is usually not a big problem, but if you plan on using two
installations in parallel for a while you should assign them
different installation directories at build time. (This problem
- is rectified in
PostgreSQL> 8.0 and later, so long
+ is rectified in
PostgreSQL> version 8.0 and later, so long
as you move all subdirectories containing installed files together;
for example if /usr/local/postgres/bin/> goes to
/usr/local/postgres.old/bin/>, then
-
+
inserted before a datum of this type so that it begins on the
specified boundary. The alignment reference is the beginning
of the first datum in the sequence.
+
+
Possible values are:
-
+
Localization>
This chapter describes the available localization features from the
point of view of the administrator.
-
PostgreSQL supports
localization with
- two approaches:
+
PostgreSQL supports
two localization
+ facilities:
(sv>) as spoken
in Sweden (SE>). Other possibilities might be
en_US> (U.S. English) and fr_CA> (French
- Canadian). If more than one character set can be useful for a
+ Canadian). If more than one character set can be used for a
locale then the specifications look like this:
- cs_CZ.ISO8859-2>. What locales are available under what
- names on your system depends on what was provided by the operating
+ cs_CZ.ISO8859-2>. What locales are available on your
+ system under what names depends on what was provided by the operating
system vendor and what was installed. On most Unix systems, the command
locale -a> will provide a list of available locales.
Windows uses more verbose locale names, such as German_Germany>
Occasionally it is useful to mix rules from several locales, e.g.,
use English collation rules but Spanish messages. To support that, a
- set of locale subcategories exist that control only a certain
- aspect of the localization rules:
+ set of locale subcategories exist that control only certain
+ aspects of the localization rules:
- The nature of some locale categories is that their value has to be
+ Some locale categories must have their values
fixed when the database is created. You can use different settings
for different databases, but once a database is created, you cannot
change them for that database anymore. LC_COLLATE
- and LC_CTYPE are these categories. They affect
+ and LC_CTYPE are these type of categories. They affect
the sort order of indexes, so they must be kept fixed, or indexes on
- text columns will become corrupt. The default values for these
+ text columns would become corrupt. The default values for these
categories are determined when initdb is run, and
those values are used when new databases are created, unless
specified otherwise in the CREATE DATABASE command.
linkend="runtime-config-client-format"> for details). The values
that are chosen by initdb are actually only written
into the configuration file postgresql.conf to
- serve as defaults when the server is started. If you delete these
+ serve as defaults when the server is started. If you disable these
assignments from postgresql.conf then the
server will inherit the settings from its execution environment.
settings for the purpose of setting the language of messages. If
in doubt, please refer to the documentation of your operating
system, in particular the documentation about
-
gettext>, for more information.
An important restriction, however, is that each database's character set
- must be compatible with the database's LC_CTYPE> and
- LC_COLLATE> locale settings. For C> or
+ must be compatible with the database's LC_CTYPE> (character
+ classification) and LC_COLLATE> (string sort order) locale
+ settings. For C> or
POSIX> locale, any character set is allowed, but for other
locales there is only one character set that will work correctly.
(On Windows, however, UTF-8 encoding can be used with any locale.)
LATIN1 with Euro and accents
Yes
1
- ISO885915
+ ISO885915>
|
LATIN10
- Not all
API>s support all the listed character sets. For example, the
+ Not all
client API>s support all the listed character sets. For example, the
JDBC driver does not support MULE_INTERNAL>, LATIN6>,
LATIN8>, and LATIN10>.
much a declaration that a specific encoding is in use, as a declaration
of ignorance about the encoding. In most cases, if you are
working with any non-ASCII data, it is unwise to use the
- SQL_ASCII> setting, because
+ SQL_ASCII> setting because
PostgreSQL will be unable to help you by
converting or validating non-ASCII characters.
Setting the Character Set
- initdb> defines the default character set
+ initdb> defines the default character set (encoding)
for a
PostgreSQL cluster. For example,
initdb -E EUC_JP
- sets the default character set (encoding) to
+ sets the default character set to
EUC_JP (Extended Unix Code for Japanese). You
can use instead of
- if you prefer to type longer option strings.
+ if you prefer longer option strings.
If no option is
given, initdb> attempts to determine the appropriate
encoding to use based on the specified or default locale.
The encoding for a database is stored in the system catalog
pg_database. You can see it by using the
- <option>-l option or the \l command
- of psql.
+ <command>psql option or the
+ \l command.
$ psql -l
On most modern operating systems,
PostgreSQL
- can determine which character set is implied by an LC_CTYPE>
+ can determine which character set is implied by the LC_CTYPE>
setting, and it will enforce that only the matching database encoding is
used. On older systems it is your responsibility to ensure that you use
the encoding expected by the locale you have selected. A mistake in
- this area is likely to lead to strange misbehavior of locale-dependent
+ this area is likely to lead to strange behavior of locale-dependent
operations such as sorting.
If the conversion of a particular character is not possible
— suppose you chose EUC_JP for the
- server and LATIN1 for the client, then some
- Japanese characters do not have a representation in
- LATIN1 — then an error is reported.
+ server and LATIN1 for the client, and some
+ Japanese characters are returned that do not have a representation in
+ LATIN1 — an error is reported.
+
UTF-8 (8-bit UCS/Unicode Transformation
+ Format) is defined here.
-
+
Client Authentication
hostnossl
- This record type has the opposite logic to hostssl>:
+ This record type has the opposite behavior of hostssl>;
it only matches connection attempts made over
TCP/IP that do not use
SSL.
Specifies the client machine IP address range that this record
matches. This field contains an IP address in standard dotted decimal
- notation and a CIDR mask length. (IP addresses can only be
+ notation and a
CIDR> mask length. (IP addresses can only be
specified numerically, not as domain or host names.) The mask
length indicates the number of high-order bits of the client
IP address that must match. Bits to the right of this must
Typical examples of a CIDR-address are
172.20.143.89/32 for a single host, or
172.20.143.0/24 for a small network, or
- 10.6.0.0/16 for a larger one.
+ 10.6.0.0/16 for a larger one.
+ 0.0.0.0/0 (all balls>) represents all addresses.
To specify a single host, use a CIDR mask of 32 for IPv4 or
128 for IPv6. In a network address, do not omit trailing zeroes.
Allow the connection unconditionally. This method
allows anyone that can connect to the
PostgreSQL database server to login as
- any
PostgreSQL user they
like,
- without the need for a password. See
+ any
PostgreSQL user they
wish,
+ without the need for a password
or any other authentication. See
linkend="auth-trust"> for details.
Reject the connection unconditionally. This is useful for
- filtering out> certain hosts from a group.
+ filtering out> certain hosts from a group, e.g. a
+ reject> line blocks a specific host from connecting,
+ but a later line allows the remaining hosts in a specific
+ network to connect.
ldap>
- Authenticate using an
LDAP server. See
+ Authenticate using an
LDAP> server. See
linkend="auth-ldap"> for details.
the main server process receives a
signal. If you edit the file on an
- active system, you will need to signal the server
+ active system, you will need to signal the postmaster
(using pg_ctl reload> or kill -HUP>) to make it
re-read the file.
CONNECT> privilege for the database. If you wish to
restrict which users can connect to which databases, it's usually
easier to control this by granting/revoking CONNECT> privilege
- than to put the rules into pg_hba.conf entries.
+ than to put the rules in pg_hba.conf entries.
Example pg_hba.conf entries
-# Allow any user on the local system to connect to any database under
+# Allow any user on the local system to connect to any database with
# any database user name using Unix-domain sockets (the default for local
# connections).
#
# Allow any user from any host with IP address 192.168.93.x to connect
# to database "postgres" as the same user name that ident reports for
-# the connection (typically the Unix user name).
+# the connection (typically the operating system user name).
#
# TYPE DATABASE USER CIDR-ADDRESS METHOD
host postgres all 192.168.93.0/24 ident
# In the absence of preceding "host" lines, these two lines will
# reject all connections from 192.168.54.1 (since that entry will be
# matched first), but allow Kerberos 5 connections from anywhere else
-# on the Internet. The zero mask means that no bits of the host IP
-# address are considered so it matches any host.
+# on the Internet. The zero mask causes no bits of the host IP
+# address to be considered, so it matches any host.
#
# TYPE DATABASE USER CIDR-ADDRESS METHOD
host all all 192.168.54.1/32 reject
when the main server process receives a
signal. If you edit the file on an
- active system, you will need to signal the server
+ active system, you will need to signal the postmaster
(using pg_ctl reload> or kill -HUP>) to make it
re-read the file.
A pg_ident.conf file that could be used in
conjunction with the
pg_hba.conf> file in
linkend="example-pg-hba.conf"> is shown in
- linkend="example-pg-ident.conf">. In this example setup, anyone
+ linkend="example-pg-ident.conf">. In this example, anyone
logged in to a machine on the 192.168 network that does not have the
- Unix user name bryanh>, ann>, or
+ operating system user name bryanh>, ann>, or
robert> would not be granted access. Unix user
robert> would only be allowed access when he tries to
connect as
PostgreSQL> user bob>, not
as robert> or anyone else. ann> would
only be allowed to connect as ann>. User
bryanh> would be allowed to connect as either
- bryanh> himself or as guest1>.
+ bryanh> or as guest1>.
The password-based authentication methods are md5>
and password>. These methods operate
similarly except for the way that the password is sent across the
- connection: respectively, MD5-hashed and clear-text.
+ connection, i.e. respectively, MD5-hashed and clear-text.
catalog. Passwords can be managed with the SQL commands
and
,
- e.g., CREATE USER foo WITH PASSWORD 'secret';.
- By default, that is, if no password has been set up, the stored password
+ e.g., CREATE USER foo WITH PASSWORD 'secret'.
+ If no password has been set up for a user, the stored password
is null and password authentication will always fail for that user.
authentication according to RFC 1964.
GSSAPI
provides automatic authentication (single sign-on) for systems
that support it. The authentication itself is secure, but the
- data sent over the database connection will be in clear unless
+ data sent over the database connection will be send unencrypted unless
When using
Kerberos authentication,
for details.
Kerberos is an industry-standard secure
authentication system suitable for distributed computing over a public
network. A description of the
Kerberos system
- is far beyond the scope of this document; in full generality it can be
+ is beyond the scope of this document; in full generality it can be
quite complex (yet powerful). The
changed from the default postgres at build time using
./configure --with-krb-srvnam=>whatever>.
In most environments,
- this parameter never needs to be changed. However, to support multiple
-
PostgreSQL> installations on the same host it is necessary.
+ this parameter never needs to be changed. However, it is necessary
+ when supporting multiple
PostgreSQL> installations
+ on the same host.
