The information_schema in PostgreSQL holds a lot of really handy views with information about the current database. Very useful in investigation and discovery scenarios.
In today’s post, we’ll go through the tables that sit in this schema and how they can help. The information_schema documentation can be found here and is what this article has been based on.
Meta and Context
-- get the current database nameSELECT*FROMinformation_schema.information_schema_catalog_name;-- what are the roles does the current user have that the admin option for?SELECT*FROMinformation_schema.administrable_role_authorizations;-- what roles are applicabl to the current user?SELECT*FROMinformation_schema.applicable_roles;-- attributes on composite data types that the current user has access toSELECT*FROMinformation_schema.attributes;
Server
-- available character setsSELECT*FROMinformation_schema.character_sets;-- list all collations available to this databaseSELECT*FROMinformation_schema.collations;-- lists the available character sets that apply to the collationsSELECT*FROMinformation_schema.collation_character_set_applicability;-- list all of the options defined for foreign-data wrappersSELECT*FROMinformation_schema.foreign_data_wrapper_options;-- list all foreign-data wrappers defined in the databaseSELECT*FROMinformation_schema.foreign_data_wrappers;-- lists all of the options defined for foreign servers in this databaseSELECT*FROMinformation_schema.foreign_server_options-- lists all of the standard sql features supportedSELECT*FROMinformation_schema.sql_features;-- lists features that are implementation definedSELECT*FROMinformation_schema.sql_implementation_info;-- lists all of the sql languages supportedSELECT*FROMinformation_schema.sql_languages;-- lists all of the sql defined feature packages are supportedSELECT*FROMinformation_schema.sql_packages;-- lists all of the supported parts of the sql standardSELECT*FROMinformation_schema.sql_parts;-- lists the size limits in the databaseSELECT*FROMinformation_schema.sql_sizing;-- lists sizing profile informationSELECT*FROMinformation_schema.sql_sizing_profiles;-- lists all of the foreign servers defined in this databaseSELECT*FROMinformation_schema.foreign_servers;-- lists all of the options defined for foreign tables in this databaseSELECT*FROMinformation_schema.foreign_table_options;-- lists all of the foreign tables SELECT*FROMinformation_schema.foreign_tables;-- list all settings for user mappingsSELECT*FROMinformation_schema.user_mapping_options;-- list all user mappings SELECT*FROMinformation_schema.user_mappings;
Catalog
-- list all check constraintsSELECT*FROMinformation_schema.check_constraints;-- lists all of the parameters to functions in the databaseSELECT*FROMinformation_schema.parameters;-- lists all foreign keys in the databaseSELECT*FROMinformation_schema.referential_constraints;-- lists all of the functions in the databaseSELECT*FROMinformation_schema.routines;-- lists all of the sequencesSELECT*FROMinformation_schema.sequences;-- lists all constraints from tables in this databaseSELECT*FROMinformation_schema.table_constraints;-- list all tablesSELECT*FROMinformation_schema.tables;-- list all triggersSELECT*FROMinformation_schema.triggers;-- list all composite typesSELECT*FROMinformation_schema.user_defined_types;-- lists all views in the databaseSELECT*FROMinformation_schema.views;-- list all transforms (9.5 ONLY)SELECT*FROMinformation_schema.transforms;
Security and Privileges
-- list all columns and their priviledgesSELECT*FROMinformation_schema.column_privileges;-- lists all privileges on columnsSELECT*FROMinformation_schema.role_column_grants;-- lists all privileges on functionsSELECT*FROMinformation_schema.role_routine_grants;-- lists all privileges on tablesSELECT*FROMinformation_schema.role_table_grants;-- lists all privileges on udfsSELECT*FROMinformation_schema.role_udt_grants;-- lists all privileges on various objects SELECT*FROMinformation_schema.role_usage_grants;-- lists all privileges on functionsSELECT*FROMinformation_schema.routine_privileges;-- lists all of the table privileges SELECT*FROMinformation_schema.table_privileges;-- list all udt privilegesSELECT*FROMinformation_schema.udt_privileges;-- list privileges on various objectsSELECT*FROMinformation_schema.usage_privileges;-- list all data types that the user has access toSELECT*FROMinformation_schema.data_type_privileges;-- list all enabled rolesSELECT*FROMinformation_schema.enabled_roles;
