Best Practices Overview
Document |
Description |
---|---|
Provides guidance on GaussDB security configurations. |
|
Describes the use cases of different scaling operations. |
|
Describes typical accidental operations and their corresponding recovery methods. |
|
Describes how to configure GaussDB metric alarm rules. |
|
Describes how to use manual and automatic scheduling to compress data. |
|
Describes how to adjust SQL statements to improve SQL execution efficiency. |
|
Describes the responsibilities and capabilities of different permission types and roles, as well as how to configure permissions. |
|
Describes how to identify tables that cause data skew. |
|
Describes key aspects of stored procedures, including permission management, naming conventions, access to database objects, statement functions, and transaction management. |
|
Describes how to use the COPY syntax to import and export data. |
|
Describes how to use gs_dump and gs_dumpall to import and export data. |
|
Describes how to use JDBC for efficient data operations, including inserting data in batches, executing streaming queries, handling user-defined data types, and performing batch queries. |
|
Describes how to use the ODBC driver for batch data insertion. |
|
Describes how to use the Go driver for batch data insertion. |
|
Compares the performance of querying large tables containing over a million rows both with indexes and without them, and evaluates the effectiveness of single-column indexes versus composite indexes for optimizing query efficiency. |
|
Describes distribution mode and key design, data type selection, partitioning policies, constraint configuration, index optimization, and tuning of storage parameters. |
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.See the reply and handling status in My Cloud VOC.
For any further questions, feel free to contact us through the chatbot.
Chatbot