In this section, you will learn how to interact with the cluster in order to keep it under control, to tune it, and search for problems or bottlenecks. You will learn about various aspects such as user management, access control, transaction control, and various extensions that can be used with clusters.
This section contains the following chapters:
- Chapter 10, Users, Roles, and Database Security
- Chapter 11, Transactions, MVCC, WALs, and Checkpoints
- Chapter 12, Extending the database: the extension ecosystem
- Chapter 13, Indexes and Performance Optimization
- Chapter 14, Logging and Auditing
- Chapter 15, Backup and Restore
- Chapter 16, Configuration and Monitoring