Catalogs: pg_default_acl

The catalog pg_default_acl stores initial privileges to be assigned to newly created objects. Table 50-17. pg_default_acl Columns Name Type References Description oid oid Row identifier (hidden attribute; must be explicitly selected) defaclrole oid pg_authid.oid The OID of the role associated with this entry defaclnamespace oid pg_namespace.oid The OID of the namespace associated with this entry, or 0 if none defaclobjtype char Type of object this entry is for: r = relation (table, view),

Catalogs: pg_settings

The view pg_settings provides access to run-time parameters of the server. It is essentially an alternative interface to the SHOW and SET commands. It also provides access to some facts about each parameter that are not directly available from SHOW, such as minimum and maximum values. Table 50-76. pg_settings Columns Name Type Description name text Run-time configuration parameter name setting text Current value of the parameter unit text Implicit unit of the parameter category text Logical g

Internals//Physical Storage: Initialization Fork

Each unlogged table, and each index on an unlogged table, has an initialization fork. The initialization fork is an empty table or index of the appropriate type. When an unlogged table must be reset to empty due to a crash, the initialization fork is copied over the main fork, and any other forks are erased (they will be recreated automatically as needed). Prev Next Visibility Map Up Database Page Layout

DROP ACCESS METHOD

NameDROP ACCESS METHOD -- remove an access method Synopsis DROP ACCESS METHOD [ IF EXISTS ] name [ CASCADE | RESTRICT ] Description DROP ACCESS METHOD removes an existing access method. Only superusers can drop access methods. Parameters IF EXISTS Do not throw an error if the access method does not exist. A notice is issued in this case. name The name of an existing access method. CASCADE Automatically drop objects that depend on the access method (such as operator classes, o

auth_delay

auth_delay causes the server to pause briefly before reporting authentication failure, to make brute-force attacks on database passwords more difficult. Note that it does nothing to prevent denial-of-service attacks, and may even exacerbate them, since processes that are waiting before reporting authentication failure will still consume connection slots. In order to function, this module must be loaded via shared_preload_libraries in postgresql.conf. F.2.1. Configuration Parameters auth_dela

ALTER USER MAPPING

NameALTER USER MAPPING -- change the definition of a user mapping Synopsis ALTER USER MAPPING FOR { user_name | USER | CURRENT_USER | SESSION_USER | PUBLIC } SERVER server_name OPTIONS ( [ ADD | SET | DROP ] option ['value'] [, ... ] ) Description ALTER USER MAPPING changes the definition of a user mapping. The owner of a foreign server can alter user mappings for that server for any user. Also, a user can alter a user mapping for their own user name if USAGE privilege on the

Monitoring: Disk Full Failure

The most important disk monitoring task of a database administrator is to make sure the disk doesn't become full. A filled data disk will not result in data corruption, but it might prevent useful activity from occurring. If the disk holding the WAL files grows full, database server panic and consequent shutdown might occur. If you cannot free up additional space on the disk by deleting other things, you can move some of the database files to other file systems by making use of tablespaces. See

Server Configuration: Developer Options

The following parameters are intended for work on the PostgreSQL source code, and in some cases to assist with recovery of severely damaged databases. There should be no reason to use them on a production database. As such, they have been excluded from the sample postgresql.conf file. Note that many of these parameters require special source compilation flags to work at all. allow_system_table_mods (boolean) Allows modification of the structure of system tables. This is used by initdb. This

PREPARE

NamePREPARE -- prepare a statement for execution Synopsis PREPARE name [ ( data_type [, ...] ) ] AS statement Description PREPARE creates a prepared statement. A prepared statement is a server-side object that can be used to optimize performance. When the PREPARE statement is executed, the specified statement is parsed, analyzed, and rewritten. When an EXECUTE command is subsequently issued, the prepared statement is planned and executed. This division of labor avoids repetitive parse

DROP TEXT SEARCH CONFIGURATION

NameDROP TEXT SEARCH CONFIGURATION -- remove a text search configuration Synopsis DROP TEXT SEARCH CONFIGURATION [ IF EXISTS ] name [ CASCADE | RESTRICT ] Description DROP TEXT SEARCH CONFIGURATION drops an existing text search configuration. To execute this command you must be the owner of the configuration. Parameters IF EXISTS Do not throw an error if the text search configuration does not exist. A notice is issued in this case. name The name (optionally schema-qualified) of