You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: install_template/templates/products/postgres-enterprise-manager-server/base.njk
+1-1Lines changed: 1 addition & 1 deletion
Original file line number
Diff line number
Diff line change
@@ -93,7 +93,7 @@ For more details, see [Configuring the PEM server on Linux](../configuring_the_p
93
93
94
94
!!! Note
95
95
96
-
- The operating system user pem is created while installing the PEM server. The pem application data and the session is saved to this user's home directory.
96
+
- The operating system user pem is created while installing the PEM server. The PEM application data and the session is saved to this user's home directory.
Copy file name to clipboardExpand all lines: product_docs/docs/epas/13/epas_guide/03_database_administration/02_index_advisor/index.mdx
+1-1Lines changed: 1 addition & 1 deletion
Original file line number
Diff line number
Diff line change
@@ -18,7 +18,7 @@ There are three ways to use Index Advisor to analyze SQL queries:
18
18
19
19
- Provide queries at the EDB-PSQL command line that you want Index Advisor to analyze.
20
20
21
-
- Access Index Advisor through the Postgres Enterprise Manager client. When accessed via the PEM client, Index Advisor works with SQL Profiler, providing indexing recommendations on code captured in SQL traces. For more information about using SQL Profiler with PEM, see the [Using the SQL Profiler](/pem/latest/profiling_workloads/using_sql_profiler.mdx) and [Using the Index Advisor](03_using_index_advisor.mdx).
21
+
- Access Index Advisor through the Postgres Enterprise Manager client. When accessed via the PEM client, Index Advisor works with SQL Profiler, providing indexing recommendations on code captured in SQL traces. For more information about using SQL Profiler with PEM, see the [Using SQL Profiler](/pem/latest/profiling_workloads/using_sql_profiler.mdx) and [Using Index Advisor](03_using_index_advisor.mdx).
22
22
23
23
Index Advisor will attempt to make indexing recommendations on `INSERT`, `UPDATE`, `DELETE` and `SELECT` statements. When invoking Index Advisor, you supply the workload in the form of a set of queries (if you are providing the command in an SQL file) or an `EXPLAIN` statement (if you are specifying the SQL statement at the psql command line). Index Advisor displays the query plan and estimated execution cost for the supplied query, but does not actually execute the query.
Copy file name to clipboardExpand all lines: product_docs/docs/epas/14/epas_guide/03_database_administration/02_index_advisor/index.mdx
+1-1Lines changed: 1 addition & 1 deletion
Original file line number
Diff line number
Diff line change
@@ -16,7 +16,7 @@ You can use Index Advisor to analyze SQL queries in any of these ways:
16
16
17
17
- Invoke the Index Advisor utility program, supplying a text file containing the SQL queries that you want to analyze. Index Advisor generates a text file with `CREATE INDEX` statements for the recommended indexes.
18
18
- Provide queries at the EDB-PSQL command line that you want Index Advisor to analyze.
19
-
- Access Index Advisor through the Postgres Enterprise Manager (PEM) client. When accessed using the PEM client, Index Advisor works with SQL Profiler, providing indexing recommendations on code captured in SQL traces. For more information about using SQL Profiler with PEM, see [Using the SQL Profiler](/pem/latest/profiling_workloads/using_sql_profiler.mdx) and [Using the Index Advisor](03_using_index_advisor.mdx).
19
+
- Access Index Advisor through the Postgres Enterprise Manager (PEM) client. When accessed using the PEM client, Index Advisor works with SQL Profiler, providing indexing recommendations on code captured in SQL traces. For more information about using SQL Profiler with PEM, see [Using SQL Profiler](/pem/latest/profiling_workloads/using_sql_profiler.mdx) and [Using Index Advisor](03_using_index_advisor.mdx).
20
20
Index Advisor attempts to make indexing recommendations on `INSERT`, `UPDATE`, `DELETE`, and `SELECT` statements. When invoking Index Advisor, you supply the workload in the form of either:
21
21
22
22
- If you're providing the command in an SQL file, a set of queries
Copy file name to clipboardExpand all lines: product_docs/docs/epas/15/managing_performance/02_index_advisor/index_advisor_overview.mdx
+1-1Lines changed: 1 addition & 1 deletion
Original file line number
Diff line number
Diff line change
@@ -9,7 +9,7 @@ You can use Index Advisor to analyze SQL queries in any of these ways:
9
9
10
10
- Invoke the Index Advisor utility program, supplying a text file containing the SQL queries that you want to analyze. Index Advisor generates a text file with `CREATE INDEX` statements for the recommended indexes.
