The database user account
that is used for the Greenplum Database connection must have superuser
privileges in order to monitor queries and terminate connections.
You can increase the security for the account by configuring Greenplum
Database to accept connections for the account from the machine that
hosts the console.
To restrict the database
user account:
-
Edit the
$MASTER_DATA_DIRECTORY/pg_hba.conf
file.
-
Add a line to the file
that is similar to the following example:
# permit the 'sashpcadm' role access to any database from
# IP address 192.168.1.1 only and use md5 encrypted password
host all sashpcadm 192.168.1.1/32 md5
-
-
Run
gpstop
-u
so that Greenplum Database rereads the file and applies
the change.
The same database user
account can be used for the active queries and connections module
and the temporary table maintenance module. For more information about
editing the pg_hba.conf file, see
Greenplum Database Administrator
Guide.