Database Assessment

ParadeDB : Revolutionizing Postgres For Advanced Search And Analytics

ParadeDB is an Elasticsearch alternative built on Postgres. We’re modernizing the features of Elasticsearch’s product suite, starting with real-time search and analytics.

Roadmap

  • Search
    • Full-text search with BM25 with pg_search
    • Dense and sparse vector search with pgvector
    • Distributed search
  • Analytics
    • Fast analytics over data lakes (i.e. S3) and table formats (i.e. Iceberg) with pg_analytics
    • Column-oriented Postgres table access method

For a detailed roadmap, see the ParadeDB Roadmap for 2024 – 2025.

Get Started

To get started, please visit our documentation.

Deploying ParadeDB

ParadeDB and its extensions can be deployed in one of two ways:

  • Docker image based on Postgres (see deployment instructions)
  • Kubernetes Helm chart based on CloudNativePG (see deployment instructions)

For more information, including enterprise features and support, please contact us by email.

Extensions

You can find prebuilt binaries for the ParadeDB Postgres extensions on Debian 12, Ubuntu 22.04 and 24.04, Red Hat Enterprise Linux 8 and 9, and macOS 14 (Sonoma) and 15 (Sequoia) for Postgres 14, 15, 16 and 17 in the GitHub Releases.

ParadeDB supports all versions supported by the PostgreSQL Global Development Group, which includes PostgreSQL 13+, and you can compile the extensions for other versions of Postgres by following the instructions in the respective extension’s README.

Docker Image

To quickly get a ParadeDB instance up and running, simply pull and run the latest Docker image:

docker run --name paradedb -e POSTGRES_PASSWORD=password paradedb/paradedb

This will start a ParadeDB instance with default user postgres and password password. You can then connect to the database using psql:

docker exec -it paradedb psql -U postgres

For more information click here.

Varshini

Varshini is a Cyber Security expert in Threat Analysis, Vulnerability Assessment, and Research. Passionate about staying ahead of emerging Threats and Technologies.

Recent Posts

How to Prevent Software Supply Chain Attacks

What is a Software Supply Chain Attack? A software supply chain attack occurs when a…

2 hours ago

How UDP Works and Why It Is So Fast

When people ask how UDP works, the simplest answer is this: UDP sends data quickly…

1 week ago

How EDR Killers Bypass Security Tools

Endpoint Detection and Response (EDR) solutions have become a cornerstone of modern cybersecurity, designed to…

2 weeks ago

AI-Generated Malware Campaign Scales Threats Through Vibe Coding Techniques

A large-scale malware campaign leveraging AI-assisted development techniques has been uncovered, revealing how attackers are…

2 weeks ago

How Does a Firewall Work Step by Step

How Does a Firewall Work Step by Step? What Is a Firewall and How Does…

2 weeks ago

Fake VPN Download Trap Can Steal Your Work Login in Minutes

People trying to securely connect to work are being tricked into doing the exact opposite.…

2 weeks ago