In order to expand and collapse the table of contents, you must enable JavaScript in the browser.
(Collapse Contents)
Title Page
Preface
Chapter 1 Operating Fujitsu Enterprise Postgres
1.1 Operating Methods
1.2 Starting WebAdmin
1.2.1 Logging in to WebAdmin
1.3 Starting pgAdmin
1.3.1 Starting pgAdmin
1.3.2 Adding an Instance
1.3.3 Connecting/Disconnecting an Instance
1.3.4 Changing the pgAdmin Display Language
1.4 Operations Using Commands
1.5 Operating Environment of Fujitsu Enterprise Postgres
1.5.1 Operating Environment
1.5.2 File Composition
1.6 Notes on Compatibility of Applications Used for Operations
1.7 Notes on Upgrading Database Instances
1.7.1 Additional Steps for upgrading to Fujitsu Enterprise Postgres with Vertical Clustered Index (VCI) Enabled
1.7.2 Additional Steps to upgrading to Fujitsu Enterprise Postgres with Transparent Data Encryption (TDE) Enabled
Chapter 2 Starting an Instance and Creating a Database
2.1 Starting and Stopping an Instance
2.1.1 Using WebAdmin
2.1.2 Using Commands
2.2 Creating a Database
2.2.1 Using pgAdmin
2.2.2 Using Client Commands
Chapter 3 Backing Up the Database
3.1 Periodic Backup
3.2 Backup Methods
3.2.1 Using WebAdmin
3.2.2 Using Server Commands
Chapter 4 Configuring Secure Communication Using Secure Sockets Layer
4.1 Configuring Communication Data Encryption
4.1.1 Issuing a Certificate
4.1.2 Deploying a Server Certificate File and a Server Private Key File
4.1.3 Distributing a CA Certificate File to the Client
4.1.4 Configuring the Operating Environment for the Database Server
4.1.5 Configuring the Operating Environment for the Client
4.1.6 Performing Database Multiplexing
Chapter 5 Protecting Storage Data Using Transparent Data Encryption
5.1 Protecting Data Using Encryption
5.2 Setting the Master Encryption Key
5.3 Opening the Keystore
5.4 Encrypting a Tablespace
5.5 Checking an Encrypted Tablespace
5.6 Managing the Keystore
5.6.1 Changing the Master Encryption Key
5.6.2 Changing the Keystore Passphrase
5.6.3 Enabling Automatic Opening of the Keystore
5.6.4 Backing Up and Recovering the Keystore
5.7 Backing Up and Restoring/Recovering the Database
5.8 Importing and Exporting the Database
5.9 Encrypting Existing Data
5.10 Operations in Cluster Systems
5.10.1 HA Clusters that do not Use Database Multiplexing
5.10.2 Database Multiplexing Mode
5.11 Security-Related Notes
5.12 Tips for Installing Built Applications
Chapter 6 Policy-based Login Security
6.1 Advance Preparation
6.2 Changing the Contents of the default Profile
6.3 Creating and Assigning Profiles
6.4 Actions to be Taken in the Event of Deviation from Policy
6.5 Settings in Streaming Replication Configuration
6.6 Backup and Recovery
6.7 Profile parameters
6.8 Worker Processes
Chapter 7 Data Masking
7.1 Masking Policy
7.1.1 Masking Target
7.1.2 Masking Type
7.1.3 Masking Condition
7.1.4 Masking Format
7.2 Usage Method
7.2.1 Creating a Masking Policy
7.2.2 Changing a Masking Policy
7.2.3 Confirming a Masking Policy
7.2.4 Enabling and Disabling a Masking Policy
7.2.5 Deleting a Masking Policy
7.3 Data Types for Masking
7.4 Security Notes
Chapter 8 Periodic Operations
8.1 Configuring and Monitoring the Log
8.2 Monitoring Disk Usage and Securing Free Space
8.2.1 Monitoring Disk Usage
8.2.2 Securing Free Disk Space
8.3 Automatically Closing Connections
8.4 Monitoring the Connection State of an Application