Some Kerberos implementations might also require a different service name,
such as Microsoft Active Directory which requires the service name
to be in uppercase (POSTGRES).
of the key file is specified by the
linkend="guc-krb-server-keyfile"> configuration
parameter. The default is
- /usr/local/pgsql/etc/krb5.keytab> (or whichever
+ /usr/local/pgsql/etc/krb5.keytab> (or whatever
directory was specified as sysconfdir> at build time).
Apache web server, you can use
AuthType KerberosV5SaveCredentials with a
mod_perl script. This gives secure
- database access over the web, no extra passwords required.
+ database access over the web, with no additional passwords required.
Since
PostgreSQL> knows both X> and
Y> when a physical connection is established, it
can interrogate the ident server on the host of the connecting
- client and could theoretically determine the operating system user
- for any given connection this way.
+ client and can theoretically determine the operating system user
+ for any given connection.
The drawback of this procedure is that it depends on the integrity
- of the client: if the client machine is untrusted or compromised
+ of the client: if the client machine is untrusted or compromised,
an attacker could run just about any program on port 113 and
return any user name he chooses. This authentication method is
therefore only appropriate for closed networks where each client
The server log might contain more information about an
authentication failure than is reported to the client. If you are
- confused about the reason for a failure, check the log.
+ confused about the reason for a failure, check the server log.
-
+
Server Configuration
All parameter names are case-insensitive. Every parameter takes a
value of one of five types: Boolean, integer, floating point,
- string or enum. Boolean values can be written as ON,
- OFF, TRUE,
- FALSE, YES,
- NO, 1, 0
+ string or enum. Boolean values can be written as on,
+ off, true,
+ false, yes,
+ no, 1, 0
(all case-insensitive) or any unambiguous prefix of these.
One parameter is specified per line. The equal sign between name and
value is optional. Whitespace is insignificant and blank lines are
- ignored. Hash marks (#) introduce comments
- anywhere. Parameter values that are not simple identifiers or
+ ignored. Hash marks (#) designate the rest of the
+ line as a comment. Parameter values that are not simple identifiers or
numbers must be single-quoted. To embed a single quote in a parameter
value, write either two quotes (preferred) or backslash-quote.
values for the parameter. Some parameters cannot be changed via
SET: for example, if they control behavior that
cannot be changed without restarting the entire
-
PostgreSQL server. Also,
some parameters can
- be modified via SET or ALTER> by superusers,
- but not by ordinary users.
+
PostgreSQL server. Also,
+ some SET or ALTER> parameter modifications
+ require superuser permission.
at all, in which case only Unix-domain sockets can be used to connect
to it.
The default value is localhost>,
- which allows only local loopback> connections to be
+ which allows only local TCP/IP loopback> connections to be
made. While client authentication (
linkend="client-authentication">) allows fine-grained control
over who can access the server, listen_addresses
server.) In combination with the parameter
unix_socket_permissions this can be used as
an additional access control mechanism for Unix-domain connections.
- By default this is the empty string, which selects the default
- group for the current user. This parameter can only be set at
+ By default this is the empty string, which uses the default
+ group of the server user. This parameter can only be set at
server start.
Sets the access permissions of the Unix-domain socket. Unix-domain
sockets use the usual Unix file system permission set.
The parameter value is expected to be a numeric mode
- specification in the form accepted by the
+ specified in the format accepted by the
chmod and umask
system calls. (To use the customary octal format the number
must start with a 0 (zero).)
0770 (only user and group, see also
unix_socket_group) and 0700
(only user). (Note that for a Unix-domain socket, only write
- permission matters and so there is no point in setting or revoking
+ permission matters, so there is no point in setting or revoking
read or execute permissions.)
Maximum time to complete client authentication, in seconds. If a
would-be client has not completed the authentication protocol in
- this much time, the server breaks the connection. This prevents
+ this much time, the server closes the connection. This prevents
hung clients from occupying a connection indefinitely.
The default is one minute (1m>).
This parameter can only be set in the postgresql.conf>
With this parameter enabled, you can still create ordinary global
users. Simply append @> when specifying the user
- name in the client. The @> will be stripped off
- before the user name is looked up by the server.
+ name in the client, e.g. joe@>. The @>
+ will be stripped off before the user name is looked up by the
+ server.
session. These are session-local buffers used only for access to
temporary tables. The default is eight megabytes
(8MB>). The setting can be changed within individual
- sessions, but only up until the first use of temporary tables
- within a session; subsequent attempts to change the value will
+ sessions, but only before the first use of temporary tables
+ within the session; subsequent attempts to change the value will
have no effect on that session.
A session will allocate temporary buffers as needed up to the limit
given by temp_buffers>. The cost of setting a large
- value in sessions that do not actually need a lot of temporary
+ value in sessions that do not actually need many temporary
buffers is only a buffer descriptor, or about 64 bytes, per
increment in temp_buffers>. However if a buffer is
actually used an additional 8192 bytes will be consumed for it
Specifies the amount of memory to be used by internal sort operations
- and hash tables before switching to temporary disk files. The value
+ and hash tables before writing to temporary disk files. The value
defaults to one megabyte (1MB>).
Note that for a complex query, several sort or hash operations might be
- running in parallel; each one will be allowed to use as much memory
- as this value specifies before it starts to put data into temporary
+ running in parallel; each operation will be allowed to use as much memory
+ as this value specifies before it starts to write data into temporary
files. Also, several running sessions could be doing such operations
- concurrently. So the total memory used could be many
+ concurrently. Therefore, the total memory used could be many
times the value of work_mem; it is necessary to
keep this fact in mind when choosing the value. Sort operations are
used for ORDER BY>, DISTINCT>, and
- Specifies the maximum amount of memory to be used in maintenance
+ Specifies the maximum amount of memory to be used by maintenance
operations, such as VACUUM, CREATE
INDEX>, and ALTER TABLE ADD FOREIGN KEY>. It defaults
to 16 megabytes (16MB>). Since only one of these
the actual kernel limit will mean that a runaway recursive function
can crash an individual backend process. On platforms where
PostgreSQL can determine the kernel limit,
- it will not let you set this variable to an unsafe value. However,
- not all platforms provide the information, so caution is recommended
- in selecting a value.
+ the server will not allow this variable to be set to an unsafe
+ value. However, not all platforms provide the information,
+ so caution is recommended in selecting a value.
a safe per-process limit, you don't need to worry about this setting.
But on some platforms (notably, most BSD systems), the kernel will
allow individual processes to open many more files than the system
- can really support when a large number of processes all try to open
+ can actually support if many processes all try to open
that many files. If you find yourself seeing Too many open
files> failures, try reducing this setting.
This parameter can only be set at server start.
- This variable specifies one or more shared libraries that are
- to be preloaded at server start. If more than one library is to be
- loaded, separate their names with commas. For example,
+ This variable specifies one or more shared libraries
+ to be preloaded at server start. For example,
'$libdir/mylib' would cause
mylib.so> (or on some platforms,
mylib.sl>) to be preloaded from the installation's
standard library directory.
- This parameter can only be set at server start.
+ If more than one library is to be loaded, separate their names
+ with commas. This parameter can only be set at server start.
various I/O operations that are performed. When the accumulated
cost reaches a limit (specified by
vacuum_cost_limit), the process performing
- the operation will sleep for a while (specified by
- vacuum_cost_delay). Then it will reset the
+ the operation will sleep for a short period of time, as specified by
+ vacuum_cost_delay. Then it will reset the
counter and continue execution.
The intent of this feature is to allow administrators to reduce
the I/O impact of these commands on concurrent database
- activity. There are many situations in which it is not very
+ activity. There are many situations where it is not
important that maintenance commands like
VACUUM and ANALYZE finish
quickly; however, it is usually very important that these
There is a separate server
process called the background writer>, whose function
- is to issue writes of dirty> shared buffers. The intent is
- that server processes handling user queries should seldom or never have
- to wait for a write to occur, because the background writer will do it.
- However there is a net overall
- increase in I/O load, because a repeatedly-dirtied page might
- otherwise be written only once per checkpoint interval, but the
- background writer might write it several times in the same interval.
- The parameters discussed in this subsection can be used to
- tune the behavior for local needs.
+ is to issue writes of dirty> (new or modified) shared
+ buffers. It writes shared buffers so server processes handling
+ user queries seldom or never need to wait for a write to occur.
+ However, the background writer does cause a net overall
+ increase in I/O load, because while a repeatedly-dirtied page might
+ otherwise be written only once per checkpoint interval, the
+ background writer might write it several times as it is dirtied
+ in the same interval. The parameters discussed in this subsection
+ can be used to tune the behavior for local needs.
allowed to do its best in buffering, ordering, and delaying
writes. This can result in significantly improved performance.
However, if the system crashes, the results of the last few
- committed transactions might be lost in part or whole. In the
+ committed transactions might be completely lost, or worse,
+ might appear partially committed, leaving the database in an
+ inconsistent state. In the
worst case, unrecoverable data corruption might occur.
(Crashes of the database software itself are not>
a risk factor here. Only an operating-system-level crash
- This parameter can only be set in the postgresql.conf>
+ fsync can only be set in the postgresql.conf>
file or on the server command line.
If you turn this parameter off, also consider turning off
.
Method used for forcing WAL updates out to disk.
If fsync is off then this setting is irrelevant,
- since updates will not be forced out at all.
+ since WAL file updates will not be forced out at all.
Possible values are:
that contains a mix of old and new data. The row-level change data
normally stored in WAL will not be enough to completely restore
such a page during post-crash recovery. Storing the full page image
- guarantees that the page can be correctly restored, but at a price
- in increasing the amount of data that must be written to WAL.
+ guarantees that the page can be correctly restored, but at the price
+ of increasing the amount of data that must be written to WAL.
(Because WAL replay always starts from a checkpoint, it is sufficient
to do this during the first change of each page after a checkpoint.
Therefore, one way to reduce the cost of full-page writes is to
fsync>, though smaller. It might be safe to turn off
this parameter if you have hardware (such as a battery-backed disk
controller) or file-system software that reduces
- the risk of partial page writes to an acceptably low level (e.g., ReiserFS 4).
+ the risk of partial page writes to an acceptably low level (e.g., ZFS).
- Specifies the target length of checkpoints, as a fraction of
- the checkpoint interval. The default is 0.5.
+ Specifies the target of checkpoint completion, as a fraction of
+ total time between checkpoints. The default is 0.5.
This parameter can only be set in the postgresql.conf>
file or on the server command line.
