PostgreSQL 9.6.0

PostgreSQL is a robust relational database system with over 25 years of active development that runs on all major operating systems. It is fully ACID compliant, and has full support for foreign keys, joins, views, triggers, and stored procedures (in multiple languages). It includes most SQL92 and SQL99 data types, including INTEGER, NUMERIC, BOOLEAN, CHAR, VARCHAR, DATE, INTERVAL, and TIMESTAMP. It also supports storage of binary large objects, including pictures, sounds, or video. It has native programming interfaces for C/C++, Java, .Net, Perl, Python, Ruby, Tcl, and ODBC, among others, and exceptional documentation.

Tags database database-server database-engine postgresql
License PostgreSQL
State stable

Recent Releases

9.6.030 Sep 2016 21:11 major feature: PostgreSQL 9.6, the latest version of the world's leading open source database, was released today by the PostgreSQL Global Development Group. This release will allow users to both scale up and scale out high performance database workloads. New features include parallel query, synchronous replication improvements, phrase search, and improvements to performance and usability, as well as many more features, including: Scale Up with Parallel Query, Scale Out with Synchronous Replication and postgres_fdw, Better Text Search with Phrases, New system views and functions: pg_stat_wal_receiver, pg_visibility, pg_config, pg_blocking_pids, pg_notification_queue_usage, Command progress reporting support, Cascade support for installing extensions, pg_basebackup concurrency and replication slot support, Wait Event support, View editing and crosstabs in psql, User-defined expiration for old snapshots, Index-only scans for partial indexes and much, much more.
9.4.018 Dec 2014 20:19 major feature: Major enhancements in PostgreSQL 9.4 include: JSONB, a more capable and efficient data type for storing JSON data. Add new SQL command ALTER SYSTEM for changing postgresql.conf configuration file entries. Reduce lock strength for some ALTER TABLE commands. Allow materialized views to be refreshed without blocking concurrent reads. Add support for logical decoding of WAL data, to allow database changes to be streamed out in a customizable format. Allow background worker processes to be dynamically registered, started and terminated. Version 9.4 contains a number of changes that may affect compatibility with previous releases: Tighten checks for multidimensional array input. Unicode escapes in JSON text values are no longer rendered with the backslash escaped. When converting values of type date, timestamp or timestamptz to JSON, render the values in a format compliant with ISO 8601. The json # text path extraction operator now returns its lefthand input, not NULL, if the array is empty. Fix ts_rank_cd() to ignore stripped lexemes. For functions declared to take VARIADIC "any", an actual parameter marked as VARIADIC must be of a determinable array type. DISCARD now also discards sequence-related state. SHOW TIME ZONE now outputs simple numeric UTC offsets in POSIX timezone format. Remove native support for Kerberos authentication. In PL/Python, handle domains over arrays like the underlying array type. pg_upgrade now uses -U or --username to specify the user name.
9.3.527 Jul 2014 11:11 security: PostgreSQL 9.3 and pg_upgrade: Users who upgraded to version 9.3 using pg_upgrade may have an issue with transaction information which causes VACUUM to eventually fail. These users should run the script provided in the release notes to determine if their installation is affected, and then take the remedy steps outlined there. PostgreSQL 9.3 crash recovery: Three issues which could compromise data integrity during crash recovery on master or standby servers in PostgreSQL 9.3 have been fixed. GIN and GiST indexes: Three issues with GIN and GiST indexes, used for PostGIS and full text indexing, can cause corruption or incorrect query responses. Any indexes on bit or bit varying columns should be rebuilt following the instructions in the release notes. Security during make check: The insecure socket permissions during "make check", reported in a previous security announcement, have now been fixed.