It’s raw, encoded in the binary protocol, bypassing SQL text logging. Hidden inside could be names, emails, phone numbers—PII you cannot afford to miss.
Pii detection in Postgres binary protocol proxying is no longer optional. The challenge: the binary protocol is fast, compact, and opaque to naive inspection. Standard logging isn’t enough. The solution requires intercepting packets in-flight, decoding them, and scanning for personal data patterns without breaking the speed your systems need.
A proxy can sit between client and server, handling authentication, parsing the protocol, and detecting sensitive fields before they reach storage. This is more than sniffing network traffic; it means decoding the Postgres wire format—type OIDs, parameter values, and data row messages—to map values to their semantic meaning. Once mapped, you can apply PII detection algorithms for email addresses, IPs, credit card numbers, or custom regex patterns.