You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/postgresql/flexible-server/concepts-data-encryption.md
+1-3Lines changed: 1 addition & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -158,7 +158,7 @@ Some of the reasons why server state can become *Inaccessible* are:
158
158
159
159
160
160
> [!NOTE]
161
-
> CLI examples below are based on 2.43.0 version of Azure Database for PostgreSQL - Flexible Server CLI libraries, which are in preview and may be subject to changes.
161
+
> CLI examples below are based on 2.45.0 version of Azure Database for PostgreSQL - Flexible Server CLI libraries
162
162
163
163
## Setup Customer Managed Key during Server Creation
164
164
@@ -259,8 +259,6 @@ The following are current limitations for configuring the customer-managed key i
259
259
260
260
- Once enabled, CMK encryption can't be removed. If customer desires to remove this feature, it can only be done via restore of the server to non-CMK server.
Copy file name to clipboardExpand all lines: articles/postgresql/flexible-server/concepts-extensions.md
+12Lines changed: 12 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -543,6 +543,18 @@ You can now enable pg_hint_plan your Postgres database. Connect to the database
543
543
CREATE EXTENSION pg_hint_plan ;
544
544
```
545
545
546
+
## pg_buffercache
547
+
548
+
`Pg_buffercache` can be used to study the contents of *shared_buffers* . Using [this extension](https://www.postgresql.org/docs/current/pgbuffercache.html) you can tell if a particular relation is cached or not(in *shared_buffers*) . This extension can help you in troubleshooting performance issues (caching related performance issues)
549
+
550
+
This is part of contrib and it is very easy to install this extension.
Copy file name to clipboardExpand all lines: articles/postgresql/flexible-server/concepts-security.md
+16-1Lines changed: 16 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -49,13 +49,25 @@ When you're running Azure Database for PostgreSQL - Flexible Server, you have tw
49
49
Best way to manage PostgreSQL database access permissions at scale is using the concept of [roles](https://www.postgresql.org/docs/current/user-manag.html). A role can be either a database user or a group of database users, moreover roles can own the database objects and assign privileges on those objects to other roles to control who has access to which objects. It is also possible to grant membership in a role to another role, thus allowing the member role to use privileges assigned to another role.
50
50
PostgreSQL lets you grant permissions directly to the database users. As a good security practice, it can be recommended that you create roles with specific sets of permissions based on minimum application and access requirements and then assign the appropriate roles to each user. The roles should be used to enforce a *least privilege model* for accessing database objects.
51
51
52
-
While you're creating the Azure Database for PostgreSQL server, you provide credentials for an **administrator role**. This administrator role can be used to create more [PostgreSQL roles](https://www.postgresql.org/docs/current/user-manag.html). The administrator role should never be used by the application.
52
+
The Azure Database for PostgreSQL server is created with the 3 default roles defined. You can see these roles by running the command:
53
+
```sql
54
+
SELECT rolname FROM pg_roles;
55
+
```
56
+
* azure_pg_admin.
57
+
* azuresu.
58
+
* administrator role.
53
59
60
+
While you're creating the Azure Database for PostgreSQL server, you provide credentials for an **administrator role**. This administrator role can be used to create more [PostgreSQL roles](https://www.postgresql.org/docs/current/user-manag.html).
54
61
For example, below we can create an example role called *demouser*,
55
62
56
63
```SQL
57
64
postgres=> create role demouser with password 'password123';
58
65
```
66
+
The **administrator role** should never be used by the application.
67
+
68
+
In cloud-based PaaS environments access to a PostgreSQL superuser account is restricted to control plane operations only by cloud operators. Therefore, the **azure_pg_admin** account is added to the database as a pseudo-superuser account. Your administrator role is a member of the **azure_pg_admin** role.
69
+
However, the server admin account is not part of the **azuresu** role, which has superuser privileges and is used to perform control pane operations. Since this service is a managed PaaS service, only Microsoft is part of the superuser role.
70
+
59
71
60
72
You can periodically audit the list of roles in your server. For example, you can connect using `psql` client and query the `pg_roles` table which lists all the roles along with privileges such as create additional roles, create databases, replication etc.
61
73
@@ -78,6 +90,9 @@ rolbypassrls | f
78
90
rolconfig |
79
91
oid | 24827
80
92
93
+
94
+
95
+
81
96
```
82
97
83
98
[Audit logging](concepts-audit.md) is also available with Flexible Server to track activity in your databases.
> CLI examples below are based on 2.43.0 version of Azure Database for PostgreSQL - Flexible Server CLI libraries, which are in preview and may be subject to changes.
16
+
> CLI examples below are based on 2.45.0 version of Azure Database for PostgreSQL - Flexible Server CLI libraries
17
17
18
18
In this article, you learn how to create and manage Azure Database for PostgreSQL - Flexible Server with data encrypted by Customer Managed Keys using the Azure CLI. To learn more about Customer Managed Keys (CMK) feature with Azure Database for PostgreSQL - Flexible Server, see the [overview](concepts-data-encryption.md).
0 commit comments