Part III. Server Administration#
Part III. Server Administration
This part covers topics that are of interest to a Tantor SE database administrator. This includes installation of the software, set up and configuration of the server, management of users and databases, and maintenance tasks. Anyone who runs a Tantor SE server, even for personal use, but especially in production, should be familiar with the topics covered in this part.
The information in this part is arranged approximately in the order in which a new user should read it. But the chapters are self-contained and can be read individually as desired. The information in this part is presented in a narrative fashion in topical units. Readers looking for a complete description of a particular command should see Part VI.
The first few chapters are written so they can be understood without prerequisite knowledge, so new users who need to set up their own server can begin their exploration with this part. The rest of this part is about tuning and management; that material assumes that the reader is familiar with the general use of the Tantor SE database system. Readers are encouraged to look at Part I and Part II for additional information.
Table of Contents
- 17. Installation from Binaries
- 18. Server Setup and Operation
- 18.1. The Tantor SE User Account
- 18.2. Creating a Database Cluster
- 18.3. Starting the Database Server
- 18.4. Managing Kernel Resources
- 18.5. Shutting Down the Server
- 18.6. Upgrading a Tantor SE Cluster
- 18.7. Preventing Server Spoofing
- 18.8. Encryption Options
- 18.9. Secure TCP/IP Connections with SSL
- 18.10. Secure TCP/IP Connections with GSSAPI Encryption
- 18.11. Secure TCP/IP Connections with SSH Tunnels
- 18.12. Registering Event Log on Windows
- 19. Server Configuration
- 19.1. Setting Parameters
- 19.2. File Locations
- 19.3. Connections and Authentication
- 19.4. Resource Consumption
- 19.5. Write Ahead Log
- 19.6. Replication
- 19.7. Query Planning
- 19.8. Error Reporting and Logging
- 19.9. Run-time Statistics
- 19.10. Automatic Vacuuming
- 19.11. Client Connection Defaults
- 19.12. Lock Management
- 19.13. Version and Platform Compatibility
- 19.14. Error Handling
- 19.15. Preset Options
- 19.16. Customized Options
- 19.17. Developer Options
- 19.18. Short Options
- 20. Client Authentication
- 20.1. The
pg_hba.conf
File - 20.2. User Name Maps
- 20.3. Authentication Methods
- 20.4. Trust Authentication
- 20.5. Password Authentication
- 20.6. GSSAPI Authentication
- 20.7. SSPI Authentication
- 20.8. Ident Authentication
- 20.9. Peer Authentication
- 20.10. LDAP Authentication
- 20.11. RADIUS Authentication
- 20.12. Certificate Authentication
- 20.13. PAM Authentication
- 20.14. BSD Authentication
- 20.15. Authentication Problems
- 20.1. The
- 21. Database Roles
- 22. Managing Databases
- 23. Localization
- 24. Routine Database Maintenance Tasks
- 25. Backup and Restore
- 26. High Availability, Load Balancing, and Replication
- 27. Monitoring Database Activity
- 28. Monitoring Disk Usage
- 29. Reliability and the Write-Ahead Log
- 30. Logical Replication
- 31. Just-in-Time Compilation (JIT)
- Chapter 17. Installation from Binaries
- Chapter 18. Server Setup and Operation
- Chapter 19. Server Configuration
- Chapter 20. Client Authentication
- Chapter 21. Database Roles
- Chapter 22. Managing Databases
- Chapter 23. Localization
- Chapter 24. Routine Database Maintenance Tasks
- Chapter 25. Backup and Restore
- Chapter 26. High Availability, Load Balancing, and Replication
- Chapter 27. Monitoring Database Activity
- Chapter 28. Monitoring Disk Usage
- Chapter 29. Reliability and the Write-Ahead Log
- Chapter 30. Logical Replication
- Chapter 31. Just-in-Time Compilation (JIT)