Index
A
- all variable / Configuring the amount of log output
- ALTER ROLE clause / Modifying and dropping roles
- ANALYZE function
- about / Analyzing the performance of a query
- asynchronous replication
- setting up / Setting up an asynchronous replication, Setting up replication step by step
- high-level overview, obtaining / Obtaining a high-level overview
- slave, preparing / Preparing the slave
- master, configuring / Configuring the master
- initial backup, fetching / Fetching an initial backup
- recovery.conf file, creating / Creating and modifying the recovery.conf file
- slave, firing up / Firing up the slave
- slaves, turning into masters / Turning slaves into masters
B
- B-tree index
- internal structure / The internal structure of a B-tree index, Understanding the B-tree internals
- sorted order, providing / Providing a sorted order
- B-trees
- advantages / Understanding the B-tree internals
- backends
- about / Integrating Nagios
- backups, performing
- about / Performing backups
- pg_dump, handling / Handling pg_dump
- entire instance, dumping / Dumping an entire instance
- basic operations, COPY command
- about / Basic operations of the COPY command
- bgwriter_delay parameter / Controlling writes
- bgwriter_lru_maxpages parameter / Controlling writes
- bgwriter_lru_multiplier parameter / Controlling writes
- binary packages
- installing / Installing binary packages
- btree index type
- about / Dealing with different types of indexes
- Bucardo project
- URL / Integrating Nagios
- checklist / Integrating Nagios
- buffers_checkpoint variable
- about / Checking out the information in the background writer
C
- cert method / Authentication methods available
- checkpoints
- configuring / Configuring the checkpoints
- optimizing / Optimizing the checkpoints
- distance, configuring / Configuring the distance between checkpoints
- writes, controlling / Controlling writes
- checkpoint_completion_target / Controlling writes
- checkpoint_sync_time variable
- about / Checking out the information in the background writer
- checkpoint_write_time variable
- about / Checking out the information in the background writer
- column permissions
- managing / Managing column rights
- SELECT clause / Managing column rights
- INSERT clause / Managing column rights
- UPDATE clause / Managing column rights
- REFERENCES clause / Managing column rights
- combined index
- about / Combined indexes
- seq_page_cost variable / Combined indexes
- connection
- about / Integrating Nagios
- COPY command
- using / Using the COPY command
- basic operations / Basic operations of the COPY command
- pipes, using / Making use of pipes
- COPY PROGRAM command / Making use of pipes
- CREATE clause
- about / Understanding schema-level permissions
- csvlog
- about / Configuring log destinations
- curl command / Making use of pipes
- custom format dumps
- about / More sophisticated dumping
D
- data
- importing / Importing and exporting data
- exporting / Importing and exporting data
- database-level permissions
- controlling / Controlling database-level permissions
- databases
- creating / Creating databases
- ddl variable / Configuring the amount of log output
- Debian
- PostgreSQL, installing on / Installing PostgreSQL on Debian or Ubuntu
E
- effective_cache_size
- adjusting / Adjusting effective_cache_size
- environment variables
- PGPASSWORD / Passing users and passwords
- PGUSER / Passing users and passwords
- PGHOST / Passing users and passwords
- PGPORT / Passing users and passwords
- PGDATABASE / Passing users and passwords
- eventlog
- about / Configuring log destinations
- execution plans
- about / Understanding the concept of execution plans
- costs, calculating / Calculating costs
- conclusions, drawing / Drawing important conclusions
- indexes, creating / Creating indexes
- query performance, analyzing / Analyzing the performance of a query
- B-tree indexes / The internal structure of a B-tree index
- combined indexes / Combined indexes
- partial indexes / Partial indexes
- EXPLAIN ANALYZE
- about / Analyzing the performance of a query
- explain analyze statement / Tweaking work_mem
- explain command
- using / Understanding the concept of execution plans
F
- Fedora 20 / Installing PostgreSQL on Red-Hat-based systems
- Full-Text Search (FTS) / Dealing with different types of indexes
G
- generate_series function
- about / Preparing the data
- gin index type
- about / Dealing with different types of indexes
- gist index type
- about / Dealing with different types of indexes
- GroupAggregate / Tweaking work_mem
- gss method / Authentication methods available
H
- HashAggregate / Tweaking work_mem
- hot_standby_delay
- about / Integrating Nagios
- huge pages
- about / Considering huge pages
I
- ident method / Authentication methods available
- IF EXISTS clause / Modifying and dropping roles
- index types
- listing / Dealing with different types of indexes
- about / Dealing with different types of indexes
- btree / Dealing with different types of indexes
- gist / Dealing with different types of indexes
- gin / Dealing with different types of indexes
- sp-gist / Dealing with different types of indexes
- instance-level permissions
- handling / Handling instance-level permissions
- roles, creating / Creating roles
- roles, modifying / Modifying and dropping roles
- roles, dropping / Modifying and dropping roles
L
- ldap method / Authentication methods available
