conditional backup
am 16.07.2010 07:03:20 von suhailck
Hi,
I need to take backup of my postgresql DB, but not all records from a few
tables.
My DB contains more than 700 tables, out of which 15 tables i need to take
this conditional backup
Example:
Table: C_order
I need to take backup from table C_order where "period=2009" and "org <> A"
This is done to improve performance there by deleting all non-org records
for old period from org A's server.
Expecting ur feedbacks
Thanks in advance!!!
--
View this message in context: http://old.nabble.com/conditional-backup-tp29180107p29180107 .html
Sent from the PostgreSQL - admin mailing list archive at Nabble.com.
--
Sent via pgsql-admin mailing list (pgsql-admin@postgresql.org)
To make changes to your subscription:
http://www.postgresql.org/mailpref/pgsql-admin
Re: conditional backup
am 16.07.2010 17:48:12 von Kevin Grittner
suhailck wrote:
> I need to take backup of my postgresql DB, but not all records
> from a few tables.
You can exclude particular tables from a database backup using the
-T option (which can be included multiple times). You can dump just
the schema for particular tables with the -s and -t switches. You
can use the \copy command in psql to copy out selected rows using
syntax like:
\copy (select * from C_order where period=2009 and org <> 'A') to
C_order.data
You should be able to wire something together from those pieces.
-Kevin
--
Sent via pgsql-admin mailing list (pgsql-admin@postgresql.org)
To make changes to your subscription:
http://www.postgresql.org/mailpref/pgsql-admin
secret key for encryption
am 16.07.2010 18:56:41 von Craig James
This isn't exactly a Postgres question, but I hope someone in the community has solved it.
I want to encrypt some data in Postgres that arrives from Apache. How do you store an encryption key in such a way that Apache CGIs can get it, but a hacker or rogue employee who manages to access the machine can't find out the encryption key?
Thanks,
Craig
--
Sent via pgsql-admin mailing list (pgsql-admin@postgresql.org)
To make changes to your subscription:
http://www.postgresql.org/mailpref/pgsql-admin
Re: secret key for encryption
am 16.07.2010 19:26:35 von Craig James
Kris,
[Replying to list, too.]
On 7/16/10 10:14 AM, Kris Deugau wrote:
> Craig James wrote:
>> This isn't exactly a Postgres question, but I hope someone in the
>> community has solved it.
>>
>> I want to encrypt some data in Postgres that arrives from Apache. How
>> do you store an encryption key in such a way that Apache CGIs can get
>> it, but a hacker or rogue employee who manages to access the machine
>> can't find out the encryption key?
>
> Short answer: You don't.
>
> Longer answer: You can tie things up with public-key encryption so that
> a different system can retrieve the data, but the system that put it in
> can't because it only has the public (encryption) key, not the private
> (decryption) key.
>
> Even that isn't safe from a rogue employee - what if that rogue is your
> seniour sysadmin with full root access on all your systems?
If we assume no escalation of priviliges, that is, Apache stays apache and users can't escalate to root, what then?
This must be a solved problem. Credit-card numbers are required to be encrypted by law. It wouldn't make sense for them to be encrypted but then find that the password is sitting around where anyone can find it. There must be any number of Postgres users who store encrypted credit card numbers and other personal data. How do they solve this problem?
Craig
--
Sent via pgsql-admin mailing list (pgsql-admin@postgresql.org)
To make changes to your subscription:
http://www.postgresql.org/mailpref/pgsql-admin
Re: secret key for encryption
am 16.07.2010 19:33:07 von Richard Broersma
On Fri, Jul 16, 2010 at 10:26 AM, Craig James
wrote:
> On 7/16/10 10:14 AM, Kris Deugau wrote:
>>
>> Craig James wrote:
>>>
>>> This isn't exactly a Postgres question, but I hope someone in the
>>> community has solved it.
>>>
>>> I want to encrypt some data in Postgres that arrives from Apache. How
>>> do you store an encryption key in such a way that Apache CGIs can get
>>> it, but a hacker or rogue employee who manages to access the machine
>>> can't find out the encryption key?
>>
>> Short answer: You don't.
>>
>> Longer answer: You can tie things up with public-key encryption so that
>> a different system can retrieve the data, but the system that put it in
>> can't because it only has the public (encryption) key, not the private
>> (decryption) key.
>>
>> Even that isn't safe from a rogue employee - what if that rogue is your
>> seniour sysadmin with full root access on all your systems?
>
> If we assume no escalation of priviliges, that is, Apache stays apache and
> users can't escalate to root, what then?
>
> This must be a solved problem. =A0Credit-card numbers are required to be
> encrypted by law. =A0It wouldn't make sense for them to be encrypted but =
then
> find that the password is sitting around where anyone can find it. =A0The=
re
> must be any number of Postgres users who store encrypted credit card numb=
ers
> and other personal data. =A0How do they solve this problem?
Bruce has a presentation on this subject:
http://momjian.us/main/writings/pgsql/securing.pdf
Although, I don't know if it has an illustration that exactly matches
your problem.
--=20
Regards,
Richard Broersma Jr.
Visit the Los Angeles PostgreSQL Users Group (LAPUG)
http://pugs.postgresql.org/lapug
--=20
Sent via pgsql-admin mailing list (pgsql-admin@postgresql.org)
To make changes to your subscription:
http://www.postgresql.org/mailpref/pgsql-admin