Search icon
Subscription
0
Cart icon
Close icon
You have no products in your basket yet
Save more on your purchases!
Savings automatically calculated. No voucher code required
Arrow left icon
All Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Newsletters
Free Learning
Arrow right icon
PostgreSQL Administration Essentials

You're reading from  PostgreSQL Administration Essentials

Product type Book
Published in Oct 2014
Publisher Packt
ISBN-13 9781783988983
Pages 142 pages
Edition 1st Edition
Languages

Index

A

  • all variable / Configuring the amount of log output
  • ALTER ROLE clause / Modifying and dropping roles
  • ANALYZE function
    • about / Analyzing the performance of a query
  • asynchronous replication
    • setting up / Setting up an asynchronous replication, Setting up replication step by step
    • high-level overview, obtaining / Obtaining a high-level overview
    • slave, preparing / Preparing the slave
    • master, configuring / Configuring the master
    • initial backup, fetching / Fetching an initial backup
    • recovery.conf file, creating / Creating and modifying the recovery.conf file
    • slave, firing up / Firing up the slave
    • slaves, turning into masters / Turning slaves into masters

B

  • B-tree index
    • internal structure / The internal structure of a B-tree index, Understanding the B-tree internals
    • sorted order, providing / Providing a sorted order
  • B-trees
    • advantages / Understanding the B-tree internals
  • backends
    • about / Integrating Nagios
  • backups, performing
    • about / Performing backups
    • pg_dump, handling / Handling pg_dump
    • entire instance, dumping / Dumping an entire instance
  • basic operations, COPY command
    • about / Basic operations of the COPY command
  • bgwriter_delay parameter / Controlling writes
  • bgwriter_lru_maxpages parameter / Controlling writes
  • bgwriter_lru_multiplier parameter / Controlling writes
  • binary packages
    • installing / Installing binary packages
  • btree index type
    • about / Dealing with different types of indexes
  • Bucardo project
    • URL / Integrating Nagios
    • checklist / Integrating Nagios
  • buffers_checkpoint variable
    • about / Checking out the information in the background writer

C

  • cert method / Authentication methods available
  • checkpoints
    • configuring / Configuring the checkpoints
    • optimizing / Optimizing the checkpoints
    • distance, configuring / Configuring the distance between checkpoints
    • writes, controlling / Controlling writes
  • checkpoint_completion_target / Controlling writes
  • checkpoint_sync_time variable
    • about / Checking out the information in the background writer
  • checkpoint_write_time variable
    • about / Checking out the information in the background writer
  • column permissions
    • managing / Managing column rights
    • SELECT clause / Managing column rights
    • INSERT clause / Managing column rights
    • UPDATE clause / Managing column rights
    • REFERENCES clause / Managing column rights
  • combined index
    • about / Combined indexes
    • seq_page_cost variable / Combined indexes
  • connection
    • about / Integrating Nagios
  • COPY command
    • using / Using the COPY command
    • basic operations / Basic operations of the COPY command
    • pipes, using / Making use of pipes
  • COPY … PROGRAM command / Making use of pipes
  • CREATE clause
    • about / Understanding schema-level permissions
  • csvlog
    • about / Configuring log destinations
  • curl command / Making use of pipes
  • custom format dumps
    • about / More sophisticated dumping

D

  • data
    • importing / Importing and exporting data
    • exporting / Importing and exporting data
  • database-level permissions
    • controlling / Controlling database-level permissions
  • databases
    • creating / Creating databases
  • ddl variable / Configuring the amount of log output
  • Debian
    • PostgreSQL, installing on / Installing PostgreSQL on Debian or Ubuntu

E

  • effective_cache_size
    • adjusting / Adjusting effective_cache_size
  • environment variables
    • PGPASSWORD / Passing users and passwords
    • PGUSER / Passing users and passwords
    • PGHOST / Passing users and passwords
    • PGPORT / Passing users and passwords
    • PGDATABASE / Passing users and passwords
  • eventlog
    • about / Configuring log destinations
  • execution plans
    • about / Understanding the concept of execution plans
    • costs, calculating / Calculating costs
    • conclusions, drawing / Drawing important conclusions
    • indexes, creating / Creating indexes
    • query performance, analyzing / Analyzing the performance of a query
    • B-tree indexes / The internal structure of a B-tree index
    • combined indexes / Combined indexes
    • partial indexes / Partial indexes
  • EXPLAIN ANALYZE
    • about / Analyzing the performance of a query
  • explain analyze statement / Tweaking work_mem
  • explain command
    • using / Understanding the concept of execution plans

