Re: pg_stat_* collection - Mailing list pgsql-performance

From Tobias Brox
Subject Re: pg_stat_* collection
Date
Msg-id 20070504050859.GD16930@oppetid.no
Whole thread Raw
In response to Re: pg_stat_* collection  (Greg Smith <gsmith@gregsmith.com>)
List pgsql-performance
[Greg Smith - Fri at 12:53:55AM -0400]
> Munin is a very interesting solution to this class of problem.  They've
> managed to streamline the whole data collection process by layering clever
> Perl hacks three deep.  It's like the anti-SNMP--just build the simplest
> possible interface that will work and then stop designing.  The result is
> so easy to work with that it's no surprise people like Munin.

It's fairly easy to throw in new graphs, and I like that.  One of the
drawbacks is that it spends a lot of CPU building the graphs etc - if I
continue adding graphs in my current speed, and we set up even more
servers, soon it will take us more than five minutes generating the
graphs.

Also, local configuration can be tricky.  Locally I fix this by loading
a config file with a hard-coded path.  Luckily, as long as the postgres
munin plugins are run at localhost as the postgres user, most of them
don't need any configuration.  Still, it can be useful to tune the alarm
thresholds.

> It's also completely inappropriate for any environment I work in, because
> there really is no thought of security whatsoever in the whole thing.
> What I'm still thinking about is whether it's possible to fix that issue
> while still keeping the essential simplicity that makes Munin so friendly.

What layers of security do you need?  We're using https, basic auth and
ssh-tunnels.  We've considered the munin data to be regarded as
confidential, at the other hand it's nothing ultra-secret there; i.e.
securing the backups of the production database probably deserves more
attention.


pgsql-performance by date:

Previous
From: Greg Smith
Date:
Subject: Re: pg_stat_* collection
Next
From: Michael Stone
Date:
Subject: Re: Feature Request --- was: PostgreSQL Performance Tuning