-privilege
replication slots, potentially leading to data security vulnerabilities.
YeXiu
1518981...@qq.com
原始邮件
发件人:Amit Kapila
reason why
this approach is valuable.
YeXiu
1518981...@qq.com
原始邮件
发件人:Amit Kapila
absent from the replication slot?
If the replication slot does NOT include telphone data, this is a non-issue and
can be ignored.
3. I hope others in the community can address these suggestions, as I am not a
C developer and cannot implement them myself.
YeXiu
1518981...@qq.com
They
can subscribe to the replication slot and perform downstream processing
independently, without risking exposure of unauthorized data.
YeXiu
1518981...@qq.com