Hello Tom,
On 31.03.2021 20:24, Tom Lane wrote:
Based on nearby threads, it occurs to me to ask whether you have JIT
enabled, and if so whether turning it off helps. There seems to be
a known leak of the code fragments generated by that in some cases.
That's it!
I am quite surprised that a f
Thanks, works.
Sent from my iPhone
> On Apr 3, 2021, at 11:02, Joe Conway wrote:
>
> On 4/2/21 7:06 PM, A. Reichstadt wrote:
>> Hello,
>> I try to deny access to all databases on my server if the user “postgres"
>> tries to connect from a non-local host. Here is what I did in pg_hba.conf:
>>
On Sun, Apr 4, 2021 at 10:02:20AM -0400, Dave Cramer wrote:
> On Sun, 4 Apr 2021 at 09:12, Bruce Momjian wrote:
> > OK, that makes sense, but I think it is wrong minded to think that this
> > absolves one of taking isolation into account.
> >
> > When you make the first read you w
On Mon, 5 Apr 2021 at 14:18, Bruce Momjian wrote:
> On Sun, Apr 4, 2021 at 10:02:20AM -0400, Dave Cramer wrote:
> > On Sun, 4 Apr 2021 at 09:12, Bruce Momjian wrote:
> > > OK, that makes sense, but I think it is wrong minded to think that
> this
> > > absolves one of taking isolation in
On Mon, Apr 5, 2021 at 02:32:36PM -0400, Dave Cramer wrote:
> On Mon, 5 Apr 2021 at 14:18, Bruce Momjian wrote:
> I think we are in agreement. My point was that WITH queries don't change the
> isolation semantics.
My point is that when you combine individual queries in a single WITH
query, thos
On Thu, Apr 1, 2021 at 10:26 PM Rob Sargent wrote:
>
> On 4/1/21 8:28 PM, Merlin Moncure wrote:
> >
> > This is one of the great debates in computer science and it is not
> > settled. There are various tradeoffs around using a composite key
> > derived from the data (aka natural key) vs generated
Stephan Knauss writes:
> On 31.03.2021 20:24, Tom Lane wrote:
>> Based on nearby threads, it occurs to me to ask whether you have JIT
>> enabled, and if so whether turning it off helps. There seems to be
>> a known leak of the code fragments generated by that in some cases.
> That's it!
> You m
On Fri, Apr 2, 2021 at 3:40 AM Laurenz Albe wrote:
>
> On Thu, 2021-04-01 at 21:28 -0500, Merlin Moncure wrote:
> > I would never use UUIDS for keys though.
>
> That makes me curious for your reasons.
>
> I see the following disadvantages:
>
> - A UUID requires twice as much storage space as a big
>
> It's a small thing, but UUIDs are absolutely not memorizable by
> humans; they have zero semantic value. Sequential numeric identifiers
> are generally easier to transpose and the value gives some clues to
> its age (of course, in security contexts this can be a downside).
>
I take the abo
On Mon, Apr 5, 2021 at 9:37 PM Rob Sargent wrote:
>
> It's a small thing, but UUIDs are absolutely not memorizable by
> humans; they have zero semantic value. Sequential numeric identifiers
> are generally easier to transpose and the value gives some clues to
> its age (of course, in security con
10 matches
Mail list logo