F

  • Fedora 20 / Installing PostgreSQL on Red-Hat-based systems
  • Full-Text Search (FTS) / Dealing with different types of indexes

G

  • generate_series function
    • about / Preparing the data
  • gin index type
    • about / Dealing with different types of indexes
  • gist index type
    • about / Dealing with different types of indexes
  • GroupAggregate / Tweaking work_mem
  • gss method / Authentication methods available

H

  • HashAggregate / Tweaking work_mem
  • hot_standby_delay
    • about / Integrating Nagios
  • huge pages
    • about / Considering huge pages

I

  • ident method / Authentication methods available
  • IF EXISTS clause / Modifying and dropping roles
  • index types
    • listing / Dealing with different types of indexes
    • about / Dealing with different types of indexes
    • btree / Dealing with different types of indexes
    • gist / Dealing with different types of indexes
    • gin / Dealing with different types of indexes
    • sp-gist / Dealing with different types of indexes
  • instance-level permissions
    • handling / Handling instance-level permissions
    • roles, creating / Creating roles
    • roles, modifying / Modifying and dropping roles
    • roles, dropping / Modifying and dropping roles

L

  • ldap method / Authentication methods available
  • Lehman-Yao B-trees
    • URL / Understanding the B-tree internals
  • Linux cgroups
    • handling / Handling Linux cgroups
    • setting up / Setting up cgroups
  • Linux kernel control group (cgroup) / Handling Linux cgroups
  • local logfiles
    • creating / Creating local logfiles
  • locks
    • about / Integrating Nagios
  • log creation, fine-tuning
    • about / Making log creation more fine grained
    • logging selectively / Logging selectively
    • slow queries, focusing on / Focusing on slow queries
    • notices, silencing / Silencing notices
  • log destinations
    • configuring / Configuring log destinations
    • csvlog / Configuring log destinations
    • syslog / Configuring log destinations
    • eventlog / Configuring log destinations
    • local logfiles, creating / Creating local logfiles
    • syslog, using / Using syslog
    • logs, configuring on Windows / Configuring logs on Windows
    • performance considerations / Performance considerations
  • logging collector process / Understanding the PostgreSQL log architecture
  • log output amount
    • configuring / Configuring the amount of log output
    • logs, making readable / Making logs more readable
    • additional settings / Additional settings
  • logs
    • configuring, on Windows / Configuring logs on Windows
  • log_timezone variable / Making logs more readable

M

  • maintenance_work_mem parameter
    • improving / Improving maintenance_work_mem
  • maxwritten_clean variable
    • about / Checking out the information in the background writer
  • md5 method / Authentication methods available
  • memory parameters
    • adjusting / Adjusting memory parameters
    • shared buffers, optimizing / Optimizing shared buffers
    • huge pages, considering / Considering huge pages
    • work_mem parameter, tweaking / Tweaking work_mem
    • maintenance_work_mem, improving / Improving maintenance_work_mem
  • missing indexes
    • detecting / Detecting missing indexes
  • mod variable / Configuring the amount of log output

N

  • Nagios integration
    • about / Integrating Nagios
  • network authentication
    • managing / Managing network authentication
    • contradictions, managing / Managing contradictions
    • methods / Authentication methods available
    • examples / Some more examples
    • SSL, handling / Handling SSL
    • pg_hba.conf, changing / Changing pg_hba.conf
  • network authentication methods
    • trust / Authentication methods available
    • reject / Authentication methods available
    • md5 / Authentication methods available
    • password / Authentication methods available
    • gss / Authentication methods available
    • sspi / Authentication methods available
    • ident / Authentication methods available
    • peer / Authentication methods available
    • ldap / Authentication methods available
    • radius / Authentication methods available
    • cert / Authentication methods available
    • pam / Authentication methods available
  • none variable / Configuring the amount of log output

