Part III. Server Administration

This part covers topics that are of interest to a Postgres Pro database administrator. This includes installation of the software, set up and configuration of the server, management of users and databases, and maintenance tasks. Anyone who runs a Postgres Pro server, even for personal use, but especially in production, should be familiar with the topics covered in this part.

The information in this part is arranged approximately in the order in which a new user should read it. But the chapters are self-contained and can be read individually as desired. The information in this part is presented in a narrative fashion in topical units. Readers looking for a complete description of a particular command should see Part VI.

The first few chapters are written so they can be understood without prerequisite knowledge, so new users who need to set up their own server can begin their exploration with this part. The rest of this part is about tuning and management; that material assumes that the reader is familiar with the general use of the Postgres Pro database system. Readers are encouraged to look at Part I and Part II for additional information.

Table of Contents

16. Binary Installation
16.1. Installing Postgres Pro Standard on Linux
16.2. Installing Postgres Pro Standard on Windows
16.3. Installing Additional Supplied Modules
16.4. Migrating to Postgres Pro
17. Server Setup and Operation
17.1. The Postgres Pro User Account
17.2. Creating a Database Cluster
17.3. Starting the Database Server
17.4. Managing Kernel Resources
17.5. Shutting Down the Server
17.6. Upgrading a Postgres Pro Cluster
17.7. Preventing Server Spoofing
17.8. Encryption Options
17.9. Secure TCP/IP Connections with SSL
17.10. Secure TCP/IP Connections with GSSAPI Encryption
17.11. Secure TCP/IP Connections with SSH Tunnels
17.12. Registering Event Log on Windows
18. Server Configuration
18.1. Setting Parameters
18.2. File Locations
18.3. Connections and Authentication
18.4. Resource Consumption
18.5. Write Ahead Log
18.6. Replication
18.7. Query Planning
18.8. Error Reporting and Logging
18.9. Run-time Statistics
18.10. Automatic Vacuuming
18.11. Client Connection Defaults
18.12. Lock Management
18.13. Version and Platform Compatibility
18.14. Error Handling
18.15. Preset Options
18.16. Customized Options
18.17. Developer Options
18.18. Short Options
19. Client Authentication
19.1. The pg_hba.conf File
19.2. User Name Maps
19.3. Authentication Methods
19.4. Trust Authentication
19.5. Password Authentication
19.6. GSSAPI Authentication
19.7. SSPI Authentication
19.8. Ident Authentication
19.9. Peer Authentication
19.10. LDAP Authentication
19.11. RADIUS Authentication
19.12. Certificate Authentication
19.13. PAM Authentication
19.14. BSD Authentication
19.15. Authentication Problems
20. Database Roles
20.1. Database Roles
20.2. Role Attributes
20.3. Role Membership
20.4. Dropping Roles
20.5. Default Roles
20.6. Function Security
21. Managing Databases
21.1. Overview
21.2. Creating a Database
21.3. Template Databases
21.4. Database Configuration
21.5. Destroying a Database
21.6. Tablespaces
22. Localization
22.1. Locale Support
22.2. Collation Support
22.3. Character Set Support
23. Routine Database Maintenance Tasks
23.1. Routine Vacuuming
23.2. Routine Reindexing
23.3. Log File Maintenance
24. Backup and Restore
24.1. SQL Dump
24.2. File System Level Backup
24.3. Continuous Archiving and Point-in-Time Recovery (PITR)
25. High Availability, Load Balancing, and Replication
25.1. Comparison of Different Solutions
25.2. Log-Shipping Standby Servers
25.3. Failover
25.4. Alternative Method for Log Shipping
25.5. Hot Standby
26. Monitoring Database Activity
26.1. Standard Unix Tools
26.2. The Statistics Collector
26.3. Viewing Locks
26.4. Progress Reporting
27. Monitoring Disk Usage
27.1. Determining Disk Usage
27.2. Disk Full Failure
28. Reliability and the Write-Ahead Log
28.1. Reliability
28.2. Write-Ahead Logging (WAL)
28.3. Asynchronous Commit
28.4. WAL Configuration
28.5. WAL Internals
29. Logical Replication
29.1. Publication
29.2. Subscription
29.3. Conflicts
29.4. Restrictions
29.5. Architecture
29.6. Monitoring
29.7. Security
29.8. Configuration Settings
29.9. Quick Setup
30. Just-in-Time Compilation (JIT)
30.1. What Is JIT compilation?
30.2. When to JIT?
30.3. Configuration
30.4. Extensibility