When archive_mode> is enabled, completed WAL segments
- can be sent to archive storage by setting
+ are sent to archive storage by setting
.
archive_mode> and archive_command> are
separate variables so that archive_command> can be
- The shell command to execute to archive a completed segment of
- the WAL file series. Any %p> in the string is
+ The shell command to execute to archive a completed WAL file
+ segment. Any %p> in the string is
replaced by the path name of the file to archive, and any
- %f> is replaced by the file name only.
+ %f> is replaced by only the file name.
(The path name is relative to the working directory of the server,
i.e., the cluster's data directory.)
Use %%> to embed an actual %> character in the
file or on the server command line. It is ignored unless
archive_mode> was enabled at server start.
If archive_command> is an empty string (the default) while
- archive_mode> is enabled, then WAL archiving is temporarily
+ archive_mode> is enabled, WAL archiving is temporarily
disabled, but the server continues to accumulate WAL segment files in
- the expectation that a command will soon be provided.
+ the expectation that a command will soon be provided. Setting
+ archive_mode> to a command that does nothing but
+ return true, e.g. /bin/true>, effectively disables
+ archiving, but also breaks the chain of WAL files needed for
+ archive recovery, so it should only be used in unusual circumstances.
It is important for the command to return a zero exit status if
- The is only invoked on
+ The is only invoked for
completed WAL segments. Hence, if your server generates little WAL
traffic (or has slack periods where it does so), there could be a
long delay between the completion of a transaction and its safe
- recording in archive storage. To put a limit on how old unarchived
+ recording in archive storage. To limit how old unarchived
data can be, you can set archive_timeout> to force the
server to switch to a new WAL segment file periodically. When this
parameter is greater than zero, the server will switch to a new
These configuration parameters provide a crude method of
influencing the query plans chosen by the query optimizer. If
the default plan chosen by the optimizer for a particular query
- is not optimal, a temporary solution can be found by using one
+ is not optimal, a temporary> solution is to use one
of these configuration parameters to force the optimizer to
- choose a different plan. Turning one of these settings off
- permanently is seldom a good idea, however.
+ choose a different plan.
Better ways to improve the quality of the
plans chosen by the optimizer include adjusting the
linkend="runtime-config-query-constants"
- endterm="runtime-config-query-constants-title">, running
- linkend="sql-analyze" endterm="sql-analyze-title"> more
-
frequently, increasing the value of the
+ endterm="runtime-config-query-constants-title">,
running
+ linkend="sql-analyze" endterm="sql-analyze-title"> manually, increasing
+ the value of the
linkend="guc-default-statistics-target"> configuration parameter,
and increasing the amount of statistics collected for
specific columns using ALTER TABLE SET
Enables or disables the query planner's use of nested-loop join
- plans. It's not possible to suppress nested-loop joins entirely,
+ plans. It is impossible to suppress nested-loop joins entirely,
but turning this variable off discourages the planner from using
one if there are other methods available. The default is
on>.
Enables or disables the query planner's use of sequential scan
- plan types. It's not possible to suppress sequential scans
+ plan types. It is impossible to suppress sequential scans
entirely, but turning this variable off discourages the planner
from using one if there are other methods available. The
default is on>.
Enables or disables the query planner's use of explicit sort
- steps. It's not possible to suppress explicit sorts entirely,
+ steps. It is impossible to suppress explicit sorts entirely,
but turning this variable off discourages the planner from
using one if there are other methods available. The default
is on>.
The cost> variables described in this section are measured
on an arbitrary scale. Only their relative values matter, hence
scaling them all up or down by the same factor will result in no change
- in the planner's choices. Traditionally, these variables have been
- referenced to sequential page fetches as the unit of cost; that is,
+ in the planner's choices. By default, these cost variables are based on
+ the cost of sequential page fetches; that is,
seq_page_cost> is conventionally set to 1.0>
and the other cost variables are set with reference to that. But
you can use a different scale if you prefer, such as actual execution
Unfortunately, there is no well-defined method for determining ideal
values for the cost variables. They are best treated as averages over
- the entire mix of queries that a particular installation will get. This
+ the entire mix of queries that a particular installation will receive. This
means that changing them on the basis of just a few experiments is very
risky.
Enables or disables genetic query optimization.
This is on by default. It is usually best not to turn it off in
- production; the geqo_threshold variable provides a
- more granular way to control use of GEQO.
+ production; the geqo_threshold variable provides
+ more granular control of GEQO.
FULL OUTER JOIN> construct counts as only one FROM>
item.) The default is 12. For simpler queries it is usually best
to use the deterministic, exhaustive planner, but for queries with
- many tables the deterministic planner takes too long.
+ many tables the deterministic planner takes too long, often
+ longer than the penalty of executing a suboptimal plan.
- Sets the default statistics target for table columns that have
- not had a column-specific target set via ALTER TABLE
+ Sets the default statistics target for table columns without
+ a column-specific target set via ALTER TABLE
SET STATISTICS>. Larger values increase the time needed to
do ANALYZE>, but might improve the quality of the
planner's estimates. The default is 100. For more information
partition> (examine constraints only for inheritance child
tables and UNION ALL> subqueries).
partition> is the default setting.
-
+ It is often used with inheritance and partitioned tables to
+ improve performance.
+
When this parameter allows it for a particular table, the planner
With constraint exclusion enabled, this SELECT>
- will not scan child1000> at all. This can
- improve performance when inheritance is used to build
- partitioned tables.
+ will not scan child1000> at all, improving performance.
for most uses. Setting it to 1 prevents any reordering of
explicit JOIN>s. Thus, the explicit join order
specified in the query will be the actual order in which the
- relations are joined. The query planner does not always choose
- the optimal join order; advanced users can elect to
+ relations are joined. Because the query planner does not always choose
+ the optimal join order, advanced users can elect to
temporarily set this variable to 1, and then specify the join
order they desire explicitly.
For more information see .
If csvlog> is included in log_destination>,
log entries are output in comma separated
- value> format, which is convenient for loading them into programs.
+ value> (
CSV>) format, which is convenient for
+ loading logs into programs.
See for details.
logging_collector must be enabled to generate
CSV-format log output.
LOCAL0> through LOCAL7> (see
linkend="guc-syslog-facility">), but the default
syslog configuration on most platforms
- will discard all such messages. You will need to add something like
+ will discard all such messages. You will need to add something like:
local0.* /var/log/postgresql
- This parameter allows messages sent to
stderr>,
- and CSV-format log output, to be
- captured and redirected into log files.
+ This parameter captures plain and CSV-format log messages
+ sent to
stderr> and redirects them into log files.
This approach is often more useful than
logging to
syslog>, since some types of messages
might not appear in
syslog> output (a common example
Controls the amount of detail written in the server log for each
message that is logged. Valid values are TERSE>,
DEFAULT>, and VERBOSE>, each adding more
- fields to displayed messages.
+ fields to displayed messages. VERBOSE> logging
+ output includes the
+ linkend="errcodes-appendix">SQLSTATE> error
+ code and the source code file name, function name,
+ and line number that generated the error.
Only superusers can change this setting.
- Controls whether or not the SQL statement that causes an error
- condition will be recorded in the server log. The current
+ Controls which SQL statements that cause an error
+ condition are recorded in the server log. The current
SQL statement is included in the log entry for any message of
the specified severity or higher.
Valid values are DEBUG5,
By default, connection log messages only show the IP address of the
- connecting host. Turning on this parameter causes logging of the
+ connecting host. Turning this parameter on causes logging of the
host name as well. Note that depending on your host name resolution
setup this might impose a non-negligible performance penalty.
This parameter can only be set in the postgresql.conf>
If you set a nonempty value for log_line_prefix>,
you should usually make its last character be a space, to provide
visual separation from the rest of the log line. A punctuation
- character could be used too.
+ character can be used too.
- Controls logging of use of temporary files.
+ Controls logging of temporary file names and sizes.
Temporary files can be
created for sorts, hashes, and temporary query results.
A log entry is made for each temporary file when it is deleted.
- A value of zero logs all temporary files, while positive
+ A value of zero logs all temporary file information, while positive
values log only files whose size is greater than or equal to
the specified number of kilobytes. The
default setting is -1>, which disables such logging.
Sets the time zone used for timestamps written in the log.
Unlike , this value is cluster-wide,
so that all sessions will report timestamps consistently.
- The default is unknown>, which means to use whatever
+ The default is unknown>, which means use whatever
the system environment specifies as the time zone. See
linkend="datatype-timezones"> for more information.
This parameter can only be set in the postgresql.conf>
Including csvlog> in the log_destination> list
provides a convenient way to import log files into a database table.
- This option emits log lines in comma-separated-value format,
+ This option emits log lines in comma-separated-values
with these columns:
timestamp with milliseconds,
user name,
There are a few things you need to do to simplify importing CSV log
- files easily and automatically:
+ files:
Enables the collection of information on the currently
- executing command of each session, along with the time at
- which that command began execution. This parameter is on by
+ executing command of each session, along with the time when
+ that command began execution. This parameter is on by
default. Note that even when enabled, this information is not
visible to all users, only to superusers and the user owning
- the session being reported on; so it should not represent a
+ the session being reported on, so it should not represent a
security risk.
Only superusers can change this setting.
Sets the directory to store temporary statistics data in. This can be
a path relative to the data directory or an absolute path. The default
- is pg_stat_tmp. Pointing this at a RAM based
- filesystem will decrease physical I/O requirements and can lead to
+ is pg_stat_tmp. Pointing this at a RAM-based
+ file system will decrease physical I/O requirements and can lead to
improved performance.
This parameter can only be set in the postgresql.conf>
file or on the server command line.
- For each query, write performance statistics of the respective
+ For each query, output performance statistics of the respective
module to the server log. This is a crude profiling
- instrument. log_statement_stats reports total
+ instrument, similar to the Unix getrusage()> operating
+ system facility. log_statement_stats reports total
statement statistics, while the others report per-module statistics.
log_statement_stats cannot be enabled together with
any of the per-module options. All of these options are disabled by
Controls whether the server should run the
autovacuum launcher daemon. This is on by default; however,
- must also be turned on for
+ must also be enabled for
autovacuum to work.
This parameter can only be set in the postgresql.conf>
file or on the server command line.
database. In each round the daemon examines the
database and issues VACUUM> and ANALYZE> commands
as needed for tables in that database. The delay is measured
- in seconds, and the default is one minute (1m>).
+ in seconds, and the default is one minute (1min>).
This parameter can only be set in the postgresql.conf>
file or on the server command line.
