In order to expand and collapse the table of contents, you must enable JavaScript in the browser.
(Collapse Contents)
Title Page
Preface
Chapter 1 Operating Fujitsu Enterprise Postgres
1.1 Operating Methods
1.2 Starting WebAdmin
1.2.1 Logging in to WebAdmin
1.3 Starting pgAdmin
1.3.1 Starting pgAdmin
1.3.2 Adding an Instance
1.3.3 Connecting/Disconnecting an Instance
1.3.4 Changing the pgAdmin Display Language
1.4 Operations Using Commands
1.5 Operating Environment of Fujitsu Enterprise Postgres
1.5.1 Operating Environment
1.5.2 File Composition
1.6 Notes on Compatibility of Applications Used for Operations
1.7 Notes on Upgrading Database Instances
1.7.1 Additional Steps for upgrading to Fujitsu Enterprise Postgres with Vertical Clustered Index (VCI) Enabled
1.7.2 Additional Steps to upgrading to Fujitsu Enterprise Postgres with Transparent Data Encryption (TDE) Enabled
Chapter 2 Starting an Instance and Creating a Database
2.1 Starting and Stopping an Instance
2.1.1 Using WebAdmin
2.1.2 Using Server Commands
2.2 Creating a Database
2.2.1 Using pgAdmin
2.2.2 Using Client Commands
Chapter 3 Backing Up the Database
3.1 Periodic Backup
3.2 Backup Methods
3.2.1 Using WebAdmin
3.2.2 Using Server Commands
Chapter 4 Configuring Secure Communication Using Secure Sockets Layer
4.1 Configuring Communication Data Encryption
4.1.1 Issuing a Certificate
4.1.2 Deploying a Server Certificate File and a Server Private Key File
4.1.3 Distributing a CA Certificate File to the Client
4.1.4 Configuring the Operating Environment for the Database Server
4.1.5 Configuring the Operating Environment for the Client
4.1.6 Performing Database Multiplexing
Chapter 5 Protecting Storage Data Using Transparent Data Encryption
5.1 Protecting Data Using Encryption
5.2 Setting the Master Encryption Key
5.3 Opening the Keystore
5.4 Encrypting a Tablespace
5.5 Checking an Encrypted Tablespace
5.6 Managing the Keystore
5.6.1 Changing the Master Encryption Key
5.6.2 Changing the Keystore Passphrase
5.6.3 Enabling Automatic Opening of the Keystore
5.6.4 Backing Up and Recovering the Keystore
5.7 Backing Up and Restoring/Recovering the Database
5.8 Importing and Exporting the Database
5.9 Encrypting Existing Data
5.10 Operations in Cluster Systems
5.10.1 HA Clusters that do not Use Database Multiplexing
5.10.2 Database Multiplexing Mode
5.11 Security-Related Notes
5.12 Tips for Installing Built Applications
Chapter 6 Using Transparent Data Encryption with Key Management Systems as Keystores
6.1 Protecting Data Using Encryption
6.2 Setting the Master Encryption Key
6.3 Opening the Keystore
6.4 Encrypting a Tablespace
6.5 Checking an Encrypted Tablespace
6.6 Managing the Keystore
6.6.1 Changing the Master Encryption Key
6.6.2 Enabling Automatic Opening of the Keystore
6.6.3 Changing Credentials for Key Management Systems
6.6.4 Verifying the Master Encryption Key
6.6.5 Changes to the Key Management System
6.7 Backing Up and Restoring/Recovering the Database
6.8 Importing and Exporting the Database
6.9 Encrypting Existing Data
6.10 Operations in Cluster Systems
6.10.1 HA Clusters that do not Use Database Multiplexing
6.10.2 Database Multiplexing Mode
6.11 Security-Related Notes
6.12 Tips for Installing Built Applications
6.13 Reference Information for Linking Key Management Systems Using Sample Plugins
Chapter 7 Policy-based Login Security
7.1 Advance Preparation
7.2 Changing the Contents of the default Profile
7.3 Creating and Assigning Profiles
7.4 Actions to be Taken in the Event of Deviation from Policy
7.5 Settings in Streaming Replication Configuration
7.6 Backup and Recovery
7.7 Profile parameters
7.8 Worker Processes
Chapter 8 Data Masking
8.1 Masking Policy
8.1.1 Masking Target
8.1.2 Masking Type
