PostgreSQL Specific Information
PostgreSQL Proxy Restrictions
- PostgreSQL allows the user to send multiple statements in one query. Such query is treated as a transaction: if any of statements failed the query is roll backed entirely even in auto commit mode. The PostgreSQL proxy splits such queries to single statement queries and execute them separately via JDBC. This leads to the fact that if one of statements fails and auto commit mode is enabled all statements before it won't be roll backed. To use such a syntax, please use a true transaction start and commit to wrap the queries to avoid any issues.
- The vdb property of supressNoResult=true is available. With Postgres, if an update query is executed via the executeQuery result, it will generate an exception on return saying "No results were returned by the query". In some frameworks, this is detected and suppressed when using the native Postgres driver, but not with the Heimdall driver. In order to work around this behavior, this option can trigger us returning a null instead of a resultset, which appears to allow the calling code to work fine. This applies when using Heimdall as a JDBC driver, but should not apply when as a proxy.
- IMPORTANT: When using Heimdall as a proxy, but with a Java application, set the driver property of "preferQueryMode" to "extendedForPrepared". This will improve performance and will allow certain features such as transform to operate properly. Without this setting, all queries are "prepared" even when not needed by the JDBC driver, and this can add overhead in many cases.
Schema Assist for Dependencies
When using Postgres or a Postgres derived database, parsing is performed to detect view dependencies, in order to automate invalidation. This is only performed at proxy start at this time.
PG Notify Support
Postgres supports notification support, i.e. it provides a built-in pub/sub interface. When Postgres is used, this option can be explicitly controlled with a connection property of "hdUsePGNotify" and a value of true or false
When used, this will override the need to have a grid cache for invalidations, although it does not automatically enable multi-primary Heimdall management nodes as a grid cache does. This also enables the below trigger invalidation that leverages the pg_notify interface. The purpose of this option is to allow a simplified deployment without the use of an external cache, but still maintain cache coherency between multiple proxies.
Trigger Invalidation with Postgres
Postgres provides a listen/notify interface that can be used to push invalidation messages directly from the database to the proxy. In order to configure this, use the following:
Connection property of hdUsePGNotify, value of true, then configure the following trigger function and trigger on each table:
CREATE OR REPLACE FUNCTION heimdall.changed() RETURNS TRIGGER AS $$ BEGIN PERFORM pg_notify('heimdall', 'invalidate-trigger,'||current_database()||'.'||TG_TABLE_SCHEMA||'.'||TG_TABLE_NAME||','||((date_part('epoch', now())*1000)::bigint)::varchar); RETURN NEW; END; $$ LANGUAGE plpgsql; -- for each table on the system, perform the following: CREATE TRIGGER trigger_table_changed BEFORE INSERT OR UPDATE OR DELETE ON test EXECUTE PROCEDURE heimdall.changed();
The result of this is near instant invalidation of tables, even if a write is done to PostgreSQL without going through Heimdall. Log messages with debug mode will indicate when this is functional.
When this is in place, this adjusts a few other behaviors. When active, invalidations will be issued through the DB notify interface vs. the grid cache as well. This enables local only cache configurations to effectively work without a grid cache. Additionally, if a table is invalidated via the grid cache with the above configuration, then additional notification messages will not be generated for that table by Heimdall, but other tables that have not been invalidated by the trigger will continue to have invalidations from Heimdall. This allows a mixed setup, so that frequently updated tables may have the trigger, while infrequently updated tables (or new tables) are invalidated directly. This will reduce the overhead of maintaining the triggers as the DB schema changes, while optimizing the number of invalidation messages needed.
This also supports invalidation of tables that are changed via stored procedures, other triggers, or are modified in other ways. It is still a requirement that stored procedures be tagged with the tables they are reading, but writes will be automatically accounted for.
Alternate Trigger Invalidation with Postgres (via polling)
This technique requires polling against the database, which adds load and latency to the invalidation process, but is documented for completion.
- dbChanges=select ts,name from heimdall.tableupdates where ts > @ts
- dbTimeMs=select (date_part('epoch', now())*1000)::bigint
Note: The following example is drafted for use with older Postgres, so doesn't use the ON CONFLICT syntax available in PG 9.5+
CREATE SCHEMA heimdall; CREATE TABLE heimdall.tableupdates ( name text PRIMARY KEY, ts bigint not null ); CREATE OR REPLACE FUNCTION heimdall.changed() RETURNS TRIGGER AS $$ BEGIN LOOP UPDATE heimdall.tableupdates SET ts=(date_part('epoch', now())*1000)::bigint, name=current_database()||'.'||TG_TABLE_SCHEMA||'.'||TG_TABLE_NAME; IF found THEN RETURN NEW; END IF; BEGIN INSERT INTO heimdall.tableupdates VALUES ((date_part('epoch', now())*1000)::bigint, current_database()||'.'||TG_TABLE_SCHEMA||'.'||TG_TABLE_NAME); RETURN NEW; EXCEPTION WHEN unique_violation THEN END; END LOOP; RETURN NEW; END; $$ LANGUAGE plpgsql; CREATE OR REPLACE TRIGGER trigger_table_changed BEFORE INSERT OR UPDATE OR DELETE ON test FOR EACH ROW EXECUTE PROCEDURE heimdall.changed();
Active Directory Password & Group Synchronization
CREATE OR REPLACE FUNCTION sync_user(username text, password text, groups text) RETURNS void LANGUAGE plpgsql AS $function$ declare sql text; grouplist text; g text; begin if exists ( select usesuper from pg_user where user = username) then raise notice 'User is superuser, not synchronizing'; return; end if;
IF NOT EXISTS ( select FROM pg_catalog.pg_roles WHERE rolname = username ) then sql := 'create role '||username||' password '''||password||''''; raise notice 'sql: %', sql; execute sql; -- remove group membership here (will be recreated in the next section else sql := 'alter role '||username||' with password '''||password||''''; raise notice 'sql: %', sql; execute sql; END IF; -- make sure groups are created grouplist := string_to_array(groups, ','); for i in array_lower(grouplist,1) .. array_upper(grouplist,1) loop IF NOT EXISTS ( select FROM pg_catalog.pg_roles WHERE rolname = replace(grouplist[i],'"','') ) then sql := 'create role '||grouplist[i]; raise notice 'sql: %', sql; begin execute sql; exception when others then raise notice 'group already exists'; end; end if; -- now grant membership of the role to the user sql := 'grant '||grouplist[i]||' to '|| username; raise notice 'sql: %', sql; execute sql; end loop; return;
END; $function$ ; ```SQL