On Raspberry Pi, Postgres is a great alternative to SQLite for certain applications. I was able to improve the performance of my HomeAssistant RPi simply by replacing SQLite with PG... since PG does not block the entire database on table writes (like SQLite does) the performance is better. Postgres also is VERY light on resources, especially considering its capability- my RPi PG install only uses 64MB of RAM!
Having said that, you WILL burn through SD cards quickly if you use PG on local storage in a 24x7 application. You can solve this by putting the PG data directory on a USB disk (SSD or normal hard drive), or mounting it via NFS. But if you do the latter, it's better just to run the PG server on the remote machine...
The author mentions that it can be protected by a password OR a key file. Guess what- you can use both! In fact, anything can be used for a key file. If you secure it using both features, then not only would someone have to guess your password, they would have to guess the contents of the one file out of the millions of files on your computer that you use as a key file. Music, movies, source code, anything can be used as a key file.
Authored Comments
On Raspberry Pi, Postgres is a great alternative to SQLite for certain applications. I was able to improve the performance of my HomeAssistant RPi simply by replacing SQLite with PG... since PG does not block the entire database on table writes (like SQLite does) the performance is better. Postgres also is VERY light on resources, especially considering its capability- my RPi PG install only uses 64MB of RAM!
Having said that, you WILL burn through SD cards quickly if you use PG on local storage in a 24x7 application. You can solve this by putting the PG data directory on a USB disk (SSD or normal hard drive), or mounting it via NFS. But if you do the latter, it's better just to run the PG server on the remote machine...
The author mentions that it can be protected by a password OR a key file. Guess what- you can use both! In fact, anything can be used for a key file. If you secure it using both features, then not only would someone have to guess your password, they would have to guess the contents of the one file out of the millions of files on your computer that you use as a key file. Music, movies, source code, anything can be used as a key file.