Skip to content

Rex Bytes

  • Blog
  • Programming & IT
  • Software
  • testing
  • Tutorials
  • vpn-tutorials
Rex Bytes
  • pgmonkey (8/8) — Production Patterns
    Tutorials

    pgmonkey (8/8) — Production Patterns

    ByRex Bytes February 17, 2026February 20, 2026

    The post discusses integrating pgmonkey into production environments, focusing on transaction management, GUC session settings, connection caching, and error handling. It outlines examples for Flask and FastAPI integration, emphasizing the importance of adhering to a production readiness checklist to ensure security, performance, and reliability in web applications.

    Read More pgmonkey (8/8) — Production PatternsContinue

  • pgmonkey (7/8) — CSV Import and Export
    Tutorials

    pgmonkey (7/8) — CSV Import and Export

    ByRex Bytes February 17, 2026February 20, 2026

    pgmonkey allows CSV import and export to and from PostgreSQL tables using its pgexport and pgimport commands. It features auto-detection for delimiters and encoding, generates configuration files for consistency, handles schema-qualified tables, and uses bulk transfer for efficiency. This streamlines data management between databases effectively.

    Read More pgmonkey (7/8) — CSV Import and ExportContinue

  • pgmonkey (6/8) — The CLI Toolbox
    Tutorials

    pgmonkey (6/8) — The CLI Toolbox

    ByRex Bytes February 17, 2026February 20, 2026

    pgmonkey’s CLI offers advanced features beyond connectivity, including generating configuration files, testing various connection types, producing Python code, and providing server configuration recommendations. It enables users to audit live PostgreSQL servers for compliance and facilitates efficient CSV data import and export. This toolbox streamlines PostgreSQL management significantly.

    Read More pgmonkey (6/8) — The CLI ToolboxContinue

  • pgmonkey (5/8) — Environment Variables and Secrets
    Tutorials

    pgmonkey (5/8) — Environment Variables and Secrets

    ByRex Bytes February 17, 2026February 20, 2026

    Here we cover how pgmonkey allows secure handling of credentials in configuration files through environment variable interpolation. It describes methods like inline substitution, structured references from environment variables, and files, emphasizing sensitive key protection and opt-in defaults. The solution prevents accidental exposure of sensitive information.

    Read More pgmonkey (5/8) — Environment Variables and SecretsContinue

  • pgmonkey (4/8) — Connection Pooling
    Tutorials

    pgmonkey (4/8) — Connection Pooling

    ByRex Bytes February 17, 2026February 20, 2026

    We look at configuring pgmonkey’s connection pools, focusing on synchronous and asynchronous options. Key settings such as pool size, lifecycle limits, and health checks are outlined to optimize database connection reuse. Best practices for pool sizing based on application load and performance considerations are also detailed.

    Read More pgmonkey (4/8) — Connection PoolingContinue

  • pgmonkey (3/8) — Securing Connections with SSL/TLS
    Tutorials

    pgmonkey (3/8) — Securing Connections with SSL/TLS

    ByRex Bytes February 17, 2026February 20, 2026

    We look at the details of the configuration of SSL/TLS encryption for PostgreSQL connections using pgmonkey. This post explains six SSL modes, from basic encryption to full verification with client certificates. It emphasizes the importance of verifying server certificates for security and provides guidance on troubleshooting common SSL issues.

    Read More pgmonkey (3/8) — Securing Connections with SSL/TLSContinue

  • pgmonkey (2/8) — Connection Types
    Tutorials

    pgmonkey (2/8) — Connection Types

    ByRex Bytes February 17, 2026February 20, 2026

    pgmonkey lets you connect to PostgreSQL in four ways: normal, pool, async, and async_pool, all using one YAML config. Each type suits different scenarios, like single scripts or high-concurrency apps. Switching connection types is super easy—just change a parameter, no config hassles needed. Next up, securing connections!

    Read More pgmonkey (2/8) — Connection TypesContinue

  • pgmonkey (1/8) — Getting Started
    Tutorials

    pgmonkey (1/8) — Getting Started

    ByRex Bytes February 17, 2026February 20, 2026

    Alright, so here’s the gist: You can get started with pgmonkey in under five minutes. Just set up your project folder, install pgmonkey, and create a YAML config file. After tweaking it for your database, test your connection and run a simple Python query. Easy peasy!

    Read More pgmonkey (1/8) — Getting StartedContinue

  • pgmonkey: One Config File to Rule All Your PostgreSQL Connections
    Blog

    pgmonkey: One Config File to Rule All Your PostgreSQL Connections

    ByRex Bytes February 17, 2026February 20, 2026

    pgmonkey is a handy Python library that simplifies PostgreSQL connection management with just one YAML config file. It supports multiple connection types—like sync, async, and pooled—while handling caching and lifecycle tasks seamlessly. Ideal for projects with mixed connection needs, it saves developers from configuration chaos. Worth checking out!

    Read More pgmonkey: One Config File to Rule All Your PostgreSQL ConnectionsContinue

  • Make 04: Advanced – Libraries, Linking, and Mixed Builds
    Tutorials

    Make 04: Advanced – Libraries, Linking, and Mixed Builds

    ByRex Bytes February 13, 2026February 20, 2026

    This tutorial dives into advanced Make concepts, showing how to build static and shared libraries, link with external libraries using pkg-config, and tackle mixed-language projects. You’ll learn about creating Makefiles, linking multiple libraries, and the differences between recursive and non-recursive Make setups. Plus, it covers the basics of the debian/rules file for package management. Happy coding!

    Read More Make 04: Advanced – Libraries, Linking, and Mixed BuildsContinue

Page navigation

1 2 3 … 6 Next PageNext

© 2026 Rex Bytes - WordPress Theme by Kadence WP

Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
  • Manage options
  • Manage services
  • Manage {vendor_count} vendors
  • Read more about these purposes
View preferences
  • {title}
  • {title}
  • {title}
Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
  • Manage options
  • Manage services
  • Manage {vendor_count} vendors
  • Read more about these purposes
View preferences
  • {title}
  • {title}
  • {title}
 

Loading Comments...
 

You must be logged in to post a comment.

    • Blog
    • Programming & IT
    • Software
    • testing
    • Tutorials
    • vpn-tutorials