8.1.3 Masking Condition
8.1.4 Masking Format
8.2 Usage Method
8.2.1 Creating a Masking Policy
8.2.2 Changing a Masking Policy
8.2.3 Confirming a Masking Policy
8.2.4 Enabling and Disabling a Masking Policy
8.2.5 Deleting a Masking Policy
8.3 Data Types for Masking
8.4 Security Notes
Chapter 9 Periodic Operations
9.1 Configuring and Monitoring the Log
9.2 Monitoring Disk Usage and Securing Free Space
9.2.1 Monitoring Disk Usage
9.2.2 Securing Free Disk Space
9.3 Automatically Closing Connections
9.4 Monitoring the Connection State of an Application
9.4.1 Using the View (pg_stat_activity)
9.4.2 Using pgAdmin
9.5 Reorganizing Indexes
9.6 Monitoring Database Activity
9.6.1 Information that can be Collected
9.6.2 Collection Configuration
9.6.3 Information Reset
9.7 Scheduling of an Aggressive Freeze for Tuples (VACUUM FREEZE)
9.7.1 Monitoring Trends in Transaction ID Usage
9.7.2 How to Schedule Aggressive Freeze for Tuples
9.7.3 Tuning the Allocation Time for Aggressive Freeze for Tuples
9.8 Database Operation Monitoring with Amazon CloudWatch
9.8.1 Metrics Collection
9.8.2 Log Collection
9.8.3 Metrics Collected by the Sample Script
9.9 Monitoring Deferred SQL and Periodically Backing up statistics
9.10 Performance Tuning
9.10.1 Enhanced Query Plan Stability
9.10.1.1 Fixing the Height of a Btree Index
Chapter 10 Streaming Replication Using WebAdmin
10.1 Creating a Standby Instance
10.2 Promoting a Standby Instance
10.3 Converting an Asynchronous Replication to Synchronous
10.4 Converting a Synchronous Replication to Asynchronous
10.5 Joining a Replication Cluster
Chapter 11 Installing and Operating the In-memory Feature
11.1 Installing Vertical Clustered Index (VCI)
11.1.1 Evaluating whether to Install VCI
11.1.2 Estimating Resources
11.1.3 Setting up
11.1.3.1 Setting Parameters
11.1.3.2 Installing the Extensions
11.1.3.3 Creating a VCI
11.1.3.4 Confirming that the VCI has been Created
11.1.4 Data that can Use VCI
11.1.4.1 Relation Types
11.1.4.2 Data Types
11.2 Operating VCI
11.2.1 Commands that cannot be Used for VCI
11.2.2 Data Preload Feature
Chapter 12 Parallel Query
12.1 CPU Load Calculation
12.2 Increase of Workers during Runtime
12.3 Statistics View Displays the Action State
Chapter 13 High-Speed Data Load
13.1 Installing High-Speed Data Load
13.1.1 Deciding whether to Install
13.1.2 Estimating Resources
13.1.3 Setup
13.1.3.1 Setting Parameters
13.1.3.2 Installing the Extension
13.2 Using High-Speed Data Load
13.2.1 Loading Data
13.2.2 Checking Progress
13.2.3 Recovering from a Data Load that Ended Abnormally
13.3 Removing High-Speed Data Load
13.3.1 Removing the Extension
Chapter 14 Global Meta Cache
14.1 Usage
14.1.1 Deciding Whether to Enable the Global Meta Cache Feature
14.1.2 Estimating Memory for Global Meta Cache
14.1.3 How the GMC Memory Area Is Used
14.1.4 Enabling the Global Meta Cache Feature
14.1.5 Estimating Resources
14.2 Statistics
14.2.1 System View
Chapter 15 Local Meta Cache Limit
15.1 Usage
15.1.1 Deciding Whether to Enable the Local Meta Cache Limit Feature
15.1.2 How to Set Parameters for the Local Meta Cache Limit Feature
15.1.3 Cache Removal when Local Meta Cache Limit is Enabled
15.1.4 Performance Impact and Parameter Tuning of the Local Meta Cache Limit Feature
Chapter 16 Backup/Recovery Using the Copy Command
16.1 Configuration of the Copy Command
16.2 Backup Using the Copy Command
16.3 Recovery Using the Copy Command
16.4 Copy Command Interface
16.4.1 Copy Command for Backup
16.4.2 Copy Command for Recovery
Chapter 17 Actions when an Error Occurs
17.1 Recovering from Disk Failure (Hardware)
17.1.1 Using WebAdmin
17.1.2 Using Server Command
17.2 Recovering from Data Corruption
17.2.1 Using WebAdmin
17.2.2 Using the pgx_rcvall Command