This variable specifies the order in which schemas are searched
when an object (table, data type, function, etc.) is referenced by a
- simple name with no schema component. When there are objects of
+ simple name with no schema specified. When there are objects of
identical names in different schemas, the one found first
in the search path is used. An object that is not in any of the
schemas in the search path can only be referenced by specifying
- The value for search_path has to be a comma-separated
+ The value for search_path must be a comma-separated
list of schema names. If one of the list items is
the special value $user, then the schema
having the name returned by SESSION_USER> is substituted, if there
pg_temp_nnn>>, is always searched if it
exists. It can be explicitly listed in the path by using the
alias pg_temp>. If it is not listed in the path then
- it is searched first (before even pg_catalog>). However,
+ it is searched first (even before pg_catalog>). However,
the temporary schema is only searched for relation (table, view,
- sequence, etc) and data type names. It will never be searched for
+ sequence, etc) and data type names. It is never searched for
function or operator names.
current_schemas()>. This is not quite the same as
examining the value of search_path, since
- current_schemas()> shows how the requests
+ current_schemas()> shows how the items
appearing in search_path were resolved.
- This variable specifies tablespace(s) in which to create temporary
+ This variable specifies tablespaces in which to create temporary
objects (temp tables and indexes on temp tables) when a
CREATE> command does not explicitly specify a tablespace.
Temporary files for purposes such as sorting large data sets
- are also created in these tablespace(s).
+ are also created in these tablespaces.
milliseconds, starting from the time the command arrives at the server
from the client. If log_min_error_statement> is set to
ERROR> or lower, the statement that timed out will also be
- logged. A value of zero (the default) turns off the
- limitation.
+ logged. A value of zero (the default) turns this off.
Only superusers can change this setting, because it affects the
- messages sent to the server log as well as to the client.
+ messages sent to the server log as well as to the client, and
+ an improper value might obscure the readability of the server
+ logs.
- The value for dynamic_library_path has to be a
+ The value for dynamic_library_path must be a
list of absolute directory paths separated by colons (or semi-colons
on Windows). If a list element starts
with the special string $libdir, the
compiled-in
PostgreSQL package
- library directory is substituted for $libdir. This
+ library directory is substituted for $libdir; this
is where the modules provided by the standard
PostgreSQL distribution are installed.
(Use pg_config --pkglibdir to find out the name of
- Soft upper limit of the size of the set returned by GIN index. For more
+ Soft upper limit of the size of the set returned by GIN index scans. For more
information see .
- There is no performance advantage to loading a library at session
+ Unlike local_preload_libraries>, there is no
+ performance advantage to loading a library at session
start rather than when it is first used. Rather, the intent of
this feature is to allow debugging or performance-measurement
libraries to be loaded into specific sessions without an explicit
This is the amount of time, in milliseconds, to wait on a lock
before checking to see if there is a deadlock condition. The
- check for deadlock is relatively slow, so the server doesn't run
+ check for deadlock is relatively expensive, so the server doesn't run
it every time it waits for a lock. We optimistically assume
that deadlocks are not common in production applications and
- just wait on the lock for a while before starting the check for a
+ just wait on the lock for a while before checking for a
deadlock. Increasing this value reduces the amount of time
wasted in needless deadlock checks, but slows down reporting of
real deadlock errors. The default is one second (1s>),
- The shared lock table is created to track locks on
+ The shared lock table tracks locks on
max_locks_per_transaction * (
linkend="guc-max-connections"> +
linkend="guc-max-prepared-transactions">) objects (e.g., tables);
Note that in a standard-conforming string literal, \> just
- means \> anyway. This parameter affects the handling of
+ means \> anyway. This parameter only affects the handling of
non-standard-conforming literals, including
escape string syntax (E'...'>).
newly-created tables, if neither WITH OIDS
nor WITHOUT OIDS is specified. It also
determines whether OIDs will be included in tables created by
-
SELECT INTO. In
PostgreSQL>
- 8.1 default_with_oids> is off> by default; in
- prior versions of
PostgreSQL, it
+ SELECT INTO. The parameter is off>
+ by default; in
PostgreSQL> 8.0 and earlier, it
was on by default.
This controls the inheritance semantics. If turned off>,
- subtables are not included by various commands by default; basically
+ subtables are not accessed by various commands by default; basically
an implied ONLY key word. This was added for
compatibility with releases prior to 7.1. See
for more information.
PostgreSQL to have its historical
behavior of treating backslashes as escape characters.
The default will change to on> in a future release
- to improve compatibility with the standard.
+ to improve compatibility with the SQL standard.
Applications can check this
parameter to determine how string literals will be processed.
The presence of this parameter can also be taken as an indication
that the escape string syntax (E'...'>) is supported.
- Escape string syntax should be used if an application desires
+ Escape string syntax ()
+ should be used if an application desires
backslashes to be treated as escape characters.
null values, so if you use that interface to access the database you
might want to turn this option on. Since expressions of the
form expr> = NULL always
- return the null value (using the correct interpretation) they are not
- very useful and do not appear often in normal applications, so
+ return the null value (using the SQL standard interpretation), they are not
+ very useful and do not appear often in normal applications so
this option does little harm in practice. But new users are
frequently confused about the semantics of expressions
- involving null values, so this option is not on by default.
+ involving null values, so this option is off by default.
less than the value of NAMEDATALEN> when building
the server. The default value of NAMEDATALEN> is
64; therefore the default
- max_identifier_length is 63 bytes.
+ max_identifier_length is 63 bytes, which
+ can be less than 63 characters when using multi-byte encodings.
module for a specific class is loaded, it will add the proper variable
definitions for its class name, convert any placeholder
values according to those definitions, and issue warnings for any
- placeholders of its class that remain (which presumably would be
- misspelled configuration variables).
+ unrecognized placeholders of its class that remain.
The following parameters are intended for work on the
-
PostgreSQL source, and in some cases
+
PostgreSQL source
code, and in some cases
to assist with recovery of severely damaged databases. There
- should be no reason to use them in a production database setup.
+ should be no reason to use them on a production database.
As such, they have been excluded from the sample
postgresql.conf> file. Note that many of these
parameters require special source compilation flags to work at all.
If nonzero, a delay of this many seconds occurs when a new
server process is started, after it conducts the
- authentication procedure. This is intended to give an
+ authentication procedure. This is intended to give developers an
opportunity to attach to the server process with a debugger.
This parameter cannot be changed after session start.
If nonzero, a delay of this many seconds occurs just after a
new server process is forked, before it conducts the
- authentication procedure. This is intended to give an
+ authentication procedure. This is intended to give developers an
opportunity to attach to the server process with a debugger to
trace down misbehavior in authentication.
This parameter can only be set in the postgresql.conf>
commands. or
must be
DEBUG1 or lower to send this output to the
- client or server log, respectively.
+ client or server logs, respectively.
namely all the rows on the damaged page. But it allows you to get
past the error and retrieve rows from any undamaged pages that might
be present in the table. So it is useful for recovering data if
- corruption has occurred due to hardware or software error. You should
+ corruption has occurred due to a hardware or software error. You should
generally not set this on until you have given up hope of recovering
- data from the damaged page(s) of a table. The
+ data from the damaged pages of a table. The
default setting is off>, and it can only be changed
by a superuser.
-
+
Monitoring Disk Usage
Each table has a primary heap disk file where most of the data is
stored. If the table has any columns with potentially-wide values,
- there
is also a
TOAST> file associated with the table,
+ there
also might be a
TOAST> file associated with the table,
which is used to store values too wide to fit comfortably in the main
table (see ). There will be one index on the
-
TOAST> table, if present. There might also be indexes associated
+
TOAST> table, if present. There also might be indexes associated
with the base table. Each table and index is stored in a separate disk
file — possibly more than one file, if the file would exceed one
gigabyte. Naming conventions for these files are described in
- You can monitor disk space from three ways: using
+ You can monitor disk space three ways: using
SQL functions listed in ,
using VACUUM> information, and from the command line
using the tools in contrib/oid2name>. The SQL functions
like the following:
SELECT relname, relpages
- FROM pg_class,
- (SELECT reltoastrelid FROM pg_class
- WHERE relname = 'customer') ss
- WHERE oid = ss.reltoastrelid
- OR oid = (SELECT reltoastidxid FROM pg_class
- WHERE oid = ss.reltoastrelid)
- ORDER BY relname;
+FROM pg_class,
+ (SELECT reltoastrelid
+ FROM pg_class
+ WHERE relname = 'customer') AS ss
+WHERE oid = ss.reltoastrelid OR
+ oid = (SELECT reltoastidxid
+ FROM pg_class
+ WHERE oid = ss.reltoastrelid)
+ORDER BY relname;
relname | relpages
----------------------+----------
You can easily display index sizes, too:
SELECT c2.relname, c2.relpages
- FROM pg_class c, pg_class c2, pg_index i
- WHERE c.relname = 'customer'
- AND c.oid = i.indrelid
- AND c2.oid = i.indexrelid
- ORDER BY c2.relname;
+FROM pg_class c, pg_class c2, pg_index i
+WHERE c.relname = 'customer' AND
+ c.oid = i.indrelid AND
+ c2.oid = i.indexrelid
+ORDER BY c2.relname;
relname | relpages
----------------------+----------
It is easy to find your largest tables and indexes using this
information:
-SELECT relname, relpages FROM pg_class ORDER BY relpages DESC;
+SELECT relname, relpages
+FROM pg_class
+ORDER BY relpages DESC;
relname | relpages
----------------------+----------
- You can also use contrib/oid2name> to show disk usage. See
- README.oid2name> in that directory for examples. It includes a script that
- shows disk usage for each database.
+ You can also use contrib/oid2name> to show disk usage; see
+ for more details and examples.
The most important disk monitoring task of a database administrator
- is to make sure the disk doesn't grow full. A filled data disk will
+ is to make sure the disk doesn't become full. A filled data disk will
not result in data corruption, but it might prevent useful activity
from occurring. If the disk holding the WAL files grows full, database
server panic and consequent shutdown might occur.
If your system supports per-user disk quotas, then the database
will naturally be subject to whatever quota is placed on the user
the server runs as. Exceeding the quota will have the same bad
- effects as running out of space entirely.
+ effects as running out of disk space entirely.
-
+
High Availability, Load Balancing, and Replication
Performance must be considered in any choice. There is usually a
trade-off between functionality and
- performance. For example, a full synchronous solution over a slow
+ performance. For example, a fully synchronous solution over a slow
network might cut performance by more than half, while an asynchronous
one might have a minimal performance impact.
Shared disk failover avoids synchronization overhead by having only one
copy of the database. It uses a single disk array that is shared by
multiple servers. If the main database server fails, the standby server
- is able to mount and start the database as though it was recovering from
+ is able to mount and start the database as though it were recovering from
a database crash. This allows rapid failover with no data loss.