Explore
-- list all routines that are used by a check constraintSELECT*FROMinformation_schema.check_constraint_routine_usage;-- list columns using a domain defined inside of this databaseSELECT*FROMinformation_schema.column_domain_usage;-- list all columns that use types owned by the current userSELECT*FROMinformation_schema.column_udt_usage;-- list all columns used by constraintsSELECT*FROMinformation_schema.constraint_column_usage;-- list all tables used by constraintsSELECT*FROMinformation_schema.constraint_table_usage;-- list all domains based on data types owned by the current userSELECT*FROMinformation_schema.domain_udt_usage;-- lists all columns in the database restricted by primary,unique, foreign or check constraintSELECT*FROMinformation_schema.key_column_usage;-- list all columns that are used in viewsSELECT*FROMinformation_schema.view_column_usage;-- list all routines that are used in viewsSELECT*FROMinformation_schema.view_routine_usage;-- lists all tables that are used in viewsSELECT*FROMinformation_schema.view_table_usage;-- list all of the columns in the databaseSELECT*FROMinformation_schema.columns;-- list all triggers that specify update columnsSELECT*FROMinformation_schema.triggered_update_columns;-- list options for any foreign table columnsSELECT*FROMinformation_schema.column_options;-- list all constraints that belong to domains in the current databaseSELECT*FROMinformation_schema.domain_constraints;-- list all domains defined in the databaseSELECT*FROMinformation_schema.domains-- list all of the data types inside of array elementsSELECT*FROMinformation_schema.element_types;-- lists all of the schemas SELECT*FROMinformation_schema.schemata;
Today’s post is a quick tip on X11 port forwarding, and how to use it to run X11 applications remotely.
The setup
Your remote computer, the one that will actually run the application needs openssh installed. Use your favorite package manager to get that installed. You then need to edit your sshd configuration file to allow X11 port forwarding.
sudo emacs /etc/ssh/sshd_config
You need to make two edits to this file:
X11Forwarding yes
X11UseLocalhost no
Restart the ssh daemon.
Running
From your client computer now, connect to your remote host and run any X11 application that you want. It’ll appear on your client machine.
In today’s post, I’m going to walk through a simple SOAPweb service creation using maven, jax-ws for java. The service will be hosted inside of Apache Tomcat once we’re up and running.
Maven
First off, we start the application off with maven.
This creates our project structure and puts all of the project dependencies in place. The pom.xml that gets generated for us needs a little extra help for a JAX-WS project. We need to:
We now write our service implementation. For this purposes of this article will be very simple. I took over the pre-generated App.java and renamed it for my purposes to HelloService.java.
We instruct the jaxws framework that we have a service listening at any particular given endpoint by use of the sun-jaxws.xml file. Create this file in src/main/webapp/WEB-INF. It should look like this:
To let Tomcat know from a deployment perspective what this application will handle, we also create a web.xml file that will be located in the same directory, src/main/webapp/WEB-INF. It looks like this:
Now that the service is up and running, we really want to test it to make sure it’s working. SOAP requests are HTTP POSTS. Sending the following request:
In a previous post we went through a fairly simple example of how to get up and running quickly with Apache Hive. In today’s post I’ll take a deeper dive a look a little closer at the different aspects of using it.
For the examples that are listed in this blogpost, I’m using data that can be downloaded from the FAA site.
Databases
Your first job, much the same with any database system is to create a database.
hive> CREATE DATABASE first;
OK
Time taken: 0.793 seconds
hive> USE first;
OK
Time taken: 0.037 seconds
You can also use EXISTS in your creation and destruction statements to ensure something is or isn’t there.
hive> CREATE DATABASE IF NOT EXISTS first;
OK
Time taken: 0.065 seconds
hive> DROP DATABASE IF EXISTS first;
OK
Time taken: 0.26 seconds
Tables
To create a table that’s managed by the hive warehouse, we can use the following.
