Part III. Server Administration

This part covers topics that are of interest to a Postgres Pro database administrator. This includes installation of the software, set up and configuration of the server, management of users and databases, and maintenance tasks. Anyone who runs a Postgres Pro server, even for personal use, but especially in production, should be familiar with the topics covered in this part.

The information in this part is arranged approximately in the order in which a new user should read it. But the chapters are self-contained and can be read individually as desired. The information in this part is presented in a narrative fashion in topical units. Readers looking for a complete description of a particular command should see Part VI.

The first few chapters are written so they can be understood without prerequisite knowledge, so new users who need to set up their own server can begin their exploration with this part. The rest of this part is about tuning and management; that material assumes that the reader is familiar with the general use of the Postgres Pro database system. Readers are encouraged to look at Part I and Part II for additional information.

Table of Contents

17. Binary Installation
17.1. Installing Postgres Pro Enterprise
17.2. Installing Additional Supplied Modules
17.3. Migrating to Postgres Pro
18. Server Setup and Operation
18.1. The Postgres Pro User Account
18.2. Creating a Database Cluster
18.3. Starting the Database Server
18.4. Managing Kernel Resources
18.5. Shutting Down the Server
18.6. Upgrading a Postgres Pro Cluster
18.7. Preventing Server Spoofing
18.8. Encryption Options
18.9. Secure TCP/IP Connections with SSL
18.10. Secure TCP/IP Connections with GSSAPI Encryption
18.11. Secure TCP/IP Connections with SSH Tunnels
18.12. Registering Event Log on Windows
19. Server Configuration
19.1. Setting Parameters
19.2. File Locations
19.3. Connections and Authentication
19.4. Resource Consumption
19.5. Write Ahead Log
19.6. Replication
19.7. Query Planning
19.8. Error Reporting and Logging
19.9. Run-time Statistics
19.10. Automatic Vacuuming
19.11. Client Connection Defaults
19.12. Lock Management
19.13. Version and Platform Compatibility
19.14. Memory Purge
19.15. Data Compression
19.16. Error Handling
19.17. Preset Options
19.18. Customized Options
19.19. Developer Options
19.20. Short Options
20. Client Authentication
20.1. The pg_hba.conf File
20.2. User Name Maps
20.3. Authentication Methods
20.4. Trust Authentication
20.5. Password Authentication
20.6. GSSAPI Authentication
20.7. SSPI Authentication
20.8. Ident Authentication
20.9. Peer Authentication
20.10. LDAP Authentication
20.11. RADIUS Authentication
20.12. Certificate Authentication
20.13. PAM Authentication
20.14. BSD Authentication
20.15. Authentication Problems
21. Database Roles
21.1. Database Roles
21.2. Role Attributes
21.3. Role Membership
21.4. Dropping Roles
21.5. Predefined Roles
21.6. Function Security
22. Managing Databases
22.1. Overview
22.2. Creating a Database
22.3. Template Databases
22.4. Database Configuration
22.5. Destroying a Database
22.6. Tablespaces
23. Localization
23.1. Locale Support
23.2. Collation Support
23.3. Character Set Support
24. Routine Database Maintenance Tasks
24.1. Routine Vacuuming
24.2. Routine Reindexing
24.3. Log File Maintenance
25. Backup and Restore
25.1. SQL Dump
25.2. File System Level Backup
25.3. Continuous Archiving and Point-in-Time Recovery (PITR)
26. High Availability, Load Balancing, and Replication
26.1. Comparison of Different Solutions
26.2. Log-Shipping Standby Servers
26.3. Failover
26.4. Hot Standby
27. Monitoring Database Activity
27.1. Standard Unix Tools
27.2. The Cumulative Statistics System
27.3. Viewing Locks
27.4. Progress Reporting
28. Monitoring Disk Usage
28.1. Determining Disk Usage
28.2. Disk Full Failure
29. Reliability and the Write-Ahead Log
29.1. Reliability
29.2. Data Checksums
29.3. Write-Ahead Logging (WAL)
29.4. Asynchronous Commit
29.5. WAL Configuration
29.6. WAL Restoration
29.7. WAL Internals
30. Logical Replication
30.1. Publication
30.2. Subscription
30.3. Row Filters
30.4. Column Lists
30.5. Conflicts
30.6. Restrictions
30.7. Architecture
30.8. Monitoring
30.9. Security
30.10. Configuration Settings
30.11. Quick Setup
31. Just-in-Time Compilation (JIT)
31.1. What Is JIT compilation?
31.2. When to JIT?
31.3. Configuration
31.4. Extensibility
32. Enhanced Security
32.1. Memory Purge
32.2. Integrity Checks
32.3. Separation of Duties between Privileged DBMS Users
32.4. Restricting DBMS Administrator's Data Access
33. Compressed File System (CFS)
33.1. Why database compression may be useful
33.2. How compression is integrated in Postgres Pro Enterprise
33.3. Using Compression
34. Built-In Connection Pooling
34.1. Limitations
34.2. How It Works
34.3. Configuring Built-in Connection Pooler
35. Troubleshooting