A PITR warm standby server can be kept more up-to-date using the
streaming replication feature built into
PostgreSQL> 8.5
- onwards.
+ onwards; see .
If queries are simply broadcast unmodified, functions like
random()>, CURRENT_TIMESTAMP>, and
- sequences would have different values on different servers.
+ sequences can have different values on different servers.
This is because each server operates independently, and because
SQL queries are broadcast (and not actual modified rows). If
this is unacceptable, either the middleware or the application
-
+
Installation from Source Code on Windows
- To change the schedule used (default is the parallel), append it to the
+ To change the schedule used (default is parallel), append it to the
command line like:
Normally you do not need to install any of the client files. You should
place the libpq.dll file in the same directory
as your applications executable file. Do not install
- libpq.dll into your Windows, System or System32
- directory unless absolutely necessary.
- If this file is installed using a setup program, it should
+ libpq.dll into your Windows>,
+ System> or System32> directory unless
+ absolutely necessary.
+ If this file is installed using a setup program, then it should
be installed with version checking using the
VERSIONINFO resource included in the file, to
ensure that a newer version of the library is not overwritten.
-
+
PostgreSQL>]]>
a larger segment size. This can be helpful to reduce the number of
file descriptors consumed when working with very large tables.
But be careful not to select a value larger than is supported
- by your platform and the filesystem(s) you intend to use. Other
+ by your platform and the file systems you intend to use. Other
tools you might wish to use, such as
tar>, could
also set limits on the usable file size.
It is recommended, though not absolutely required, that this value
-
+
Routine Database Maintenance Tasks
discussed here are required, but they
are repetitive in nature and can easily be automated using standard
tools such as
cron scripts or
- Windows'
Task Scheduler>. But it is the database
+ Windows'
Task Scheduler>. It is the database
administrator's responsibility to set up appropriate scripts, and to
check that they execute successfully.
- One obvious maintenance task is creation of backup copies of the data on a
+ One obvious maintenance task is the creation of backup copies of the data on a
regular schedule. Without a recent backup, you have no chance of recovery
after a catastrophe (disk failure, fire, mistakenly dropping a critical
table, etc.). The backup and recovery mechanisms available in
the standard form of VACUUM> can run in parallel with production
database operations. (Commands such as SELECT,
INSERT, UPDATE, and
- DELETE will continue to function as normal, though you
+ DELETE will continue to function normally, though you
will not be able to modify the definition of a table with commands such as
ALTER TABLE while it is being vacuumed.)
VACUUM FULL> requires exclusive lock on the table it is
UPDATE> or DELETE> of a row does not
immediately remove the old version of the row.
This approach is necessary to gain the benefits of multiversion
- concurrency control (see ): the row version
+ concurrency control (
MVCC>, see
): the row version
must not be deleted while it is still potentially visible to other
transactions. But eventually, an outdated or deleted row version is no
longer of interest to any transaction. The space it occupies must then be
- reclaimed for reuse by new rows, to avoid infinite growth of disk
+ reclaimed for reuse by new rows, to avoid unbounded growth of disk
space requirements. This is done by running VACUUM>.
statistics more frequently than others if your application requires it.
In practice, however, it is usually best to just analyze the entire
database, because it is a fast operation. ANALYZE> uses a
- statistical random sampling of the rows of a table rather than reading
+ statistically random sampling of the rows of a table rather than reading
every single row.
Although per-column tweaking of ANALYZE> frequency might not be
- very productive, you might well find it worthwhile to do per-column
+ very productive, you might find it worthwhile to do per-column
adjustment of the level of detail of the statistics collected by
ANALYZE>. Columns that are heavily used in WHERE>
clauses and have highly irregular data distributions might require a
numbers: a row version with an insertion XID greater than the current
transaction's XID is in the future> and should not be visible
to the current transaction. But since transaction IDs have limited size
- (32 bits at this writing) a cluster that runs for a long time (more
+ (32 bits) a cluster that runs for a long time (more
than 4 billion transactions) would suffer transaction ID
wraparound>: the XID counter wraps around to zero, and all of a sudden
transactions that were in the past appear to be in the future — which
- means their outputs become invisible. In short, catastrophic data loss.
+ means their output become invisible. In short, catastrophic data loss.
(Actually the data is still there, but that's cold comfort if you cannot
get at it.) To avoid this, it is necessary to vacuum every table
in every database at least once every two billion transactions.
The reason that periodic vacuuming solves the problem is that
-
PostgreSQL distinguishes a special XID
- FrozenXID>. This XID is always considered older
+
PostgreSQL reserves a special XID
+ as FrozenXID>. This XID does not follow the normal XID
+ comparison rules and is always considered older
than every normal XID. Normal XIDs are
compared using modulo-231> arithmetic. This means
that for every normal XID, there are two billion XIDs that are
the next two billion transactions, no matter which normal XID we are
talking about. If the row version still exists after more than two billion
transactions, it will suddenly appear to be in the future. To
- prevent data loss, old row versions must be reassigned the XID
+ prevent this, old row versions must be reassigned the XID
FrozenXID> sometime before they reach the
two-billion-transactions-old mark. Once they are assigned this
special XID, they will appear to be in the past> to all
normal transactions regardless of wraparound issues, and so such
- row versions will be good until deleted, no matter how long that is.
+ row versions will be valid until deleted, no matter how long that is.
This reassignment of old XIDs is handled by VACUUM>.
The maximum time that a table can go unvacuumed is two billion
- transactions minus the vacuum_freeze_min_age> that was used
- when VACUUM> last scanned the whole table. If it were to go
+ transactions minus the vacuum_freeze_min_age> value at
+ the time VACUUM> last scanned the whole table. If it were to go
unvacuumed for longer than
that, data loss could result. To ensure that this does not happen,
autovacuum is invoked on any table that might contain XIDs older than the
age specified by the configuration parameter
linkend="guc-autovacuum-freeze-max-age">. (This will happen even if
- autovacuum is otherwise disabled.)
+ autovacuum is disabled.)
For tables that are regularly vacuumed for space reclamation purposes,
this is of little importance. However, for static tables
(including tables that receive inserts, but no updates or deletes),
- there is no need for vacuuming for space reclamation, and so it can
+ there is no need to vacuum for space reclamation, so it can
be useful to try to maximize the interval between forced autovacuums
on very large static tables. Obviously one can do this either by
- increasing autovacuum_freeze_max_age> or by decreasing
+ increasing autovacuum_freeze_max_age> or decreasing
vacuum_freeze_min_age>.
The sole disadvantage of increasing autovacuum_freeze_max_age>
(and vacuum_freeze_table_age> along with it)
is that the pg_clog> subdirectory of the database cluster
- will take more space, because it must store the commit status for all
+ will take more space, because it must store the commit status of all
transactions back to the autovacuum_freeze_max_age> horizon.
The commit status uses two bits per transaction, so if
- autovacuum_freeze_max_age> has its maximum allowed value of
+ autovacuum_freeze_max_age> is set to its maximum allowed value of
a little less than two billion, pg_clog> can be expected to
grow to about half a gigabyte. If this is trivial compared to your
total database size, setting autovacuum_freeze_max_age> to
superuser, else it will fail to process system catalogs and thus not
be able to advance the database's datfrozenxid>.)
If these warnings are
- ignored, the system will shut down and refuse to execute any new
+ ignored, the system will shut down and refuse to start any new
transactions once there are fewer than 1 million transactions left
until wraparound:
The setting limits how many
workers may be running at any time. If several large tables all become
eligible for vacuuming in a short amount of time, all autovacuum workers
- may become occupied with vacuuming those tables for a long period.
+ might become occupied with vacuuming those tables for a long period.
This would result
in other tables and databases not being vacuumed until a worker became
- available. There is not a limit on how many workers might be in a
+ available. There is no limit on how many workers might be in a
single database, but workers do try to avoid repeating work that has
already been done by other workers. Note that the number of running
- workers does not count towards the nor
- the limits.
+ workers does not count towards or
+ limits.
- In
PostgreSQL> releases before 7.4, periodic reindexing
- was frequently necessary to avoid index bloat>, due to lack of
- internal space reclamation in B-tree indexes. Any situation in which the
- range of index keys changed over time — for example, an index on
- timestamps in a table where old entries are eventually deleted —
- would result in bloat, because index pages for no-longer-needed portions
- of the key range were not reclaimed for re-use. Over time, the index size
- could become indefinitely much larger than the amount of useful data in it.
-
-
- In
PostgreSQL> 7.4 and later, index pages that have become
- completely empty are reclaimed for re-use. There is still a possibility
- for inefficient use of space: if all but a few index keys on a page have
- been deleted, the page remains allocated. So a usage pattern in which all
- but a few keys in each range are eventually deleted will see poor use of
- space. For such usage patterns, periodic reindexing is recommended.
+ Index pages that have become
+ completely empty are reclaimed for re-use. However, here is still the possibility
+ of inefficient use of space: if all but a few index keys on a page have
+ been deleted, the page remains allocated. Therefore, a usage
+ pattern in which most, but not all, keys in each range are eventually
+ deleted will see poor use of space. For such usage patterns,
+ periodic reindexing is recommended.
The potential for bloat in non-B-tree indexes has not been well
- characterized. It is a good idea to keep an eye on the index's physical
+ researched. It is a good idea to periodically monitor the index's physical
size when using any non-B-tree index type.
- Also, for B-tree indexes a freshly-constructed index is somewhat faster to
- access than one that has been updated many times, because logically
+ Also, for B-tree indexes, a freshly-constructed index is slightly faster to
+ access than one that has been updated many times because logically
adjacent pages are usually also physically adjacent in a newly built index.
- (This consideration does not currently apply to non-B-tree indexes.) It
+ (This consideration does not apply to non-B-tree indexes.) It
might be worthwhile to reindex periodically just to improve access speed.
It is a good idea to save the database server's log output
- somewhere, rather than just routing it to /dev/null>.
- The log output is invaluable when it comes time to diagnose
+ somewhere, rather than just discarding it via /dev/null>.
+ The log output is invaluable when diagnosing
problems. However, the log output tends to be voluminous
- (especially at higher debug levels) and you won't want to save it
- indefinitely. You need to <quote>rotate> the log files so that
+ (especially at higher debug levels) so you won't want to save it
+ indefinitely. You need to <emphasis>rotate> the log files so that
new log files are started and old ones removed after a reasonable
period of time.
postgres into a
file, you will have log output, but
the only way to truncate the log file is to stop and restart
- the server. This might be OK if you are using
+ the server. This might be acceptable if you are using
PostgreSQL in a development environment,
but few production servers would find this behavior acceptable.
