The CFP is now open & will close on Feb 9, 2025! The 4th annual event called POSETTE: An Event for Postgres will happen Jun 10-12, 2025 and the Call for Speakers is now open—unt ...
PGConf.dev 2025]( (May 13-16, 2025, Montreal, CA), aka [PostgreSQL Development Conference 2025]( is an event where users, developers, and community ...
We're pleased to announce that we published the schedule of the PGDay/MED 2024 taking place in Naples, Italy, on December ...
pg_restore — restore a PostgreSQL database from an archive file created by pg_dump Restore only the data, not the schema (data definitions). Table data, large objects, and sequence values are restored ...
CREATE FUNCTION defines a new function. CREATE OR REPLACE FUNCTION will either create a new function, or replace an existing definition. To be able to define a function, the user must have the USAGE ...
CREATE ROLE adds a new role to a PostgreSQL database cluster. A role is an entity that can own database objects and have database privileges; a role can be considered a “user”, a “group”, or both ...
The first time a user-defined function in a particular loadable object file is called in a session, the dynamic loader loads that object file into memory so that the function can be called. The CREATE ...
If you have pattern matching needs that go beyond this, consider writing a user-defined function in Perl or Tcl. While most regular-expression searches can be executed very quickly, regular ...
RETURN with an expression terminates the function and returns the value of expression to the caller. This form is used for PL/pgSQL functions that do not return a set. In a function that returns a ...
A composite type represents the structure of a row or record; it is essentially just a list of field names and their data types. PostgreSQL allows composite types to be used in many of the same ways ...
A data change trigger is declared as a function with no arguments and a return type of trigger. Note that the function must be declared with no arguments even if it expects to receive some arguments ...
There are several password-based authentication methods. These methods operate similarly but differ in how the users' passwords are stored on the server and how the password provided by a client is ...