17.3 Recovering from an Incorrect User Operation
17.3.1 Using WebAdmin
17.3.2 Using the pgx_rcvall Command
17.4 Actions in Response to an Application Error
17.4.1 When using the view (pg_stat_activity)
17.4.2 Using the ps Command
17.4.3 Using pgAdmin
17.5 Actions in Response to an Access Error
17.6 Actions in Response to Insufficient Space on the Data Storage Destination
17.6.1 Using a Tablespace
17.6.2 Replacing the Disk with a Larger Capacity Disk
17.6.2.1 Using WebAdmin
17.6.2.2 Using Server Commands
17.7 Actions in Response to Insufficient Space on the Backup Data Storage Destination
17.7.1 Temporarily Saving Backup Data
17.7.1.1 Using WebAdmin
17.7.1.2 Using Server Commands
17.7.2 Replacing the Disk with a Larger Capacity Disk
17.7.2.1 Using WebAdmin
17.7.2.2 Using Server Commands
17.8 Actions in Response to Insufficient Space on the Transaction Log Storage Destination
17.8.1 Replacing the Disk with a Larger Capacity Disk
17.8.1.1 Using WebAdmin
17.8.1.2 Using Server Commands
17.9 Errors in More Than One Storage Disk
17.10 Actions in Response to Instance Startup Failure
17.10.1 Errors in the Configuration File
17.10.2 Errors Caused by Power Failure or Mounting Issues
17.10.3 Other Errors
17.10.3.1 Using WebAdmin
17.10.3.2 Using Server Commands
17.11 Actions in Response to Failure to Stop an Instance
17.11.1 Using WebAdmin
17.11.2 Using Server Commands
17.11.2.1 Stopping the Instance Using the Fast Mode
17.11.2.2 Stopping the Instance Using the Immediate Mode
17.11.2.3 Forcibly Stopping the Server Process
17.12 Actions in Response to Failure to Create a Streaming Replication Standby Instance
17.13 Actions in Response to Error in a Distributed Transaction
17.14 I/O Errors Other than Disk Failure
17.14.1 Network Error with an External Disk
17.14.2 Errors Caused by Power Failure or Mounting Issues
17.15 Anomaly Detection and Resolution
17.15.1 Port Number and Backup Storage Path Anomalies
17.15.2 Mirroring Controller Anomalies
Appendix A Parameters
Appendix B System Administration Functions
B.1 WAL Mirroring Control Functions
B.2 Transparent Data Encryption Control Functions
B.2.1 pgx_open_keystore
B.2.2 pgx_set_master_key
B.2.3 pgx_declare_external_master_key
B.2.4 pgx_set_keystore_passphrase
B.3 Profile Management Functions and User Management Functions
B.3.1 Profile Management Functions
B.3.2 User Management Functions
B.4 Data Masking Control Functions
B.4.1 pgx_alter_confidential_policy
B.4.2 pgx_create_confidential_policy
B.4.3 pgx_drop_confidential_policy
B.4.4 pgx_enable_confidential_policy
B.4.5 pgx_update_confidential_values
B.5 VCI Data Load Control Function
B.6 High-Speed Data Load Control Functions
Appendix C System Catalogs
C.1 pgx_profile
C.2 pgx_user_profile
C.3 pgx_auth_password
C.4 pgx_password_history
Appendix D System Views
D.1 pgx_tablespaces
D.2 pgx_stat_lwlock
D.3 pgx_stat_latch
D.4 pgx_stat_walwriter
D.5 pgx_stat_sql
D.6 pgx_stat_gmc
D.7 pgx_stat_progress_loader
Appendix E Tables Used by Transparent Data Encryption
E.1 pgx_tde_master_key
Appendix F Tables Used by Data Masking
F.1 pgx_confidential_columns
F.2 pgx_confidential_policies
F.3 pgx_confidential_values
Appendix G Tables Used by Aggressive Freeze for Tuples
G.1 pgx_stat_freeze_results
Appendix H Tables Used by High-Speed Data Load
H.1 pgx_loader_state
Appendix I Starting and Stopping the Web Server Feature of WebAdmin
I.1 Starting the Web Server Feature of WebAdmin
I.2 Stopping the Web Server Feature of WebAdmin
Appendix J WebAdmin Wallet
J.1 Creating a Credential
J.2 Using a Credential
Appendix K WebAdmin Disallow User Inputs Containing Hazardous Characters
Appendix L Copy Command Samples that Use the Advanced Copy Feature of the ETERNUS Disk Array
Appendix M Collecting Failure Investigation Data
Top