On Mon, Nov 06, 2006 at 01:40:18PM -0800, Marc Munro wrote: > You will of course be replicating the underlying tables and not the > views, so your replication user will have to have full access to the > unsecured data. This is natural and should not be a concern but may be > worth explicitly documenting. In Slony, the replication user has to be a superuser anyway, so it would have access to that data no matter what. A -- Andrew Sullivan | ajs@xxxxxxxxxxxxxxx Unfortunately reformatting the Internet is a little more painful than reformatting your hard drive when it gets out of whack. --Scott Morris