A better approach is to send the server's
stderr> output to some type of log rotation program.
- There is a built-in log rotation program, which you can use by
+ There is a built-in log rotation facility, which you can use by
setting the configuration parameter logging_collector> to
true> in postgresql.conf>. The control
parameters for this program are described in
linkend="runtime-config-logging-where">. You can also use this approach
- to capture the log data in machine readable CSV format.
+ to capture the log data in machine readable
CSV>
+ (comma-separated values) format.
Alternatively, you might prefer to use an external log rotation
- program, if you have one that you are already using with other
+ program if you have one that you are already using with other
server software. For example, the
rotatelogs
tool included in the
Apache distribution
can be used with
PostgreSQL. To do this,
Another production-grade approach to managing log output is to
- send it
all to
syslog> and let
+ send it to
syslog> and let
syslog> deal with file rotation. To do this, set the
configuration parameter log_destination> to syslog>
(to log to
syslog> only) in
On many systems, however,
syslog> is not very reliable,
particularly with large log messages; it might truncate or drop messages
just when you need them the most. Also, on
Linux>,
-
syslog> will sync each message to disk, yielding poor
- performance. (You can use a <literal>-> at the start of the file name
+
syslog> will flush each message to disk, yielding poor
+ performance. (You can use a <quote>->> at the start of the file name
in the
syslog> configuration file to disable syncing.)
Note that all the solutions described above take care of starting new
log files at configurable intervals, but they do not handle deletion
- of old, no-longer-interesting log files. You will probably want to set
+ of old, no-longer-useful log files. You will probably want to set
up a batch job to periodically delete old log files. Another possibility
is to configure the rotation program so that old log files are overwritten
cyclically.
-
+
Managing Databases
A database is a named collection of
SQL objects
(database objects
). Generally, every database
object (tables, functions, etc.) belongs to one and only one
- database. (But there are a few system catalogs, for example
+ database. (However there are a few system catalogs, for example
pg_database>, that belong to a whole cluster and
are accessible from each database within the cluster.) More
accurately, a database is a collection of schemas and the schemas
When connecting to the database server, a client must specify in
its connection request the name of the database it wants to connect
to. It is not possible to access more than one database per
- connection. (But an application is not restricted in the number of
- connections it opens to the same or other databases.) Databases are
+ connection. However, an application is not restricted in the number of
+ connections it opens to the same or other databases. Databases are
physically separated and access control is managed at the
connection level. If one
PostgreSQL> server
instance is to house projects or users that should be separate and
for the most part unaware of each other, it is therefore
recommendable to put them into separate databases. If the projects
or users are interrelated and should be able to use each other's
- resources they should be put in the same database, but possibly
+ resources, they should be put in the same database but possibly
into separate schemas. Schemas are a purely logical structure and who can
access what is managed by the privilege system. More information about
managing schemas is in .
where name> follows the usual rules for
SQL identifiers. The current role automatically
becomes the owner of the new database. It is the privilege of the
- owner of a database to remove it later on (which also removes all
+ owner of a database to remove it later (which also removes all
the objects in it, even if they have a different owner).
new database is created within the
cluster, template1 is essentially cloned.
This means that any changes you make in template1> are
- propagated to all subsequently created databases. Therefore it is
- unwise to use template1> for real work, but when
- used judiciously this feature can be convenient. More details
+ propagated to all subsequently created databases. Because of this,
+ avoid creating objects in template1> unless you want them
+ propagated to every newly created database. More details
appear in .
- As a convenience, there is a program that you can
+ As a convenience, there is a program you can
execute from the shell to create new databases,
exactly as described above.
The reference page contains the invocation
details. Note that createdb> without any arguments will create
- a database with the current user name, which might or might not be what
- you want.
+ a database with the current user name.
- Sometimes you want to create a database for someone else. That
- role should become the owner of the new database, so he can
+ Sometimes you want to create a database for someone else, and have him
+ become the owner of the new database, so he can
configure and manage it himself. To achieve that, use one of the
following commands:
createdb -O rolename> dbname>
from the shell.
- You must be a superuser to be allowed to create a database for
+ Only the superuser is allowed to create a database for
someone else (that is, for a role you are not a member of).
objects in databases. For example, if you install the procedural
language
PL/Perl> in template1>, it will
automatically be available in user databases without any extra
- action being taken when those databases are made.
+ action being taken when those databases are created.
template1>. This is particularly handy when restoring a
pg_dump> dump: the dump script should be restored in a
virgin database to ensure that one recreates the correct contents
- of the dumped database, without any conflicts with objects that
+ of the dumped database, without conflicting with objects that
might have been added to template1> later on.
The principal limitation is that no other sessions can be connected to
the source database while it is being copied. CREATE
DATABASE> will fail if any other connection exists when it starts;
- otherwise, new connections to the source database are locked out
- until CREATE DATABASE> completes.
+ during the copy operation, new connections to the source database
+ are prevented.
cloned by any user with CREATEDB> privileges; if it is not set,
only superusers and the owner of the database can clone it.
If datallowconn is false, then no new connections
- to that database will be allowed (but existing sessions are not killed
+ to that database will be allowed (but existing sessions are not terminated
simply by setting the flag false). The template0
- database is normally marked datallowconn = false> to prevent modification of it.
+ database is normally marked datallowconn = false> to prevent its modification.
Both template0 and template1
should always be marked with datistemplate = true>.
The postgres> database is also created when a database
cluster is initialized. This database is meant as a default database for
users and applications to connect to. It is simply a copy of
- template1> and can be dropped and recreated if required.
+ template1> and can be dropped and recreated if necessary.
GEQO optimizer for a given database, you'd
ordinarily have to either disable it for all databases or make sure
that every connecting client is careful to issue SET geqo
- TO off;. To make this setting the default within a particular
+ TO off. To make this setting the default within a particular
database, you can execute the command:
ALTER DATABASE mydb SET geqo TO off;
Note that users can still alter this setting during their sessions; it
will only be the default. To undo any such setting, use
ALTER DATABASE dbname> RESET
- varname>;.
+ varname>.
CREATE TABLESPACE fastspace LOCATION '/mnt/sda1/postgresql/data';
The location must be an existing, empty directory that is owned by
- the
PostgreSQL> system user. All objects subsequently
+ the
PostgreSQL> operating system user. All objects subsequently
created within the tablespace will be stored in files underneath this
directory.
Creation of the tablespace itself must be done as a database superuser,
- but after that you can allow ordinary database users to make use of it.
+ but after that you can allow ordinary database users to use it.
To do that, grant them the CREATE> privilege on it.
Although not recommended, it is possible to adjust the tablespace
layout by hand by redefining these links. Two warnings: do not do so
while the server is running; and after you restart the server,
- update the pg_tablespace> catalog to show the new
- locations. (If you do not, pg_dump> will continue to show
+ update the pg_tablespace> catalog with the new
+ locations. (If you do not, pg_dump> will continue to output
the old tablespace locations.)
-
+
Monitoring Database Activity
- On most platforms,
PostgreSQL modifies its
+ On most
Unix platforms,
PostgreSQL modifies its
command title as reported by ps>, so that individual server
processes can readily be identified. A sample display is
platforms, as do the details of what is shown. This example is from a
recent Linux system.) The first process listed here is the
master server process. The command arguments
- shown for it are the same ones given when it was launched. The next two
+ shown for it are the same ones used when it was launched. The next two
processes are background worker processes automatically launched by the
master process. (The stats collector> process will not be present
if you have set
postgres: user> database> host> activity>
- The user, database, and connection source host items remain the same for
+ The user, database, and (client) host items remain the same for
the life of the client connection, but the activity indicator changes.
The activity can be idle> (i.e., waiting for a client command),
idle in transaction> (waiting for client inside a BEGIN> block),
or a command type name such as SELECT>. Also,
- waiting> is attached if the server process is presently waiting
- on a lock held by another server process. In the above example we can infer
+ waiting> is appended if the server process is presently waiting
+ on a lock held by another session. In the above example we can infer
that process 1003 is waiting for process 1016 to complete its transaction and
- thereby release some lock or other.
+ thereby release some lock.
If you have turned off then the
activity indicator is not updated; the process title is set only once
- when a new process is launched. On some platforms this saves a useful
- amount of per-command overhead, on others it's insignificant.
+ when a new process is launched. On some platforms this saves a measurable
+ amount of per-command overhead; on others it's insignificant.
is a subsystem that supports collection and reporting of information about
server activity. Presently, the collector can count accesses to tables
and indexes in both disk-block and individual-row terms. It also tracks
- total numbers of rows in each table, and the last vacuum and analyze times
+ the total number of rows in each table, and the last vacuum and analyze times
for each table. It can also count calls to user-defined functions and
the total time spent in each one.
-
PostgreSQL also supports
determining the exact
+
PostgreSQL also supports
reporting of the exact
command currently being executed by other server processes. This is an
- independent facility that does not depend on the collector process.
+ facility independent of the collector process.
When the postmaster shuts down, a permanent copy of the statistics
data is stored in the global subdirectory. For increased
performance, the parameter can
- be pointed at a RAM based filesystem, decreasing physical I/O requirements.
+ be pointed at a RAM-based file system, decreasing physical I/O requirements.
any of these statistics, it first fetches the most recent report emitted by
the collector process and then continues to use this snapshot for all
statistical views and functions until the end of its current transaction.
- So the statistics will appear not to change as long as you continue the
+ So the statistics will show static information as long as you continue the
current transaction. Similarly, information about the current queries of
- all processes is collected when any such information is first requested
+ all sessions is collected when any such information is first requested
within a transaction, and the same information will be displayed throughout
the transaction.
This is a feature, not a bug, because it allows you to perform several
SystemTap uses a different notation for trace scripts than DTrace does,
even though the underlying trace points are compatible. One point worth
noting is that at this writing, SystemTap scripts must reference probe
- names using double underlines in place of hyphens. This is expected to
+ names using double underscores in place of hyphens. This is expected to
be fixed in future SystemTap releases.
-
+
Regression Tests
running server, or using a temporary installation within the build
tree. Furthermore, there is a parallel
and a
sequential
mode for running the tests. The
- sequential method runs each test script in turn, whereas the
+ sequential method runs each test script alone, while the
parallel method starts up multiple server processes to run groups
of tests in parallel. Parallel testing gives confidence that
- interprocess communication and locking are working correctly. For
- historical reasons, the sequential test is usually run against an
- existing installation and the parallel method against a temporary
- installation, but there are no technical reasons for this.
