<productname>PostgreSQL</productname> has an optional but highly
recommended feature called <firstterm>autovacuum</firstterm>,
whose purpose is to automate the execution of
- <command>VACUUM</command> and <command>ANALYZE </command> commands.
+ <command>VACUUM</command> and <command>ANALYZE</command> commands.
When enabled, autovacuum checks for
tables that have had a large number of inserted, updated or deleted
tuples. These checks use the statistics collection facility;
<table tocentry="1" id="table-lock-compatibility">
- <title> Conflicting Lock Modes</title>
+ <title>Conflicting Lock Modes</title>
<tgroup cols="9">
<colspec colnum="1" colwidth="1.25*"/>
<colspec colnum="2" colwidth="1*" colname="lockst"/>
<entry>KAME kame/sys/crypto</entry>
</row>
<row>
- <entry>SHA256/384/512 </entry>
+ <entry>SHA256/384/512</entry>
<entry>Aaron D. Gifford</entry>
<entry>OpenBSD sys/crypto</entry>
</row>
<arg rep="repeat"><replaceable>option</replaceable></arg>
<group choice="plain">
<group choice="req">
- <arg choice="plain"><option>-D </option></arg>
+ <arg choice="plain"><option>-D</option></arg>
<arg choice="plain"><option>--target-pgdata</option></arg>
</group>
<replaceable> directory</replaceable>
The certificates of <quote>intermediate</quote> certificate authorities
can also be appended to the file. Doing this avoids the necessity of
storing intermediate certificates on clients, assuming the root and
- intermediate certificates were created with <literal>v3_ca </literal>
+ intermediate certificates were created with <literal>v3_ca</literal>
extensions. (This sets the certificate's basic constraint of
<literal>CA</literal> to <literal>true</literal>.)
This allows easier expiration of intermediate certificates.