P

  • pages
    • about / Considering huge pages
  • pam method / Authentication methods available
  • partial indexes
    • about / Partial indexes
  • partial replays
    • performing / Performing partial replays
  • password method / Authentication methods available
  • peer method / Authentication methods available
  • pg_dump
    • about / Handling pg_dump
    • custom format dumps / More sophisticated dumping
    • partial replays, performing / Performing partial replays
    • users and passwords, passing / Passing users and passwords
  • pg_dumpall command-line tool
    • about / Dumping an entire instance
    • backups / Understanding backups and user creation
    • user creation / Understanding backups and user creation
  • pg_hba.conf
    • about / Managing network authentication
    • changing / Changing pg_hba.conf
  • pg_relation_size command
    • about / Calculating costs
  • pg_start_backup variable / Setting up PITR
  • pg_statio_user_indexes
    • about / Monitoring indexes
  • pg_stat_activity file
    • about / Checking out the pg_stat_activity file
    • example / Checking out the pg_stat_activity file
  • pg_stat_bgwriter
    • about / Checking out the information in the background writer
  • pg_stat_database
    • about / Monitoring databases
  • pg_stat_reset command
    • about / How to reset statistics
  • pg_stat_statement function
    • about / Detecting slow queries
  • pg_stat_statements module
    • about / Detecting slow queries
  • pg_stat_user_indexes
    • about / Monitoring indexes
  • pg_stat_user_tables
    • about / Monitoring tables
  • pg_stat_user_tables option
    • about / Detecting missing indexes
  • pg_stat_xact_user_tables table
    • about / Resetting statistics
  • PITR
    • handling / Handling point-in-time recovery
    • about / Handling point-in-time recovery
    • setting up / Setting up PITR
    • transaction logs, replaying / Replaying transaction logs
  • Pluggable Authentication Module (PAM)
    • about / Managing network authentication
    • URL / Managing network authentication
  • PostgreSQL
    • firing up / Firing up PostgreSQL
    • databases / Understanding the existing databases
    • databases, creating / Creating databases
    • index types / Dealing with different types of indexes
    • system statistics / Understanding the system statistics of PostgreSQL
    • integrating, with Nagios / Integrating Nagios
  • PostgreSQL, compiling from source
    • about / Compiling PostgreSQL from source
    • working / How it works
    • contrib packages, installing / Installing the contrib packages
    • database instance, creating / Creating a database instance
  • postgresql.conf
    • wal_level parameter / Setting up PITR
    • archive_mode parameter / Setting up PITR
    • archive_command parameter / Setting up PITR
  • PostgreSQL documentation
    • URL / Dealing with different types of indexes
  • PostgreSQL installation
    • setup, preparing / Preparing your setup
    • PostgreSQL version numbers / Understanding the PostgreSQL version numbers
    • binary packages, installing / Installing binary packages
    • performing, on Debian / Installing PostgreSQL on Debian or Ubuntu
    • performing, on Ubuntu / Installing PostgreSQL on Debian or Ubuntu
    • performing, on Red Hat-based systems / Installing PostgreSQL on Red-Hat-based systems
    • finalizing / Finalizing your installation
  • PostgreSQL log architecture
    • about / Understanding the PostgreSQL log architecture
    • log destinations, configuring / Configuring log destinations
  • PostgreSQL security
    • about / Understanding PostgreSQL security
    • TCP, configuring / Configuring the TCP
    • network authentication, managing / Managing network authentication
    • instance-level permissions, handling / Handling instance-level permissions
    • database-level permissions, controlling / Controlling database-level permissions
    • schema-level permissions / Understanding schema-level permissions
    • table-level permissions, handling / Handling table-level permissions
    • column rights, managing / Managing column rights
    • improving, with SELinux / Improving security with SELinux
  • PostgreSQL transaction log
    • about / Understanding the PostgreSQL transaction log
    • purpose / The purpose of the transaction log
    • size, inspecting / Inspecting the size of the transaction log
  • PostgreSQL version
    • selecting / Choosing the right version
  • PostgreSQL version numbers
    • about / Understanding the PostgreSQL version numbers
  • ps ax | grep post command / Passing users and passwords

