Appendix F. Additional Supplied Modules#
Appendix F. Additional Supplied Modules
Table of Contents
- F.1. adminpack
- F.2. amcheck
- F.3. auth_delay
- F.4. auto_explain
- F.5. basebackup_to_shell
- F.6. basic_archive
- F.7. bloom
- F.8. btree_gin
- F.9. btree_gist
- F.10. citext
- F.11. spi
- F.12. credcheck
- F.13. cube
- F.14. dblink
- dblink_connect — opens a persistent connection to a remote database
- dblink_connect_u — opens a persistent connection to a remote database, insecurely
- dblink_disconnect — closes a persistent connection to a remote database
- dblink — executes a query in a remote database
- dblink_exec — executes a command in a remote database
- dblink_open — opens a cursor in a remote database
- dblink_fetch — returns rows from an open cursor in a remote database
- dblink_close — closes a cursor in a remote database
- dblink_get_connections — returns the names of all open named dblink connections
- dblink_error_message — gets last error message on the named connection
- dblink_send_query — sends an async query to a remote database
- dblink_is_busy — checks if connection is busy with an async query
- dblink_get_notify — retrieve async notifications on a connection
- dblink_get_result — gets an async query result
- dblink_cancel_query — cancels any active query on the named connection
- dblink_get_pkey — returns the positions and field names of a relation's primary key fields
- dblink_build_sql_insert — builds an INSERT statement using a local tuple, replacing the primary key field values with alternative supplied values
- dblink_build_sql_delete — builds a DELETE statement using supplied values for primary key field values
- dblink_build_sql_update — builds an UPDATE statement using a local tuple, replacing the primary key field values with alternative supplied values
- F.15. dict_int
- F.16. dict_xsyn
- F.17. earthdistance
- F.18. file_fdw
- F.19. fuzzystrmatch
- F.20. hstore
- F.21. intagg
- F.22. intarray
- F.23. isn
- F.24. lo
- F.25. ltree
- F.26. old_snapshot
- F.27. pageinspect
- F.28. page_repair
- F.29. passwordcheck
- F.30. pgAudit
- F.31. pgAudit Log to File
- F.32. pg_background
- F.33. pg_buffercache
- F.34. pg_cron
- F.35. pgcrypto
- F.36. pg_freespacemap
- F.37. pg_prewarm
- F.38. pg_repack
- F.39. pgrowlocks
- F.40. pg_stat_kcache
- F.41. pg_stat_statements
- F.42. pgstattuple
- F.43. pg_store_plans
- F.44. pg_surgery
- F.45. pg_trgm
- F.46. pg_visibility
- F.47. pg_wait_sampling
- F.48. pg_walinspect
- F.49. postgres_fdw
- F.50. seg
- F.51. sepgsql
- F.52. sslinfo
- F.53. tablefunc
- F.54. tcn
- F.55. test_decoding
- F.56. tsm_system_rows
- F.57. tsm_system_time
- F.58. unaccent
- F.59. uuid-ossp
- F.60. xml2
This appendix and the next one contain information regarding the modules that
can be found in the contrib
directory of the
Tantor BE distribution.
These include porting tools, analysis utilities,
and plug-in features that are not part of the core PostgreSQL system,
mainly because they address a limited audience or are too experimental
to be part of the main source tree. This does not preclude their
usefulness.
This appendix covers extensions and other server plug-in modules found in
contrib
. Appendix G covers utility
programs.
If you are using a pre-packaged version of Tantor BE,
these modules are typically made available as a separate subpackage,
such as postgresql-contrib
.
Many modules supply new user-defined functions, operators, or types. To make use of one of these modules, after you have installed the code you need to register the new SQL objects in the database system. This is done by executing a CREATE EXTENSION command. In a fresh database, you can simply do
CREATE EXTENSION module_name
;
This command registers the new SQL objects in the current database only,
so you need to run it in each database that you want
the module's facilities to be available in. Alternatively, run it in
database template1
so that the extension will be copied into
subsequently-created databases by default.
For all these modules, CREATE EXTENSION
must be run
by a database superuser, unless the module is
considered “trusted”, in which case it can be run by any
user who has CREATE
privilege on the current
database. Modules that are trusted are identified as such in the
sections that follow. Generally, trusted modules are ones that cannot
provide access to outside-the-database functionality.
Many modules allow you to install their objects in a schema of your
choice. To do that, add SCHEMA
to the schema_name
CREATE EXTENSION
command. By default, the objects will be placed in your current creation
target schema, which in turn defaults to public
.
Note, however, that some of these modules are not “extensions” in this sense, but are loaded into the server in some other way, for instance by way of shared_preload_libraries. See the documentation of each module for details.