11
11
- Provide queries at the EDB-PSQL command line that you want Index Advisor to analyze.
12
-
- Access Index Advisor through the Postgres Enterprise Manager (PEM) client. When accessed using the PEM client, Index Advisor works with SQL Profiler, providing indexing recommendations on code captured in SQL traces. For more information about using SQL Profiler and Index Advisor with PEM, see [Using the SQL profiler](/pem/latest/profiling_workloads/using_sql_profiler.mdx) and [Using the Index Advisor](03_using_index_advisor.mdx).
12
+
- Access Index Advisor through the Postgres Enterprise Manager (PEM) client. When accessed using the PEM client, Index Advisor works with SQL Profiler, providing indexing recommendations on code captured in SQL traces. For more information about using SQL Profiler and Index Advisor with PEM, see [Using SQL profiler](/pem/latest/profiling_workloads/using_sql_profiler.mdx) and [Using Index Advisor](03_using_index_advisor.mdx).
13
13
14
14
Index Advisor attempts to make indexing recommendations on `INSERT`, `UPDATE`, `DELETE`, and `SELECT` statements. When invoking Index Advisor, you supply the workload in the form of either:
Copy file name to clipboardExpand all lines: product_docs/docs/pem/10/certificates/index.mdx
+31-30Lines changed: 31 additions & 30 deletions
Original file line number
Diff line number
Diff line change
@@ -18,10 +18,10 @@ PEM uses SSL certificates:
18
18
- To secure requests to the [web server](#web-server-certificates), which provides the user interface and REST API.
19
19
- To secure and authenticate the [PEM agent connections to the PEM backend database](#pem-backend-database-server-and-agent-connection-certificates).
20
20
21
-
## Web-server certificates
21
+
## Webserver certificates
22
22
23
23
PEM generates an SSL certificate and key file for the web server during initial configuration.
24
-
Because the certificate is self-signed, users will see a warning that the site is insecure when they open the PEM web application URL in their browser.
24
+
Because the certificate is self-signed, a warning states that the site is insecure when users open the PEM web application URL in a browser.
25
25
26
26
To increase security and remove this warning, you can replace the self-signed SSL certificate with a certificate signed by a trusted certificate authority.
27
27
@@ -37,13 +37,13 @@ Change the server name and file paths in the configuration file to match your ce
37
37
```text
38
38
server {
39
39
# lines omitted here
40
-
server_name yourdomain.com;
40
+
server_name <yourdomain.com>;
41
41
# lines omitted here
42
42
}
43
43
44
44
server {
45
45
# lines omitted here
46
-
server_name yourdomain.com;
46
+
server_name <yourdomain.com>;
47
47
48
48
ssl_certificate /path/to/your_domain_name.crt
49
49
ssl_certificate_key /path/to/your_private.key
@@ -70,12 +70,12 @@ For a worked example, see [Replacing httpd self-signed SSL certificates](https:/
70
70
## PEM backend database server and agent connection certificates
71
71
72
72
PEM implements secured SSL/TLS connections between PEM agents and the backend database.
73
-
Each agent has an SSL certificate which is used both to encrypt its communication with the server and to authenticate with the server in place of a password.
73
+
Each agent has an SSL certificate that's used both to encrypt its communication with the server and to authenticate with the server in place of a password.
74
74
75
-
PEM uses the sslutils extension to allow the PEM server to generate and sign SSL certificates and keys. When a new agent is registered, the PEM server automatically issues it with a certificate.
75
+
PEM uses the sslutils extension to allow the PEM server to generate and sign SSL certificates and keys. When a new agent is registered, the PEM server issues it a certificate.
76
76
Certificates issued by the PEM server are signed by the PEM server, meaning the PEM server is acting as a certificate authority (CA).
77
77
78
-
If the above is not suitable, you can use SSL certificates and keys generated outside of PEM and signed by a trusted CA.
