orafce
pgaudit
Our great sponsors
orafce | pgaudit | |
---|---|---|
2 | 5 | |
470 | 1,183 | |
3.0% | 3.0% | |
8.2 | 5.0 | |
14 days ago | 17 days ago | |
C | C | |
GNU General Public License v3.0 or later | GNU General Public License v3.0 or later |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
orafce
-
Business Days
This extension have some functions to work with business days https://github.com/orafce/orafce, search for “bizdays”
-
A new extension in PostgreSQL for Oracle DBMS_JOB compatibility
In that case, there even exist Orafce, a project that provides a lot of compatibility to a lot of Oracle Packages. For example, a lot of date functions, UTL_FILE, DBMS_OUTPUT and a lot more are already [art of this :)
https://github.com/orafce/orafce
pgaudit
-
Show HN: I built this Postgres logger for you guys to check out
I think pgAudit it still the best and it's not a major issue. You can try my PR that fixes this issue https://github.com/pgaudit/pgaudit/pull/219 it should work and it should handle the other types of SELECT's that need update permissions but are not actually updating anything https://pglocks.org/?pglock=RowShareLock
- PgAudit: Open-Source PostgreSQL Audit Logging
- Auditing CREATE/DROP DATABASE
-
How Postgres Audit Tables Saved Us from Taking Down Production
You can use pgaudit, it's an extension that let's you audit DDL/DML statements. It's a great auditing mechanism. I use it on all our prod postgres instances, but have only "DML" enabled, because of the potential performance overhead
https://github.com/pgaudit/pgaudit
-
Auditing PostgreSQL Using pgAudit
pgAudit, with all its capabilities, simplifies the process of auditing by generating the audit trail log. Though there are a few caveats, like logging of renamed objects under the same name, it is still a robust tool that provides the required functionality. However, the audit information written in logs may not be just ideal for the auditing process - the auditing process is even better when those logs can be converted to a database schema, and audit data can be loaded to the database so you can easily query the information. This is where the PostgreSQL Audit Log Analyzer (pgAudit Analyze) is helpful. For more information, refer to the github pages of pgAudit and pgAudit Analyze.
What are some alternatives?
plpgsql_check - plpgsql_check is a linter tool (does source code static analyze) for the PostgreSQL language plpgsql (the native language for PostgreSQL store procedures).
pgaudit_analyze - PostgreSQL Audit Analyzer
pg_plan_advsr - PostgreSQL extension for automated execution plan tuning
psycopg2 - PostgreSQL database adapter for the Python programming language
tds_fdw - A PostgreSQL foreign data wrapper to connect to TDS databases (Sybase and Microsoft SQL Server)
debezium - Change data capture for a variety of databases. Please log issues at https://issues.redhat.com/browse/DBZ.
hypopg - Hypothetical Indexes for PostgreSQL
temporal_tables - Temporal Tables PostgreSQL Extension
pg-generate-up-down-series - My attempt at the benchmark!
sqlite-wf - Simple visual ETL tool
pguri - uri type for PostgreSQL
plv8 - V8 Engine Javascript Procedural Language add-on for PostgreSQL