hive> CREATE TABLE airports (
> iata STRING, airport STRING, city STRING,
> state STRING, country STRING,
> lat DECIMAL, long DECIMAL
> ) ROW FORMAT DELIMITED FIELDS TERMINATED BY ",";
OK
Time taken: 0.324 seconds
This table can then be filled with data that is sourced locally:
hive> LOAD DATA LOCAL INPATH '/srv/airports.csv'
> OVERWRITE INTO TABLE airports;
Loading data to table faa.airports
Table faa.airports stats: [numFiles=1, numRows=0, totalSize=244383, rawDataSize=0]
OK
Time taken: 1.56 seconds
You can also create an external table using the following syntax:
hive> CREATE EXTERNAL TABLE carriers (
> code STRING, description STRING
> ) ROW FORMAT DELIMITED FIELDS TERMINATED BY ","
> LOCATION '/user/root/carriers';
OK
Time taken: 0.408 seconds
You can see that this has used a file hosted on HDFS as the data source. The idea is that the existing file (that we’d specified in the LOCATION statement) will now be accessible to hive through this table.
From the wiki:
The EXTERNAL keyword lets you create a table and provide a LOCATION so that Hive does not use a default location for this table. This comes in handy if you already have data generated. When dropping an EXTERNAL table, data in the table is NOT deleted from the file system.
An EXTERNAL table points to any HDFS location for its storage, rather than being stored in a folder specified by the configuration property hive.metastore.warehouse.dir.
It’s important to note that when you DROP an external table, the underlying data is NOT deleted.
Views
You can provide a more targeted representation of your data to you users by offering them views. Views allow you to also specify aggregate functions as columns. In the following view, we simple retrieve all of the countries that an airport is located; along with the number of airports located in that country.
hive> CREATE VIEW airports_per_country_vw
> AS
> SELECT country, COUNT(*) AS country_count
> FROM airports
> GROUP BY country;
OK
Time taken: 0.134 seconds
Partitions and Buckets
Because you’ll be working with very large data sets, Hive offers you the ability to partition data on columns that you nominate. These partitions are then broken down even further with into buckets.
From the wiki:
Partitioned tables can be created using the PARTITIONED BY clause. A table can have one or more partition columns and a separate data directory is created for each distinct value combination in the partition columns. Further, tables or partitions can be bucketed using CLUSTERED BY columns, and data can be sorted within that bucket via SORT BY columns. This can improve performance on certain kinds of queries.
So this technique does change the way data is physically structured on disk. It tried to structure it in such a way that it’ll bias towards the performance of the queries that you’re running. Of course, this is up to you as you need to define which fields to partition and cluster by.
Here’s the airports table, partitioned by country.
hive> CREATE EXTERNAL TABLE airport_part_by_country (
> iata STRING, airport STRING, city STRING,
> state STRING, lat DECIMAL, long DECIMAL
> ) PARTITIONED BY (country STRING)
> ROW FORMAT DELIMITED FIELDS TERMINATED BY ","
> LOCATION '/user/root/partitioned';
OK
Time taken: 0.128 seconds
When this table gets clustered into buckets, the database developer needs to specify the number of buckets to possible distribute across. From here, hive will make decisions on which bucket to place the data into with the following formula:
We then create and fill the bucketed store like so:
-- create the bucketed store
hive> CREATE EXTERNAL TABLE airports_b (
> iata string, airport string, city string,
> state string, lat decimal, long decimal
> ) PARTITIONED BY (country string)
> CLUSTERED BY (state) INTO 100 BUCKETS;
-- fill the bucketed store
hive> set hive.enforce.bucketing = true;
hive> FROM airports
> INSERT OVERWRITE TABLE airports_b
> PARTITION (country='USA')
> SELECT iata, airport, city, state, lat, long;
The following post is a quick guide to getting around the nmap network administration and security tool.
General scanning
Scanning with nmap gives you the insight into what is available to a server (from an external user’s perspective). Information about the techniques that nmap will use can be found here.
# cloak a scan with decoys
nmap -n-Ddecoy1.example.com,decoy2.example.com 192.168.0.1
# scan with a spoofed mac address
nmap --spoof-mac MAC-ADDRESS-HERE 192.168.0.1
# scan with a random mac address
nmap -v-sT-PN--spoof-mac 0 192.168.0.1