Are you sure you're using the same data det ?
Unless I'm overlooking something obvious one result has 500 000 rows the
other 7 000.
>
On Tue, May 21, 2019 at 8:27 PM Walter Smith wrote:
> On Tue, May 21, 2019 at 11:17 AM Peter Geoghegan wrote:
>
>> On Tue, May 21, 2019 at 11:16 AM Walter Smith
>> wrote:
>> > It occurs to me that is a somewhat unusual index -- it tracks
>> unprocessed notifications so it gets an insert and del
Hi Sergei
Thank you for your explanation. I can understand for the lock wait
message, but I have no DETAIL section in my entire log file. Why ?
I have plenty of STATEMENT sections ...
Thanks in advance
Best Regards
Didier ROS
-Message d'origine-
D
Hi
I have executed grep command on the entire logfile for pid 24803. See the
attached file
NB : I have no DETAIL section in my entire log file. Is it normal ?
Best Reagrds
Didier ROS
-Message d'origine-
De : pry...@telsasoft.com [mailto:pry...@telsasoft.com]
Envoyé : sam
$7 where code=$8
<<
After a fresh db restart, the result is the same : no content of Bind variables
in the log file.
Best Regards[cid:image002.png@01D14E0E.8515EB90]
Didier ROS
Expertise SGBD
EDF - DTEO - DSIT - IT DMA
Département Solutions Groupe
Groupe Performance Applicative
32 aven
-> suggestion : It would be nice to have the content of bind variable of a
query in a table of pg_catalog. (cf ORACLE)
Didier ROS
Expertise SGBD
EDF - DTEO - DSIT - IT DMA
Département Solutions Groupe
Groupe Performance Applicative
32 avenue Pablo Picasso
92000 NANTERRE
didier@edf.fr
Té
;
log_min_duration_statement=250;
Didier ROS
Expertise SGBD
EDF - DTEO - DSIT - IT DMA
Département Solutions Groupe
Groupe Performance Applicative
32 avenue Pablo Picasso
92000 NANTERRE
didier@edf.fr
Tél. : +33 6 49 51 11 88
-Message d'origine-
De : pry...@telsasoft.com [mailto:pry...@telsasof
gin=$2, modification_date=$3, modification_login=$4,
administrable=$5, libelle=$6, niveau=$7 where code=$8
<<
The statement has been executed
It is the same problem for all the statements.
I can not get the content of the bind variables.
Didier ROS
Expertise SGBD
EDF - DTEO - DSIT - IT DMA
Hi
Thanks for the answer.
I have in my postgresql.conf :
log_min_duration_statement=0
and the content of bind variables is not showed in the log file.
What can I do to get the content of the bind variables ?
Best Regard
[cid:image002.png@01D14E0E.8515EB90]
Didier ROS
Expertise
of the bind variables ?
Thanks in advance
Best Regards
[cid:image002.png@01D14E0E.8515EB90]
Didier ROS
Expertise SGBD
EDF - DTEO - DSIT - IT DMA
Département Solutions Groupe
Groupe Performance Applicative
32 avenue Pablo Picasso
92000 NANTERRE
didier@edf.fr<mailto:didier@edf.fr>
am going to test
it.
Best Regards
Didier ROS
De : p...@paulmcgarry.com [mailto:p...@paulmcgarry.com]
Envoyé : lundi 8 octobre 2018 00:11
À : ROS Didier
Cc : fola...@peoplecall.com; pavel.steh...@gmail.com;
pgsql-...@lists.postgresql.org; pgsql-performance@lists.postgresql.org;
pgsql-gene
except those who have
the encryption key.
in case of files theft, backups theft, dumps theft, we do not want anyone to
access sensitive data.
- I have tested the solution you proposed, it works great.
Best Regards
Didier ROS
-Message d'origine-
De : tomas.von...@2ndquadrant
Hi Vlad
OK, I take into account your remark about the need to do
research on encrypted data.
My answers to your remarks :
>>
you can use a deterministic algorithm for it (without salt)
<<
Can you give me on of these deterministic algorithms(without salt) ?
Best Regard
Hi Vlad
Sorry for this delay, but apparently the subject is of interest to many people
in the community. I received a lot of comments and answers.
I wrote my answers in the body of your message below
Best Regards
Didier
De : greatvo...@gmail.com [mailto:greatvo...@gmail.com]
Envoyé : samedi 6
Hi Virendra
You think that outside encryption of the database is the best solution
?
How do you manage the encryption key ?
Can you give me some examples of this kind of solution.
Best Regards
Didier ROS
-Message d'origine-
De : virend
u say that it is possible, in spite of everything, to use
indexes on the encrypted data by using deterministic algorithms.
Can you tell me some examples of these algorithms?
Thanks in advance
Best Regards
[cid:image002.png@01D14E0E.8515EB90]
Didier ROS
Expertise SGBD
De : greatvo...
an connect to it.
it's not the best solution, but we have data encryption needs and good
performance needs too. I do not know how to do it except the specified
procedure..
if anyone has any proposals to put this in place, I'm interested.
Thanks in advance
Bes
Hi Paul
Thanks for the explanation. I think you are right.
I understand why the WHERE clause “cc=pgp_sym_encrypt('test
value 32', 'motdepasse');” does not bring anything back.
Best Regards
Didier ROS
De : p...@paulmcgarry.com [mailto:p...@pau
#x27;::text, 'compress-algo=2,
cipher-algo=aes256'::text) = 'test value 32'::text)
Planning time: 0.330 ms
Execution time: 1.580 ms
(4 rows)
OK that works great.
Thank you for the recommendation
Best Regards
[cid:image002.png@01D14E0E.8515EB90]
Didier ROS
Experti
Scan on cartedecredit (cost=0.00..3646.00 rows=1 width=32) (actual
time=61219.989..61219.989 rows=0 loops=1)
Filter: (cc = pgp_sym_encrypt('test value 32'::text, 'motdepasse'::text))
Rows Removed by Filter: 10
Planning time: 0.157 ms
Execution time: 61220.035 ms
(
Hi,
Assuming DB is quiescent.
And if you run?
select count(*) from articles where article_id between %s and %s
ie without reading json, is your buffers hit count increasing?
20 000 8K blocks *2 is 500MB , should be in RAM after the first run.
Fast:
read=710 I/O Timings: read=852.547 ==> 1.3 ms
21 matches
Mail list logo