+ interprocess communication and locking are working correctly.
- To run the regression tests after building but before installation,
+ To run the parallel regression tests after building but before installation,
type:
gmake check
in the top-level directory. (Or you can change to
src/test/regress and run the command there.)
This will first build several auxiliary files, such as
- some sample user-defined trigger functions, and then run the test driver
+ sample user-defined trigger functions, and then run the test driver
script. At the end you should see something like:
If you run the tests against a server that was
initialized with a collation-order locale other than C, then
- there might be differences due to sort order and follow-up
+ there might be differences due to sort order and subsequent
failures. The regression test suite is set up to handle this
- problem by providing alternative result files that together are
+ problem by providing alternate result files that together are
known to handle a large number of locales.
results involving mathematical functions of double
precision columns have been observed. The float8> and
geometry> tests are particularly prone to small differences
- across platforms, or even with different compiler optimization options.
+ across platforms, or even with different compiler optimization setting.
Human eyeball comparison is needed to determine the real
significance of these differences which are usually 10 places to
the right of the decimal point.
this is not, strictly speaking, a bug. Most of the regression test
scripts are not so pedantic as to use an ORDER BY> for every single
SELECT>, and so their result row orderings are not well-defined
-according to the letter of the SQL specification. In practice, since we are
+according to the SQL specification. In practice, since we are
looking at the same queries being executed on the same data by the same
-software, we usually get the same result ordering on all platforms, and
-so the lack of ORDER BY> isn't a problem. Some queries do exhibit
+software, we usually get the same result ordering on all platforms,
+so the lack of ORDER BY> is not a problem. Some queries do exhibit
cross-platform ordering differences, however. When testing against an
already-installed server, ordering differences can also be caused by
non-C locale settings or non-default parameter settings, such as custom values
Therefore, if you see an ordering difference, it's not something to
worry about, unless the query does have an ORDER BY> that your
-result is violating. But please report it anyway, so that we can add an
-ORDER BY> to that particular query and thereby eliminate the bogus
+result is violating. However, please report it anyway, so that we can add an
+ORDER BY> to that particular query to eliminate the bogus
failure
in future releases.
Since some of the tests inherently produce environment-dependent
- results, we have provided ways to specify alternative expected>
+ results, we have provided ways to specify alternate expected>
result files. Each regression test can have several comparison files
showing possible results on different platforms. There are two
independent mechanisms for determining which comparison file is used
float8:out:i.86-.*-openbsd=float8-small-is-zero.out
- which will trigger on any machine for which the output of
+ which will trigger on any machine where the output of
config.guess matches i.86-.*-openbsd.
Other lines
in resultmap> select the variant comparison file for other
-
+
Server Setup and Operation
- As with any other server daemon that is accessible to the outside world,
+ As with any server daemon that is accessible to the outside world,
it is advisable to run
PostgreSQL under a
separate user account. This user account should only own the data
that is managed by the server, and should not be shared with other
superuser> Also, specify
mode is not used; or modify the generated pg_hba.conf
- file after running initdb,
+ file after running initdb, but
before> you start the server for the first time. (Other
reasonable approaches include using ident authentication
or file system permissions to restrict connections. See
Normally it is better to start postgres in the
- background. For this, use the usual shell syntax:
+ background. For this, use the usual Unix shell syntax:
$ postgres -D /usr/local/pgsql/data >logfile 2>&1 &
Although the error conditions possible on the client side are quite
varied and application-dependent, a few of them might be directly
- related to how the server was started up. Conditions other than
+ related to how the server was started. Conditions other than
those shown below should be documented with the respective client
application.
relevant for
PostgreSQL>). Almost all modern
operating systems provide these features, but not all of them have
them turned on or sufficiently sized by default, especially systems
- with BSD heritage. (On Windows>,
+ with a BSD heritage. (On Windows>,
PostgreSQL> provides its own replacement
- implementation of these facilities, and so most of this section
+ implementation of these facilities, so most of this section
can be disregarded.)
The complete lack of these facilities is usually manifested by an
Illegal system call> error upon server start. In
- that case there's nothing left to do but to reconfigure your
+ that case there is no alternative but to reconfigure your
kernel.
PostgreSQL> won't work without them.
When
PostgreSQL> exceeds one of the various hard
IPC> limits, the server will refuse to start and
should leave an instructive error message describing the problem
-
encountered and what to do about it. (See also
+ and what to do about it. (See also
linkend="server-start-failures">.) The relevant kernel
parameters are named consistently across different systems;
linkend="sysvipc-parameters"> gives an overview. The methods to set
|
SEMVMX>>
Maximum value of semaphore>
- at least 1000 (The default is often 32767, don't change unless forced to)>
+ at least 1000 (The default is often 32767; do not change unless necessary)>
SHMMAX The most important
shared memory parameter is SHMMAX>, the maximum size, in
bytes, of a shared memory segment. If you get an error message from
- shmget> like <errorname>Invalid argument>, it is
+ shmget> like <quote>Invalid argument>, it is
likely that this limit has been exceeded. The size of the required
shared memory segment varies depending on several
PostgreSQL> configuration parameters, as shown in
least ceil((max_connections + autovacuum_max_workers) / 16)>.
Lowering the number
of allowed connections is a temporary workaround for failures,
- which are usually confusingly worded <errorname>No space
+ which are usually confusingly worded <quote>No space
left on device>, from the function semget>.
Various other settings related to semaphore undo>, such as
- SEMMNU> and SEMUME>, are not of concern
+ SEMMNU> and SEMUME>, do not affect
- For those running 4.0 and earlier releases, use bpatch>
- to find the sysptsize> value in the current
- kernel. This is computed dynamically at boot time.
-
-$ bpatch -r sysptsize>
-0x9 = 9>
-
- Next, add SYSPTSIZE> as a hard-coded value in the
- kernel configuration file. Increase the value you found using
- bpatch>. Add 1 for every additional 4 MB of
- shared memory you desire.
-options "SYSPTSIZE=16"
-
- sysptsize> cannot be changed by sysctl.
-
-
Semaphores>
security.jail.sysvipc_allowed>, postmaster>s
running in different jails should be run by different operating system
users. This improves security because it prevents non-root users
- from interfering with shared memory or semaphores in a different jail,
+ from interfering with shared memory or semaphores in different jails,
and it allows the PostgreSQL IPC cleanup code to function properly.
- (In FreeBSD 6.0 and later the IPC cleanup code doesn't properly detect
+ (In FreeBSD 6.0 and later the IPC cleanup code does not properly detect
processes in other jails, preventing the running of postmasters on the
same port in different jails.)
to be enabled when the kernel is compiled. (They are by
default.) The maximum size of shared memory is determined by
the option SHMMAXPGS> (in pages). The following
- shows an example of how to set the various parameters
+ shows an example of how to set the various parameters on
+ NetBSD>
(OpenBSD> uses option> instead):
options SYSVSHM
IPC> parameters can be set in the System
Administration Manager> (
SAM>) under
Kernel
- Configuration>Configurable Parameters>>. Hit
+ Configuration>Configurable Parameters>>. Choose
Create A New Kernel> when you're done.
$ sysctl -w kernel.shmmax=134217728
$ sysctl -w kernel.shmall=2097152
- In addition these settings can be saved between reboots in
- /etc/sysctl.conf.
+ In addition these settings can be preserved between reboots in
+ the file /etc/sysctl.conf.
In OS X 10.3 and later, these commands have been moved to
/etc/rc> and must be edited there. Note that
/etc/rc> is usually overwritten by OS X updates (such as
- 10.3.6 to 10.3.7) so you should expect to have to redo your editing
+ 10.3.6 to 10.3.7) so you should expect to have to redo your edits
after each update.
- In all OS X versions, you'll need to reboot to make changes in the
+ In all OS X versions, you will need to reboot to have changes in the
shared memory parameters take effect.
Some vendors' Linux 2.4 kernels are reported to have early versions
of the 2.6 overcommit sysctl parameter. However, setting
vm.overcommit_memory> to 2
- on a kernel that does not have the relevant code will make
- things worse not better. It is recommended that you inspect
+ on a 2.4 kernel that does not have the relevant code will make
+ things worse, not better. It is recommended that you inspect
the actual kernel source code (see the function
vm_enough_memory> in the file mm/mmap.c>)
- to verify what is supported in your copy before you try this in a 2.4
+ to verify what is supported in your kernel before you try this in a 2.4
installation. The presence of the overcommit-accounting>
documentation file should not> be taken as evidence that the
feature is there. If in any doubt, consult a kernel expert or your
The server disallows new connections and sends all existing
server processes SIGTERM, which will cause them
to abort their current transactions and exit promptly. It then
- waits for the server processes to exit and finally shuts down.
+ waits for all server processes to exit and finally shuts down.
If the server is in online backup mode, backup mode will be
terminated, rendering the backup useless.
While the server is running, it is not possible for a malicious user
to take the place of the normal database server. However, when the
- server is down it is possible for a local user to spoof the normal
+ server is down, it is possible for a local user to spoof the normal
server by starting their own server. The spoof server could read
passwords and queries sent by clients, but could not return any data
because the PGDATA> directory would still be secure because
the administrator cannot determine the actual password assigned
to the user. If MD5 encryption is used for client authentication,
the unencrypted password is never even temporarily present on the
- server because the client MD5 encrypts it before being sent
+ server because the client MD5-encrypts it before being sent
across the network.
- On Linux, encryption can be layered on top of a file system mount
+ On Linux, encryption can be layered on top of a file system
using a loopback device
. This allows an entire
- file system partition be encrypted on disk, and decrypted by the
+ file system partition to be encrypted on disk, and decrypted by the
operating system. On FreeBSD, the equivalent facility is called
- GEOM Based Disk Encryption, or
gbde.
+ GEOM Based Disk Encryption (
gbde), and many
+ other operating systems support this functionality, including Windows.
The MD5> authentication method double-encrypts the
password on the client before sending it to the server. It first
- MD5 encrypts it based on the user name, and then encrypts it
+ MD5-encrypts it based on the user name, and then encrypts it
based on a random salt sent by the server when the database
connection was made. It is this double-encrypted value that is
sent over the network to the server. Double-encryption not only
PostgreSQL> server can be started with
SSL> enabled by setting the parameter
to on> in
- postgresql.conf>. The server will listen for both standard
+ postgresql.conf>. The server will listen for both normal
and
SSL> connections on the same TCP port, and will negotiate
with any connecting client on whether to use
SSL>. By
default, this is at the client's option; see
|
server.key>
server private key
- proves server certificate sent by owner; does not indicate
+ proves server certificate was sent by the owner; it does not indicate
certificate owner is trustworthy
-
One can use
SSH to encrypt the network
+
It is possible to use
SSH to encrypt the network
connection between clients and a
PostgreSQL server. Done properly, this
provides an adequately secure network connection, even for non-SSL-capable
ssh -L 63333:localhost:5432 joe@foo.com
The first number in the argument, 63333, is the
- port number of your end of the tunnel; it can be chosen freely.