78
+
If this approach isn't suitable, you can use SSL certificates and keys generated outside of PEM and signed by a trusted CA.
79
79
For more information, see [Trusted CA certificates and keys](#use-certificates-and-keys-signed-by-trusted-ca).
80
80
81
81
### Certificates and key files on the PEM server
@@ -90,7 +90,7 @@ During initial configuration of the PEM server, the following files are generate
90
90
-`server.key`
91
91
92
92
The `ca_certificate.crt` and `ca_key.key` files are used by the PEM server to sign certificates generated for agents during agent registration.
93
-
They are also used to sign `server.crt`. Unless replaced manually, the 'ca_certificate.crt' file is a self-signed certificate because is acting as the root CA.
93
+
They're also used to sign `server.crt`. Unless replaced manually, the 'ca_certificate.crt' file is a self-signed certificate because it's acting as the root CA.
94
94
95
95
The `root.crt` file is a copy of the `ca_certificate.crt` file. The `ssl_ca_file` parameter in the `postgresql.conf` file points to this file.
96
96
@@ -100,33 +100,33 @@ The `ssl_crl_file` parameter in the `postgresql.conf` file points to this file.
100
100
The `server.crt` file is the signed certificate for the PEM server, and the `server.key` file is the private key to the certificate.
101
101
The `ssl_cert_file` parameter in the `postgresql.conf` file points to this file.
102
102
103
-
These files are automatically renewed when they near their expiry date, see[PEM CA certificate renewal](#pem-certificate-renewal).
103
+
These files are automatically renewed when they near their expiry date. See[PEM CA certificate renewal](#pem-certificate-renewal).
104
104
105
105
### Certificates and key files for PEM agents
106
106
107
107
Each agent's SSL certificate and keys are generated during [agent registration](../registering_agent).
108
108
The PEM agent connects to the PEM backend database server using the libpq interface, acting as a client of the backend database server.
109
-
The PEM agent connect to the server using the `cert` auth method and with ssl enabled.
110
-
This means that the connection is encrypted using the agent's key and authenticated using the agent's certificate (rather than a password, for example).
109
+
The PEM agent connects to the server using the `cert` auth method and with ssl enabled.
110
+
This means that the connection is encrypted using the agent's key and authenticated using the agent's certificate instead of, for example, a password.
111
111
112
112
Each agent has a unique identifier, and the agent certificates and keys have the corresponding identifier.
113
113
114
-
If required, you can use the same certificate for all agents rather than one certificate per agent. For more information, see [Generate common agent certificate and key pair](#generate-a-common-agent-certificate-and-key-pair).
114
+
If required, you can use the same certificate for all agents rather than one certificate per agent. For more information, see [Generate a common agent certificate and key pair](#generate-a-common-agent-certificate-and-key-pair).
115
115
116
-
For more information on using the SSL certificates to connect in Postgres, see [Securing TCP/IP connections with SSL](https://www.postgresql.org/docs/current/ssl-tcp.html).
116
+
For more information on using the SSL certificates to connect in Postgres, see [Securing TCP/IP connections with SSL](https://www.postgresql.org/docs/current/ssl-tcp.html) in the Postgres documentation.
117
117
118
118
### PEM certificate renewal
119
119
120
-
SSL certificates have an expiry date. If you are using certificates and keys generated by PEM, they are automatically replaced before expiring.
120
+
SSL certificates have an expiry date. If you're using certificates and keys generated by PEM, PEM replaces them before they expire.
121
121
The PEM agent installed with the PEM server monitors the expiration date of the `ca_certificate.crt` file. When the certificate is about to expire, PEM:
122
122
123
-
- Makes a backup of the existing certificate files
124
-
- Creates new certificate files and appends the new CA certificate file to the `root.crt` file on the PEM server
125
-
- Creates a job to renew the certificate file for any active agents
126
-
- Restarts the PEM server
123
+
- Makes a backup of the existing certificate files.
124
+
- Creates new certificate files and appends the new CA certificate file to the `root.crt` file on the PEM server.
125
+
- Creates a job to renew the certificate file for any active agents.
126
+
- Restarts the PEM server.
127
127
128
128
!!! Important
129
-
If you choose to either provide your own certificates, or use a single certificate for all agents, you should disable the automatic renewal job.
