binlog2sql: Binlog to Raw SQL Conversion and Point In Time Recovery

binlog2sql

In this blog, I will look at the tool binlog2sql, designed by Cao Danfeng. The tool will help to decode the MySQL binary logs and extract the raw SQL, which also helps to generate the ROLLBACK statements for point in time recovery (PITR) using the “flashback” feature. This feature is also implemented in MariaDB’s […]

Read more

Scaling the Percona Kubernetes Operator for Percona XtraDB Cluster

Scaling Percona Kubernetes Operator

You got yourself a Kubernetes cluster and are now testing our Percona Kubernetes Operator for Percona XtraDB Cluster. Everything is working great and you decided that you want to increase the number of Percona XtraDB Cluster (PXC) pods from the default 3, to let’s say, 5 pods.
It’s just a matter of running the […]

Read more

On-Demand Webinar: Securing MongoDB

Securing MongoDB

MongoDB, like most any other commercial database you might care to name, has these five security subsystems:

Authentication
Authorization
Network Encryption
Data-at-rest Encryption
Auditing

In this on-demand webinar, you’ll first learn which threat each of the subsystems addresses. Second, you’ll learn which parts probably differ, by convention, to other databases you know. And lastly, you’ll receive some practical “where” and […]

Read more

A Simple MySQL Plugin to Retrieve System Metrics

MySQL Plugin to Retrieve System Metrics

Ever wanted to extend MySQL and add some feature you think it is missing?  With MySQL plugins, you can do exactly that.  One thing that has bothered me for several years is that you cannot easily retrieve system metrics from within MySQL.  Whether I am connecting via a remote connection or looking to add […]

Read more

MySQL Deadlocks Are Our Friends

MySQL Deadlocks

Why another article on this, Marco?
MySQL deadlocks is a topic covered many times, including here at Percona. I suggest you review the reference section at the end of this post for articles on how to identify deadlocks and from where they are generated.
So why another article?
The answer is that messages we receive like the […]

Read more