+ port number of your end of the tunnel; it can be any unused port.
(IANA reserves ports 49152 through 65535 for private use.) The
second number, 5432, is the remote end of the tunnel: the port
number your server is using. The name or IP address between the
In order for the
tunnel setup to succeed you must be allowed to connect via
ssh as joe@foo.com, just
- as if you had attempted to use ssh to set up a
+ as if you had attempted to use ssh to create a
terminal session.
-
+
Database Roles and Privileges
tables) and can assign privileges on those objects to other roles to
control who has access to which objects. Furthermore, it is possible
to grant membership> in a role to another role, thus
- allowing the member role use of privileges assigned to the role it is
- a member of.
+ allowing the member role to use privileges assigned to another role.
- Every connection to the database server is made in the name of some
+ Every connection to the database server is made using the name of some
particular role, and this role determines the initial access privileges for
- commands issued on that connection.
+ commands issued in that connection.
The role name to use for a particular database
connection is indicated by the client that is initiating the
connection request in an application-specific fashion. For example,
The set of database roles a given client connection can connect as
is determined by the client authentication setup, as explained in
. (Thus, a client is not
- necessarily limited to connect as the role with the same name as
+ limited to connect as the role matching
its operating system user, just as a person's login name
need not match her real name.) Since the role
identity determines the set of privileges available to a connected
- client, it is important to carefully configure this when setting up
+ client, it is important to carefully configure privileges when setting up
a multiuser environment.
Only roles that have the LOGIN> attribute can be used
as the initial role name for a database connection. A role with
- the LOGIN> attribute can be considered the same thing
+ the LOGIN> attribute can be considered the same
as a database user>. To create a role with login privilege,
use either:
other roles, too, as well as grant or revoke membership in them.
However, to create, alter, drop, or change membership of a
superuser role, superuser status is required;
- CREATEROLE> is not sufficient for that.
+ CREATEROLE> is insufficient for that.
want to disable index scans (hint: not a good idea) anytime you
connect, you can use:
-ALTER ROLE myname SET enable_indexscan TO off;
+ALTER ROLE myname SET statement_timeout = '5min';
This will save the setting (but not set it immediately). In
subsequent connections by this role it will appear as though
- SET enable_indexscan TO off; had been executed
+ SET statement_timeout = '5min' had been executed
just before the session started.
You can still alter this setting during the session; it will only
be the default. To remove a role-specific default setting, use
- ALTER ROLE rolename> RESET varname>;.
+ ALTER ROLE rolename> RESET varname>.
Note that role-specific defaults attached to roles without
LOGIN> privilege are fairly useless, since they will never
be invoked.
- The members of a role can use the privileges of the group role in two
+ The members of a group role can use the privileges of the role in two
ways. First, every member of a group can explicitly do
to
temporarily become> the group role. In this state, the
database session has access to the privileges of the group role rather
than the original login role, and any database objects created are
considered owned by the group role not the login role. Second, member
- roles that have the INHERIT> attribute automatically have use of
- privileges of roles they are members of. As an example, suppose we have
+ roles that have the INHERIT> attribute automatically inherit the
+ privileges of roles of which they are members, including their
+ INHERIT> attributes. As an example, suppose we have
done:
CREATE ROLE joe LOGIN INHERIT;
special privileges, but they are never inherited as ordinary privileges
on database objects are. You must actually SET ROLE> to a
specific role having one of these attributes in order to make use of
- the attribute. Continuing the above example, we might well choose to
+ the attribute. Continuing the above example, we might choose to
grant CREATEDB> and CREATEROLE> to the
admin> role. Then a session connecting as role joe>
would not have these privileges immediately, only after doing
-
Functions and Triggers
+
Function and Trigger Security
Functions and triggers allow users to insert code into the backend
-
+
Reliability and the Write-Ahead Log
Next, there might be a cache in the disk drive controller; this is
particularly common on
RAID> controller cards. Some of
- these caches are write-through>, meaning writes are passed
- along to the drive as soon as they arrive. Others are
- write-back>, meaning data is passed on to the drive at
+ these caches are write-through>, meaning writes are sent
+ to the drive as soon as they arrive. Others are
+ write-back>, meaning data is sent to the drive at
some later time. Such caches can be a reliability hazard because the
memory in the disk controller cache is volatile, and will lose its
contents in a power failure. Better controller cards have
particularly likely to have write-back caches that will not survive a
power failure. To check write caching on
Linux> use
hdparm -I>; it is enabled if there is a *> next
- to Write cache>. hdparm -W> to turn off
+ to Write cache>; hdparm -W> to turn off
write caching. On
FreeBSD> use
atacontrol>. (For SCSI disks use
url="http://sg.torque.net/sg/sdparm.html">
sdparm>
- When the operating system sends a write request to the disk hardware,
+ When the operating system sends a write request to the storage hardware,
there is little it can do to make sure the data has arrived at a truly
non-volatile storage area. Rather, it is the
- administrator's responsibility to be sure that all storage components
+ administrator's responsibility to make certain that all storage components
ensure data integrity. Avoid disk controllers that have non-battery-backed
write caches. At the drive level, disable write-back caching if the
drive cannot guarantee the data will be written before shutdown.
to power loss at any time, meaning some of the 512-byte sectors were
written, and others were not. To guard against such failures,
PostgreSQL> periodically writes full page images to
- permanent storage before> modifying the actual page on
+ permanent WAL storage before> modifying the actual page on
disk. By doing this, during crash recovery
PostgreSQL> can
restore partially-written pages. If you have a battery-backed disk
controller or file-system software that prevents partial page writes
- (e.g., ReiserFS 4), you can turn off this page imaging by using the
+ (e.g., ZFS), you can turn off this page imaging by turning off the
parameter.
Because
WAL restores database file
- contents after a crash, journaled filesystems are not necessary for
+ contents after a crash, journaled file systems are not necessary for
reliable storage of the data files or WAL files. In fact, journaling
overhead can reduce performance, especially if journaling
causes file system data to be flushed
to disk. Fortunately, data flushing during journaling can
- often be disabled with a filesystem mount option, e.g.
+ often be disabled with a file system mount option, e.g.
data=writeback> on a Linux ext3 file system.
Journaled file systems do improve boot speed after a crash.
committing at about the same time. Setting commit_delay
can only help when there are many concurrently committing transactions,
and it is difficult to tune it to a value that actually helps rather
- than hurting throughput.
+ than hurt throughput.
are points in the sequence of transactions at which it is guaranteed
- that the data files have been updated with all information written before
+ that the heap and index data files have been updated with all information written before
the checkpoint. At checkpoint time, all dirty data pages are flushed to
disk and a special checkpoint record is written to the log file.
(The changes were previously flushed to the
WAL files.)
- The server's background writer process will automatically perform
+ The server's background writer process automatically performs
a checkpoint every so often. A checkpoint is created every
linkend="guc-checkpoint-segments"> log segments, or every
linkend="guc-checkpoint-timeout"> seconds, whichever comes first.
- The default settings are 3 segments and 300 seconds respectively.
+ The default settings are 3 segments and 300 seconds (5 minutes), respectively.
It is also possible to force a checkpoint by using the SQL command
CHECKPOINT.
Reducing checkpoint_segments and/or
- checkpoint_timeout causes checkpoints to be done
+ checkpoint_timeout causes checkpoints to occur
more often. This allows faster after-crash recovery (since less work
will need to be redone). However, one must balance this against the
increased cost of flushing dirty data pages more often. If
server processes to add their commit records to the log so as to have all
of them flushed with a single log sync. No sleep will occur if
- is not enabled, nor if fewer than
+ is not enabled, or if fewer than
other sessions are currently in active transactions; this avoids
sleeping when it's unlikely that any other session will commit soon.
Note that on most platforms, the resolution of a sleep request is
The parameter determines how
PostgreSQL will ask the kernel to force
- All the options should be the same as far as reliability goes,
+ All the options should be the same in terms of reliability,
but it's quite platform-specific which one will be the fastest.
Note that this parameter is irrelevant if fsync
has been turned off.
access/xlog.h; the record content is dependent
on the type of event that is being logged. Segment files are given
ever-increasing numbers as names, starting at
- 000000010000000000000000. The numbers do not wrap, at
- present, but it should take a very very long time to exhaust the
+ 000000010000000000000000. The numbers do not wrap,
+ but it will take a very, very long time to exhaust the
available stock of numbers.
- It is of advantage if the log is located on another disk than the
- main database files. This can be achieved by moving the directory
- pg_xlog to another location (while the server
+ It is advantageous if the log is located on a different disk from the
+ main database files. This can be achieved by moving the
+ pg_xlog directory to another location (while the server
is shut down, of course) and creating a symbolic link from the
original location in the main data directory to the new location.
- The aim of
WAL, to ensure that the log is
- written before database records are altered, can be subverted by
+ The aim of
WAL is to ensure that the log is
+ written before database records are altered, but this can be subverted by
disk drives
disk drive>> that falsely report a
successful write to the kernel,
when in fact they have only cached the data and not yet stored it
- on the disk. A power failure in such a situation might still lead to
+ on the disk. A power failure in such a situation might lead to
irrecoverable data corruption. Administrators should try to ensure
that disks holding
PostgreSQL's
WAL log files do not make such false reports.
After a checkpoint has been made and the log flushed, the
checkpoint's position is saved in the file
- pg_control. Therefore, when recovery is to be
- done, the server first reads pg_control and
+ pg_control. Therefore, at the start of recovery,
+ the server first reads pg_control and
then the checkpoint record; then it performs the REDO operation by
scanning forward from the log position indicated in the checkpoint
record. Because the entire content of data pages is saved in the
To deal with the case where pg_control is
- corrupted, we should support the possibility of scanning existing log
+ corrupt, we should support the possibility of scanning existing log
segments in reverse order — newest to oldest — in order to find the
latest checkpoint. This has not been implemented yet.
pg_control is small enough (less than one disk page)
that it is not subject to partial-write problems, and as of this writing
- there have been no reports of database failures due solely to inability
+ there have been no reports of database failures due solely to the inability
to read pg_control itself. So while it is
theoretically a weak spot, pg_control does not
seem to be a problem in practice.