Vendor Lock-in: What It Is and How To Avoid It
Vendor lock-in. The term is inherently ominous, and a broad definition isn’t much cheerier. They both suggest limited or lost freedom. To determine whether that perception is warranted in the database...
View ArticleRestoring a Snapshot of a Sharded MongoDB Cluster to a Kubernetes-Based...
Many MongoDB clusters use storage-level snapshots to provide fast and reliable backups. In this blog post, you’ll learn how to restore such a snapshot from a traditional VM-based sharded MongoDB...
View ArticleUnderstanding Linux IOWait
I have seen many Linux Performance engineers looking at the “IOWait” portion of CPU usage as something to indicate whenever the system is I/O-bound. In this blog post, I will explain why this approach...
View ArticleMongoDB Best Practices: Security, Data Modeling, & Schema Design
In this blog post, we will discuss the best practices on the MongoDB ecosystem applied at the Operating System (OS) and MongoDB levels. We’ll also go over some best practices for MongoDB security as...
View ArticleProof of Concept: Horizontal Write Scaling for MySQL With Kubernetes Operator
Historically MySQL is great in horizontal READ scale. The scaling, in that case, is offered by the different number of Replica nodes, no matter if using standard asynchronous replication or synchronous...
View ArticleMongoDB 4.2 EOL… And Its Implications
Enjoy it while it lasts, as everything has its end.Maricon454688973982390893280398289038302380283’2233’832’23, CC BY-SA 4.0, via Wikimedia CommonsIt sounded a bit more cryptic than it was planned, but...
View ArticleMongoDB Database Backup: Best Practices & Expert Tips
This blog was originally published in September 2020 and was updated in May 2023.In today’s data-driven world, losing critical data can be catastrophic for any organization. As a MongoDB user, it’s...
View ArticleBackup and Restore with MyDumper on Docker
At the end of 2021, I pushed the first Docker image to hub.docker.com. This was the first official image and since then, we have been improving our testing and packaging procedures based on Docker,...
View ArticleMySQL Connection Security With Connection Control Plugins
As a database administrator, have you ever been in a situation when your database confronted a brute force attack? A brute force attack can be launched against a user account in MySQL. MySQL replies...
View ArticlePostgreSQL Performance Tuning: Optimizing Database Parameters for Maximum...
This blog was originally published in August 2018 and was updated in May 2023.Out of the box, the default PostgreSQL configuration is not tuned for any particular workload. Default values are set to...
View ArticleUpdates to Percona Distributions for PostgreSQL, Percona XtraDB Cluster,...
Percona is a leading provider of unbiased, performance-first, open source database solutions that allow organizations to easily, securely, and affordably maintain business agility, minimize risks, and...
View ArticleDisaster Recovery for PostgreSQL on Kubernetes
Disaster recovery is not optional for businesses operating in the digital age. With the ever-increasing reliance on data, system outages or data loss can be catastrophic, causing significant business...
View ArticleMigrating From MariaDB to Percona Server for MySQL 8: The Security Witchcraft
Hello friends, on certain occasions, some clients, for whatever reason, ask us to migrate a supposedly “equivalent” brand of an engine in terms of belonging to the MySQL family or ecosystem.In this...
View ArticlePowering the Web: Two Decades of Open Source Publishing With WordPress and MySQL
WordPress, the ubiquitous publishing platform that launched millions of blogs and websites, turned 20 on May 27th. While not the first open source content management system (CMS), WordPress caught on...
View ArticleConfiguring PgBouncer for Multi-Port Access
From time to time, situations occur where unusual circumstances dictate out-of-the-box thinking.For example, suppose you have a system where you’ve installed multiple data clusters onto a single host....
View ArticlePMM Authentication Bypass Vulnerability Fixed in 2.37.1
On May 30, Percona was notified of a possible vulnerability in Percona Monitoring and Management (PMM). After researching the report, we agreed with the reporter and began working on a fix to address...
View ArticleConquering Mt. Elbert After Percona Live 2023 in Denver
If you’re going to take on the second-highest peak in the lower 48 states, you might as well do it in great company. That’s precisely what we — Matthew Boehm, Michael Coburn, Péter Farkas,...
View ArticleUnleashing the Power of PostgreSQL Event-Based Triggers
PostgreSQL provides a powerful mechanism for implementing event-driven actions using triggers. Triggers on Data Definition Language (DDL) events are a powerful feature of PostgreSQL that allows you to...
View ArticlePostgreSQL Vacuuming Command to Optimize Database Performance
This blog post was originally published in January 2023 and was updated in June 2023.In PostgreSQL, the vacuum command is a maintenance task that helps to optimize database performance and reclaim disk...
View ArticleMonitoring a PostgreSQL Patroni Cluster
Percona Monitoring and Management (PMM) boasts many functionalities that support its extension, be it by using Custom Queries, Custom Scripts, or by collecting data from already available External...
View Article