- Lehman-Yao B-trees
- URL / Understanding the B-tree internals
- Linux cgroups
- handling / Handling Linux cgroups
- setting up / Setting up cgroups
- Linux kernel control group (cgroup) / Handling Linux cgroups
- local logfiles
- creating / Creating local logfiles
- locks
- about / Integrating Nagios
- log creation, fine-tuning
- about / Making log creation more fine grained
- logging selectively / Logging selectively
- slow queries, focusing on / Focusing on slow queries
- notices, silencing / Silencing notices
- log destinations
- configuring / Configuring log destinations
- csvlog / Configuring log destinations
- syslog / Configuring log destinations
- eventlog / Configuring log destinations
- local logfiles, creating / Creating local logfiles
- syslog, using / Using syslog
- logs, configuring on Windows / Configuring logs on Windows
- performance considerations / Performance considerations
- logging collector process / Understanding the PostgreSQL log architecture
- log output amount
- configuring / Configuring the amount of log output
- logs, making readable / Making logs more readable
- additional settings / Additional settings
- logs
- configuring, on Windows / Configuring logs on Windows
- log_timezone variable / Making logs more readable
M
- maintenance_work_mem parameter
- improving / Improving maintenance_work_mem
- maxwritten_clean variable
- about / Checking out the information in the background writer
- md5 method / Authentication methods available
- memory parameters
- adjusting / Adjusting memory parameters
- shared buffers, optimizing / Optimizing shared buffers
- huge pages, considering / Considering huge pages
- work_mem parameter, tweaking / Tweaking work_mem
- maintenance_work_mem, improving / Improving maintenance_work_mem
- missing indexes
- detecting / Detecting missing indexes
- mod variable / Configuring the amount of log output
N
- Nagios integration
- about / Integrating Nagios
- network authentication
- managing / Managing network authentication
- contradictions, managing / Managing contradictions
- methods / Authentication methods available
- examples / Some more examples
- SSL, handling / Handling SSL
- pg_hba.conf, changing / Changing pg_hba.conf
- network authentication methods
- trust / Authentication methods available
- reject / Authentication methods available
- md5 / Authentication methods available
- password / Authentication methods available
- gss / Authentication methods available
- sspi / Authentication methods available
- ident / Authentication methods available
- peer / Authentication methods available
- ldap / Authentication methods available
- radius / Authentication methods available
- cert / Authentication methods available
- pam / Authentication methods available
- none variable / Configuring the amount of log output
P
- pages
- about / Considering huge pages
- pam method / Authentication methods available
- partial indexes
- about / Partial indexes
- partial replays
- performing / Performing partial replays
- password method / Authentication methods available
- peer method / Authentication methods available
- pg_dump
- about / Handling pg_dump
- custom format dumps / More sophisticated dumping
- partial replays, performing / Performing partial replays
- users and passwords, passing / Passing users and passwords
- pg_dumpall command-line tool
- about / Dumping an entire instance
- backups / Understanding backups and user creation
- user creation / Understanding backups and user creation
- pg_hba.conf
- about / Managing network authentication
- changing / Changing pg_hba.conf
- pg_relation_size command
- about / Calculating costs
- pg_start_backup variable / Setting up PITR
- pg_statio_user_indexes
- about / Monitoring indexes
- pg_stat_activity file
- about / Checking out the pg_stat_activity file
- example / Checking out the pg_stat_activity file
- pg_stat_bgwriter
- about / Checking out the information in the background writer
- pg_stat_database
- about / Monitoring databases
- pg_stat_reset command
- about / How to reset statistics
- pg_stat_statement function
- about / Detecting slow queries
- pg_stat_statements module
- about / Detecting slow queries
- pg_stat_user_indexes
- about / Monitoring indexes
- pg_stat_user_tables
- about / Monitoring tables
- pg_stat_user_tables option
- about / Detecting missing indexes
- pg_stat_xact_user_tables table
- about / Resetting statistics
- PITR
- handling / Handling point-in-time recovery
- about / Handling point-in-time recovery
- setting up / Setting up PITR
- transaction logs, replaying / Replaying transaction logs
- Pluggable Authentication Module (PAM)
- about / Managing network authentication
- URL / Managing network authentication
- PostgreSQL
- firing up / Firing up PostgreSQL
- databases / Understanding the existing databases
- databases, creating / Creating databases
- index types / Dealing with different types of indexes
- system statistics / Understanding the system statistics of PostgreSQL
- integrating, with Nagios / Integrating Nagios
- PostgreSQL, compiling from source
- about / Compiling PostgreSQL from source
- working / How it works
- contrib packages, installing / Installing the contrib packages
- database instance, creating / Creating a database instance
- postgresql.conf
- wal_level parameter / Setting up PITR
- archive_mode parameter / Setting up PITR
- archive_command parameter / Setting up PITR
