Catalog of PostgreSQL queries for finding information about a PostgreSQL database and its design problems

AND
AND
AND
ANDFrom where does the query gets its information?
AND
AND

There are 996 queries.

Seq nrNameGoalTypeData sourceLast updateLicense...
801Views with unnecessary security invokerFind views with security invoker option that do not have any underlying base table with a security policy. Security invoker option of views is possible starting from PostgreSQL 15. "The main use case (and the one that inspired the feature) is to be able to use views and still check row-level security policies on the underlying tables as the invoker."Problem detectionINFORMATION_SCHEMA+system catalog base tables2023-11-17 18:39MIT License
802Views with WHERE but without security barrierFind views that do not have the security barrier option but restrict rows in some way.Problem detectionINFORMATION_SCHEMA+system catalog base tables2024-12-13 19:29MIT License
803Wrong comment - trigger function does not implement a database operationTrigger functions should not contain references to database operations. Perhaps the trigger implements ensuring some invariant of the operation but it does not implement the operation itself.Problem detectionINFORMATION_SCHEMA+system catalog base tables2021-02-25 17:30MIT License
804YELLING IN COMMENTS!Find comments of derived tables and routines that consist of only uppercase letters. Do not use only uppercase (capital) letters in order to write comments. It means yelling and also makes text less readable.Problem detectionINFORMATION_SCHEMA+system catalog base tables2024-04-25 15:13MIT License
805All clustered indexesFind all tables that rows have been physically sorted based on an index.Generalsystem catalog base tables only2022-10-31 10:17MIT License
806All database privilegesFind the privileges to use the database. c - CONNECT; C - CREATE; T - TEMPORARY.Generalsystem catalog base tables only2021-11-23 20:28MIT License
807All event triggersFind event triggers, which are not associated to a specific schema object.Generalsystem catalog base tables only2020-12-24 14:54MIT License
808All exclude constraintsFind all exclude constraints.Generalsystem catalog base tables only2021-12-16 11:21MIT License
809All foreign key constraintsEnforce referential integrity in database. Find all referential integrity (foreign key) constraints.Generalsystem catalog base tables only2023-12-07 12:48MIT License
810All identifying relationshipsFind all non-identifying relationships where the foreign key (a set of columns) is a subset of a uniqueness constraint (primary key, unique, or exclude constraint).Generalsystem catalog base tables only2023-11-01 11:32MIT License
811All key constraintsFind all the primary key and unique constraints of base tables.Generalsystem catalog base tables only2021-10-16 10:37MIT License
812All non-identifying relationshipsFind all non-identifying relationships where the foreign key (a set of columns) is not a subset of any uniqueness constraint (primary key, unique, or exclude constraint).Generalsystem catalog base tables only2023-11-01 11:31MIT License
813All rulesFind user-defined rules for rewriting data manipulation language statements. Rules should be used only for the tasks that cannot be achieved in a declarative manner, i.e., for example, by declaring a constraint.Generalsystem catalog base tables only2023-12-22 12:30MIT License
814All security policiesFind all security policies.Generalsystem catalog base tables only2023-11-17 18:41MIT License
815All supertablesFind all the base tables that serve as supertables in the inheritance hierarchiesSofware measuresystem catalog base tables only2021-03-14 17:07MIT License
816All system-defined TOAST-able typesFind system-defined types in case of which the system can use the TOAST technique, i.e., save the value in a compressed form or store it in a automatically-created secondary table, which is hidden from the database user (TOAST table).Generalsystem catalog base tables only2020-11-06 14:51MIT License
817All user-defined TOAST-able typesFind user-defined types in case of which the system can use the TOAST technique, i.e., save the value in a compressed form or store it in a automatically-created secondary table, which is hidden from the database user (TOAST table).Generalsystem catalog base tables only2020-11-06 14:51MIT License
818All user mappingsFind all user mappings for foreign servers and tablesGeneralsystem catalog base tables only2020-11-11 17:00MIT License
819A state machine is implemented with the help of a state classifier tableFind implementations of state machines that use a state classifier table.Generalsystem catalog base tables only2023-11-26 15:39MIT License
820Base table columns where TOASTing is possibleFind all base table columns in case of which the system can use TOAST technique.Generalsystem catalog base tables only2020-11-06 14:51MIT License