16.2. InstallingPostgres Pro Standard on Windows
On Windows systems, you can use a binary self-extracting interactive installer to installPostgres Pro core components and create the default database. The following components have their own installers that should be run separately once the core components are installed:
pg_probackup
16.2.1. External Connections and Windows Firewall
By default,Postgres Pro server is listening for connections from the localhost only. To allow external connections toPostgres Pro server, select the "Allow external connections" checkbox to add the appropriate parameter into thepostgresql.conf
file, add a line into thepg_hba.conf
file, and create a Windows Firewall rule.
Note
Postgres Pro application is registered with Windows Firewall anyway, so if you have not enabled external connection during installation and decide to do it later, you only have to open Windows Firewall configuration in the Control Panel, find thePostgres Pro server here, and allow it to accept connections.
16.2.2. Supported Operating Systems
Postgres Pro is available for the following 64-bit Windows versions:
Windows 8.1, 10
Windows Server 2008 R2 or higher
16.2.3. Procedural Languages
The procedural languagesPL/Perl
,PL/Python
are included in this distribution ofPostgres Pro. The server has been built using the LanguagePack community distributions of those language interpreters. To use any of the these languages from withinPostgres Pro, download and install the appropriate interpreters and ensure they are included in thePATH
variable under which the database server will be started.
The current version ofPL/Python
is dynamically linked with Python shared library in the LanguagePack installers. Some distributions of Python interpreters (including ActivePython) on Windows do not include a dynamic library of Python. Such interpreters would no longer be functional withPL/Python
. You are recommended to use LanguagePack installers forPL/Perl
andPL/Python
instead.
16.2.4. Windows Service Account
A specialNT AUTHORITY\\NetworkService
account is used by default. You can specify another Windows user for startingPostgres Pro service in the corresponding text box of the installer, if required. The provided user must have the right to start Windows services.
16.2.5. Command-Line Options
Installation directory path:
/D=path
Silent install:
/S
*.ini
file with installation options:
/init=ini_file_name
16.2.6. INI File Format
You can add the following installation options to the [options] section of the INI file:
InstallDir
— path where to install serverDataDir
— path where to create default databasePort
— TCP/IP port to listen. Default: 5432.SuperUser
— name of the database user who will have admin rights in the databasePassword
— password of the usernoExtConnections = 1
— don't allow external connectionCoding = UNICODE
— character encoding to use in the databaseLocale
— locale to use in the database. There can be several different locales for each encodingvcredist = no
— do not install Visual C redistributable libraries (use it only if these libraries are already installed on your system)envvar = 1
— set up environment variables helpful forPostgres Pro:PGDATA
,PGDATABASE
,PGUSER
,PGPORT
,PGLOCALEDIR
needoptimization = 0
— disable automatic tuning of configuration parameters based on the available system resources.datachecksums = 0
— disable data checksums for the cluster.serviceaccount
— specify a Windows user for startingPostgres Pro service. The provided user must have the right to start Windows services. By default,Postgres Pro service is started on behalf ofNT AUTHORITY\NetworkService
, which is a special Windows Service Account.servicepassword
— provide the password for the Windows user specified in theserviceaccount
option.serviceid
— changePostgres Pro service name.islibc = 1
— uselibc
as the provider of the default collation.
16.2.7. Antivirus Considerations
It is strongly recommended to avoid using antivirus software on systems wherePostgres Pro is running because it may cause additional load on your environment and result in unexpected database behavior that would lead to performance and reliability issues. If you need to use antivirus software, make sure to exclude the following directories from virus scanning as they do not contain any executable files:
PGDATA
directory that stores main cluster dataPaths to createdtablespaces