PGConf.dev 2025]( (May 13-16, 2025, Montreal, CA), aka [PostgreSQL Development Conference 2025]( is an event where users, developers, and community ...
The CFP is now open & will close on Feb 9, 2025! The 4th annual event called POSETTE: An Event for Postgres will happen Jun 10-12, 2025 and the Call for Speakers is now open—unt ...
We're pleased to announce that we published the schedule of the PGDay/MED 2024 taking place in Naples, Italy, on December ...
This is a list of terms and their meaning in the context of PostgreSQL and relational database systems in general. Interfaces which PostgreSQL use in order to access data in tables and indexes. This ...
7.2.3. The GROUP BY and HAVING Clauses The FROM clause derives a table from one or more other tables given in a comma-separated table reference list. When a table reference names a table that is the ...
CREATE TABLE will create a new, initially empty table in the current database. The table will be owned by the user issuing the command. If a schema name is given (for example, CREATE TABLE ...
Commercial support is available from many different companies providing professional services to the PostgreSQL community.
When logging_collector is enabled, this parameter sets the file names of the created log files. The value is treated as a strftime pattern, so %-escapes can be used to specify time-varying file names.
The collation feature allows specifying the sort order and character classification behavior of data per-column, or even per-operation. This alleviates the restriction that the LC_COLLATE and LC_CTYPE ...
Aggregate functions compute a single result from a set of input values. The built-in general-purpose aggregate functions are listed in Table 9.55 while statistical aggregates are in Table 9.56. The ...
This chapter provides general information about writing trigger functions. Trigger functions can be written in most of the available procedural languages, including PL/pgSQL (Chapter 41), PL/Tcl ...
Calculates hashed MAC for data with key key. type is the same as in digest(). This is similar to digest() but the hash can only be recalculated knowing the key. This prevents the scenario of someone ...