Re: profiling connection overhead - Mailing list pgsql-hackers

From Josh Berkus
Subject Re: profiling connection overhead
Date
Msg-id 4CFBE101.3030809@agliodbs.com
Whole thread Raw
In response to Re: profiling connection overhead  (Stefan Kaltenbrunner <stefan@kaltenbrunner.cc>)
Responses Re: profiling connection overhead  (Rob Wultsch <wultsch@gmail.com>)
List pgsql-hackers
> * no coordination of restarts/configuration changes between the cluster
> and the pooler
> * you have two pieces of config files to configure your pooling settings
> (having all that available say in a catalog in pg would be awesome)
> * you lose all of the advanced authentication features of pg (because
> all connections need to go through the pooler) and also ip-based stuff
> * no SSL support(in the case of pgbouncer)
> * complexity in reseting backend state (we added some support for that
> through explicit SQL level commands in recent releases but it still is a
> hazard)

More:

* pooler logs to separate file, for which there are (currently) no 
anaysis tools
* pooling is incompatible with the use of ROLES for data security

The last is a major issue, and not one I think we can easily resolve. 
MySQL has a pooling-friendly user system, because when you connect to 
MySQL you basically always connect as the superuser and on connection it 
switches you to your chosen login role.  This, per Rob Wulsch, is one of 
the things at the heart of allowing MySQL to support 100,000 low 
frequency users per cheap hosting system.

As you might imagine, this behavior is also the source of a lot of 
MySQL's security bugs.  I don't see how we could imitate it without 
getting the bugs as well.


--                                   -- Josh Berkus                                     PostgreSQL Experts Inc.
                           http://www.pgexperts.com
 


pgsql-hackers by date:

Previous
From: Greg Smith
Date:
Subject: Re: wCTE behaviour
Next
From: Peter Eisentraut
Date:
Subject: Re: Patch to add a primary key using an existing index