129
+
If you choose to provide your own certificates or use a single certificate for all agents, disable the automatic renewal job.
130
130
On the PEM server, execute the following SQL:
131
131
132
132
```sql
@@ -136,7 +136,7 @@ WHERE jobname = 'Check CA certificate expiry';
136
136
```
137
137
!!!
138
138
139
-
If you need to regenerate the server or agent certificates manually, please see:
139
+
If you need to regenerate the server or agent certificates manually, see:
140
140
-[Regenerating the server SSL certificates](replacing_ssl_certificates)
1. Change the permissions on the `agent.crt` and `agent.key`file:
179
+
1. Change the permissions on the `agent.crt` and `agent.key`files:
180
180
181
181
```shell
182
182
chmod 600 agent.crt agent.key
@@ -209,7 +209,7 @@ Create a user, generate an agent certificate and key pair, and use them for all
209
209
210
210
- To replace the agent certificate and key pair with the registered agent.
211
211
212
-
a. Edit the `agent_user`, `agent_ssl_key`, and `agent_ssl_crt` parameters in `agent.cfg` file of the agent host:
212
+
a. Edit the `agent_user`, `agent_ssl_key`, and `agent_ssl_crt` parameters in the `agent.cfg` file of the agent host:
213
213
214
214
```shell
215
215
vi /usr/edb/pem/agent/etc/agent.cfg
@@ -262,7 +262,7 @@ After obtaining the trusted CA certificates and keys, replace the [server](#repl
262
262
263
263
1. Ask your CA to sign the CSR and generate the server certificate for you.
264
264
265
-
1. Verify the details of the new server certificate aren't tampered with and match your provided details:
265
+
1. Verify that the details of the new server certificate aren't tampered with and match your provided details:
266
266
267
267
```shell
268
268
openssl x509 -noout -text -in server.crt
@@ -277,16 +277,16 @@ After obtaining the trusted CA certificates and keys, replace the [server](#repl
277
277
1. If the trusted CA doesn't provide CRL, disable CRL usage by the server. To disable the CRL usage, comment the `ssl_crl_file` parameter in the `postgresql.conf` file.
278
278
279
279
!!! Note
280
-
If you accidentally leave a CRL from a previous CA in place and do not comment out `ssl_crl_file`, the server will start but authentication will fail with an SSL error message `tlsv1 alert unknown ca`.
281
-
The error doesn't specify that the CRL is the cause, so this can be difficult to debug if encountered out of context.
280
+
If you leave a CRL from a previous CA in place and don't comment out `ssl_crl_file`, the server will start. However, authentication will fail with an SSL error message:`tlsv1 alert unknown ca`.
281
+
The error doesn't specify that the CRL is the cause, so this issue can be difficult to debug if encountered out of context.
282
282
283
283
1. Copy the new `root.crt`, `server.key`, and `server.crt` files to the data directory of the backend database server:
1. Change the owner and permissions of the new certificates and key files to be the same as the data directory:
289
+
1. Change the owner and permissions of the new certificates and key files to the same name as the data directory:
290
290
291
291
```shell
292
292
cd /var/lib/edb/as<x>/data/
@@ -369,7 +369,7 @@ Replace the agent SSL certificates only after replacing the server certificates
369
369
Use the Services applet to restart the PEM agent. The PEM agent service is named Postgres Enterprise Manager Agent. Select the service name in the Services dialog box, and select **Restart the service**.
370
370
371
371
!!! Note
372
-
For agents registered after following the process above you can provide a certificate to the agent at the time of registration as shown in the [second example](/pem/latest/registering_agent/#overriding-default-configurations---examples).
372
+
For agents registered after following the preceding process, you can provide a certificate to the agent at the time of registration as shown in the [second example](/pem/latest/registering_agent/#overriding-default-configurations---examples).
373
373
!!!
374
374
375
375
!!!note
@@ -393,7 +393,7 @@ This command returns `agent1.crt: OK` on success or an explanatory message on fa
393
393
394
394
### Make a test connection to the PEM backend database
395
395
396
-
To verify whether the agent user can connect using a certificate, on the server where the agent is located, execute the following commands as root:
396
+
To verify whether the agent user can connect using a certificate, as root on the server where the agent is located, execute:
0 commit comments