8.4.1 Using the View (pg_stat_activity)
8.4.2 Using pgAdmin
8.5 Reorganizing Indexes
8.6 Monitoring Database Activity
8.6.1 Information that can be Collected
8.6.2 Collection Configuration
8.6.3 Information Reset
8.7 Scheduling of an Aggressive Freeze for Tuples (VACUUM FREEZE)
8.7.1 Monitoring Trends in Transaction ID Usage
8.7.2 How to Schedule Aggressive Freeze for Tuples
8.7.3 Tuning the Allocation Time for Aggressive Freeze for Tuples
8.8 Database Operation Monitoring with Amazon CloudWatch
8.8.1 Metrics Collection
8.8.2 Log Collection
8.8.3 Metrics Collected by the Sample Script
8.9 Monitoring Deferred SQL and Periodically Backing up statistics
8.10 Performance Tuning
8.10.1 Enhanced Query Plan Stability
8.10.1.1 Fixing the Height of a Btree Index
Chapter 9 Streaming Replication Using WebAdmin
9.1 Creating a Standby Instance
9.2 Promoting a Standby Instance
9.3 Converting an Asynchronous Replication to Synchronous
9.4 Converting a Synchronous Replication to Asynchronous
9.5 Joining a Replication Cluster
Chapter 10 Installing and Operating the In-memory Feature
10.1 Installing Vertical Clustered Index (VCI)
10.1.1 Evaluating whether to Install VCI
10.1.2 Estimating Resources
10.1.3 Setting up
10.1.3.1 Setting Parameters
10.1.3.2 Installing the Extensions
10.1.3.3 Creating a VCI
10.1.3.4 Confirming that the VCI has been Created
10.1.4 Data that can Use VCI
10.1.4.1 Relation Types
10.1.4.2 Data Types
10.2 Operating VCI
10.2.1 Commands that cannot be Used for VCI
10.2.2 Data Preload Feature
Chapter 11 Parallel Query
11.1 CPU Load Calculation
11.2 Increase of Workers during Runtime
11.3 Statistics View Displays the Action State
Chapter 12 High-Speed Data Load
12.1 Installing High-Speed Data Load
12.1.1 Deciding whether to Install
12.1.2 Estimating Resources
12.1.3 Setup
12.1.3.1 Setting Parameters
12.1.3.2 Installing the Extension
12.2 Using High-Speed Data Load
12.2.1 Loading Data
12.2.2 Checking Progress
12.2.3 Recovering from a Data Load that Ended Abnormally
12.3 Removing High-Speed Data Load
12.3.1 Removing the Extension
Chapter 13 Global Meta Cache
13.1 Usage
13.1.1 Deciding Whether to Enable the Global Meta Cache Feature
13.1.2 Estimating Memory for Global Meta Cache
13.1.3 How the GMC Memory Area Is Used
13.1.4 Enabling the Global Meta Cache Feature
13.1.5 Estimating Resources
13.2 Statistics
13.2.1 System View
Chapter 14 Local Meta Cache Limit
14.1 Usage
14.1.1 Deciding Whether to Enable the Local Meta Cache Limit Feature
14.1.2 How to Set Parameters for the Local Meta Cache Limit Feature
14.1.3 Cache Removal when Local Meta Cache Limit is Enabled
14.1.4 Performance Impact and Parameter Tuning of the Local Meta Cache Limit Feature
Chapter 15 Backup/Recovery Using the Copy Command
15.1 Configuration of the Copy Command
15.2 Backup Using the Copy Command
15.3 Recovery Using the Copy Command
15.4 Copy Command Interface
15.4.1 Copy Command for Backup
15.4.2 Copy Command for Recovery
Chapter 16 Actions when an Error Occurs
16.1 Recovering from Disk Failure (Hardware)
16.1.1 Using WebAdmin
16.1.2 Using Server Command
16.2 Recovering from Data Corruption
16.2.1 Using WebAdmin
16.2.2 Using the pgx_rcvall Command
16.3 Recovering from an Incorrect User Operation
16.3.1 Using WebAdmin
16.3.2 Using the pgx_rcvall Command
16.4 Actions in Response to an Application Error