- PostgreSQL documentation
- URL / Dealing with different types of indexes
- PostgreSQL installation
- setup, preparing / Preparing your setup
- PostgreSQL version numbers / Understanding the PostgreSQL version numbers
- binary packages, installing / Installing binary packages
- performing, on Debian / Installing PostgreSQL on Debian or Ubuntu
- performing, on Ubuntu / Installing PostgreSQL on Debian or Ubuntu
- performing, on Red Hat-based systems / Installing PostgreSQL on Red-Hat-based systems
- finalizing / Finalizing your installation
- PostgreSQL log architecture
- about / Understanding the PostgreSQL log architecture
- log destinations, configuring / Configuring log destinations
- PostgreSQL security
- about / Understanding PostgreSQL security
- TCP, configuring / Configuring the TCP
- network authentication, managing / Managing network authentication
- instance-level permissions, handling / Handling instance-level permissions
- database-level permissions, controlling / Controlling database-level permissions
- schema-level permissions / Understanding schema-level permissions
- table-level permissions, handling / Handling table-level permissions
- column rights, managing / Managing column rights
- improving, with SELinux / Improving security with SELinux
- PostgreSQL transaction log
- about / Understanding the PostgreSQL transaction log
- purpose / The purpose of the transaction log
- size, inspecting / Inspecting the size of the transaction log
- PostgreSQL version
- selecting / Choosing the right version
- PostgreSQL version numbers
- about / Understanding the PostgreSQL version numbers
- ps ax | grep post command / Passing users and passwords
Q
- query, executing steps
- parser / Understanding the concept of execution plans
- rewrite system / Understanding the concept of execution plans
- optimizer or planner / Understanding the concept of execution plans
- executor / Understanding the concept of execution plans
- query_time
- about / Integrating Nagios
R
- radius method / Authentication methods available
- Red Hat-based systems
- PostgreSQL, installing on / Installing PostgreSQL on Red-Hat-based systems
- reject method / Authentication methods available
- replication
- improving / Improving and monitoring the replication, Making things more robust
- monitoring / Improving and monitoring the replication
- streaming, monitoring / Keeping an eye on streaming
- conflicts, managing / Managing conflicts
S
- schema-level permissions
- about / Understanding schema-level permissions
- schemas
- about / Understanding schema-level permissions
- search_path variable
- about / Understanding schema-level permissions
- SECURITY LABEL / Improving security with SELinux
- SELinux
- used, for improving security / Improving security with SELinux
- shared buffers
- about / Optimizing shared buffers
- shared_buffers parameter
- about / Optimizing shared buffers
- simple binary trees
- using / Using simple binary trees
- data, preparing / Preparing the data
- slow queries
- detecting / Detecting slow queries
- sp-gist index type
- about / Dealing with different types of indexes
- sspi method / Authentication methods available
- standard error (stderr) / Understanding the PostgreSQL log architecture
- statistics
- resetting / How to reset statistics
- synchronous replication
- upgrading to / Upgrading to synchronous replication
- syntax, CREATE ROLE
- SUPERUSER | NOSUPERUSER / Creating roles
- CREATEDB | NOCREATEDB / Creating roles
- CREATEROLE | NOCREATEROLE / Creating roles
- CREATEUSER | NOCREATEUSER / Creating roles
- INHERIT | NOINHERIT / Creating roles
- LOGIN | NOLOGIN / Creating roles
- REPLICATION | NOREPLICATION / Creating roles
- CONNECTION LIMIT / Creating roles
- PASSWORD / Creating roles
- VALID UNTIL / Creating roles
- IN ROLE | IN GROUP / Creating roles
- ROLE / Creating roles
- ADMIN / Creating roles
- USER / Creating roles
- SYSID / Creating roles
- syslog
- about / Configuring log destinations, Using syslog
- using / Using syslog
- system statistics, PostgreSQL
- about / Understanding the system statistics of PostgreSQL
- pg_stat_activity file / Checking out the pg_stat_activity file
- databases, monitoring / Monitoring databases
- tables, monitoring / Monitoring tables
- indexes, monitoring / Monitoring indexes
- pg_stat_bgwriter / Checking out the information in the background writer
- resetting / Resetting statistics
T
- table-level permissions
- handling / Handling table-level permissions
- SELECT / Handling table-level permissions
- INSERT / Handling table-level permissions
- UPDATE / Handling table-level permissions
- DELETE / Handling table-level permissions
- TRUNCATE / Handling table-level permissions
- REFERENCES / Handling table-level permissions
- TRIGGER / Handling table-level permissions
- TCP
- configuring / Configuring the TCP
- The Oversized Attribute Storage Technique (TOAST)
- about / Monitoring tables
- timelines
- about / Understanding timelines
- benefits / The importance of timelines
- trust method / Authentication methods available
U
- Ubuntu
- PostgreSQL, installing on / Installing PostgreSQL on Debian or Ubuntu
- USAGE clause
- about / Understanding schema-level permissions
- users and passwords
- passing / Passing users and passwords
W
- work_mem parameter
- about / Tweaking work_mem
- tweaking / Tweaking work_mem
- Write Ahead Log (WAL) / The purpose of the transaction log