Q

  • query, executing steps
    • parser / Understanding the concept of execution plans
    • rewrite system / Understanding the concept of execution plans
    • optimizer or planner / Understanding the concept of execution plans
    • executor / Understanding the concept of execution plans
  • query_time
    • about / Integrating Nagios

R

  • radius method / Authentication methods available
  • Red Hat-based systems
    • PostgreSQL, installing on / Installing PostgreSQL on Red-Hat-based systems
  • reject method / Authentication methods available
  • replication
    • improving / Improving and monitoring the replication, Making things more robust
    • monitoring / Improving and monitoring the replication
    • streaming, monitoring / Keeping an eye on streaming
    • conflicts, managing / Managing conflicts

S

  • schema-level permissions
    • about / Understanding schema-level permissions
  • schemas
    • about / Understanding schema-level permissions
  • search_path variable
    • about / Understanding schema-level permissions
  • SECURITY LABEL / Improving security with SELinux
  • SELinux
    • used, for improving security / Improving security with SELinux
  • shared buffers
    • about / Optimizing shared buffers
  • shared_buffers parameter
    • about / Optimizing shared buffers
  • simple binary trees
    • using / Using simple binary trees
    • data, preparing / Preparing the data
  • slow queries
    • detecting / Detecting slow queries
  • sp-gist index type
    • about / Dealing with different types of indexes
  • sspi method / Authentication methods available
  • standard error (stderr) / Understanding the PostgreSQL log architecture
  • statistics
    • resetting / How to reset statistics
  • synchronous replication
    • upgrading to / Upgrading to synchronous replication
  • syntax, CREATE ROLE
    • SUPERUSER | NOSUPERUSER / Creating roles
    • CREATEDB | NOCREATEDB / Creating roles
    • CREATEROLE | NOCREATEROLE / Creating roles
    • CREATEUSER | NOCREATEUSER / Creating roles
    • INHERIT | NOINHERIT / Creating roles
    • LOGIN | NOLOGIN / Creating roles
    • REPLICATION | NOREPLICATION / Creating roles
    • CONNECTION LIMIT / Creating roles
    • PASSWORD / Creating roles
    • VALID UNTIL / Creating roles
    • IN ROLE | IN GROUP / Creating roles
    • ROLE / Creating roles
    • ADMIN / Creating roles
    • USER / Creating roles
    • SYSID / Creating roles
  • syslog
    • about / Configuring log destinations, Using syslog
    • using / Using syslog
  • system statistics, PostgreSQL
    • about / Understanding the system statistics of PostgreSQL
    • pg_stat_activity file / Checking out the pg_stat_activity file
    • databases, monitoring / Monitoring databases
    • tables, monitoring / Monitoring tables
    • indexes, monitoring / Monitoring indexes
    • pg_stat_bgwriter / Checking out the information in the background writer
    • resetting / Resetting statistics

T

  • table-level permissions
    • handling / Handling table-level permissions
    • SELECT / Handling table-level permissions
    • INSERT / Handling table-level permissions
    • UPDATE / Handling table-level permissions
    • DELETE / Handling table-level permissions
    • TRUNCATE / Handling table-level permissions
    • REFERENCES / Handling table-level permissions
    • TRIGGER / Handling table-level permissions
  • TCP
    • configuring / Configuring the TCP
  • The Oversized Attribute Storage Technique (TOAST)
    • about / Monitoring tables
  • timelines
    • about / Understanding timelines
    • benefits / The importance of timelines
  • trust method / Authentication methods available

U

  • Ubuntu
    • PostgreSQL, installing on / Installing PostgreSQL on Debian or Ubuntu
  • USAGE clause
    • about / Understanding schema-level permissions
  • users and passwords
    • passing / Passing users and passwords

W

  • work_mem parameter
    • about / Tweaking work_mem
    • tweaking / Tweaking work_mem
  • Write Ahead Log (WAL) / The purpose of the transaction log
lock icon The rest of the chapter is locked
arrow left Previous Chapter
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $15.99/month. Cancel anytime}