16.4.1 When using the view (pg_stat_activity)
16.4.2 Using pgAdmin
16.5 Actions in Response to an Access Error
16.6 Actions in Response to Insufficient Space on the Data Storage Destination
16.6.1 Using a Tablespace
16.6.2 Replacing the Disk with a Larger Capacity Disk
16.6.2.1 Using WebAdmin
16.6.2.2 Using Server Commands
16.7 Actions in Response to Insufficient Space on the Backup Data Storage Destination
16.7.1 Temporarily Saving Backup Data
16.7.1.1 Using WebAdmin
16.7.1.2 Using Server Commands
16.7.2 Replacing the Disk with a Larger Capacity Disk
16.7.2.1 Using WebAdmin
16.7.2.2 Using Server Commands
16.8 Actions in Response to Insufficient Space on the Transaction Log Storage Destination
16.8.1 Replacing the Disk with a Larger Capacity Disk
16.8.1.1 Using WebAdmin
16.8.1.2 Using Server Commands
16.9 Errors in More Than One Storage Disk
16.10 Actions in Response to Instance Startup Failure
16.10.1 Errors in the Configuration File
16.10.2 Errors Caused by Power Failure or Mounting Issues
16.10.3 Other Errors
16.10.3.1 Using WebAdmin
16.10.3.2 Using Server Commands
16.11 Actions in Response to Failure to Stop an Instance
16.11.1 Using WebAdmin
16.11.2 Using Server Commands
16.11.2.1 Stopping the Instance Using the Fast Mode
16.11.2.2 Stopping the Instance Using the Immediate Mode
16.11.2.3 Forcibly Stopping the Server Process
16.12 Actions in Response to Failure to Create a Streaming Replication Standby Instance
16.13 Actions in Response to Error in a Distributed Transaction
16.14 I/O Errors Other than Disk Failure
16.14.1 Network Error with an External Disk
16.14.2 Errors Caused by Power Failure or Mounting Issues
16.15 Anomaly Detection and Resolution
16.15.1 Port Number and Backup Storage Path Anomalies
16.15.2 Mirroring Controller Anomalies
Appendix A Parameters
Appendix B System Administration Functions
B.1 WAL Mirroring Control Functions
B.2 Transparent Data Encryption Control Functions
B.2.1 pgx_open_keystore
B.2.2 pgx_set_master_key
B.2.3 pgx_set_keystore_passphrase
B.3 Profile Management Functions and User Management Functions
B.3.1 Profile Management Functions
B.3.2 User Management Functions
B.4 Data Masking Control Functions
B.4.1 pgx_alter_confidential_policy
B.4.2 pgx_create_confidential_policy
B.4.3 pgx_drop_confidential_policy
B.4.4 pgx_enable_confidential_policy
B.4.5 pgx_update_confidential_values
B.5 VCI Data Load Control Function
B.6 High-Speed Data Load Control Functions
Appendix C System Catalogs
C.1 pgx_profile
C.2 pgx_user_profile
C.3 pgx_auth_password
C.4 pgx_password_history
Appendix D System Views
D.1 pgx_tablespaces
D.2 pgx_stat_lwlock
D.3 pgx_stat_latch
D.4 pgx_stat_walwriter
D.5 pgx_stat_sql
D.6 pgx_stat_gmc
D.7 pgx_stat_progress_loader
Appendix E Tables Used by Data Masking
E.1 pgx_confidential_columns
E.2 pgx_confidential_policies
E.3 pgx_confidential_values
Appendix F Tables Used by Aggressive Freeze for Tuples
F.1 pgx_stat_freeze_results
Appendix G Tables Used by High-Speed Data Load
G.1 pgx_loader_state
Appendix H Starting and Stopping the Web Server Feature of WebAdmin
H.1 Starting the Web Server Feature of WebAdmin
H.2 Stopping the Web Server Feature of WebAdmin
Appendix I WebAdmin Wallet
I.1 Creating a Credential
I.2 Using a Credential
Appendix J WebAdmin Disallow User Inputs Containing Hazardous Characters
Appendix K Collecting Failure Investigation Data
Top