MySQL 8.0.23 introduces many new improvements and updates, many of which deserve their own blog post for a deep dive into the new features. Among the notable changes are: Invisible columns, Query attributes, several new (security, InnoDB, GIS, Replication, Group replication, X Protocol, Router, MTR ...
MySQL Firewall is an enterprise security solution providing ease of mind while protecting your database from rogue queries. Sometimes granting wide-style access privileges may feel a bit too generous, and leaves you wondering whether you could do something more. Join us as we explore Firewall, and (in particular) using Group profiles.…
Facebook Twitter LinkedIn
In March 2020, my book MySQL 8 Query Performance Tuning (Apress) was
released. That book with its more than 900 pages in 27 chapters
covered a wide range of topics from executing benchmarks with
sysbench
over indexes and the optimizer to query
rewriting, replication, and caching. Some time later my editor
Jonathan Gennick suggested to take a limited set of the topics
and go into more detail. We settled on locks and transactions
which together have become MySQL Concurrency.
If you have already read MySQL 8 Query Performance Tuning, you may wonder what the new book offers compared to the previous one. In some way, you can think of MySQL Concurrency to be a second and expanded edition for the content on locks and transactions. Of course, given MySQL Concurrency is limited to those two topics, it has also been …
[Read more]There are several ways to deploy ProxySQL between your applications and the database servers. A common approach is to have a floating virtual IP (VIP) managed by keepalived as the application endpoint. The proxies have to be strategically provisioned to improve the resiliency of the solution (different hardware, network segments, etc,).
When we consider cloud environments, spreading instances across many availability zones (AZ) is considered a best practice, but that presents a problem regarding VIP handling.
Per definition, VPC subnets have to be created in a specific AZ, and subnet IP ranges can’t overlap with one another. An IP address cannot simply be moved to an instance on a different AZ, as it would end up in a subnet that doesn’t include it.
So in order to use the VIP method, we …
[Read more]The MySQL team is proud to announce the general availability of version 8.0.23 of the MySQL Shell.
In addition to a considerable number of bugs fixed, the following changes were introduced.
Improved Import Table
The importTable utility continues getting better, the following enhancements:
- Multiple file import: it is now supported to load a defined set of files into the same table, glob patterns can be used to determine the files to be loaded.
… Facebook Twitter LinkedIn
Percona XtraBackup 8.0.23 enables the “lock-ddl” option by default to ensure any DDL events do not corrupt the backups. Any DML events continue to occur, and only DDL events are blocked.
A DDL lock protects the definition of tables and views. With the “–lock-ddl” option disabled, Percona XtraBackup allows backups while concurrent DDL events continue to happen. These backups are invalid and fail at the Prepare stage. If DDL events have occurred without the backup user’s knowledge, they may be unaware the backup is corrupt.
MySQL 8.0 introduced “Lock Instance for Backup”. This backup lock is lightweight, and the performance for DML operations is almost the same with or without backup locks. This lock is not available in 5.7, because …
[Read more]CSV imports with MySQL Workbench, is super simple. Since CSV’s are probably the most common data interchange format, it goes without saying that importing CSV data into MySQL is a staple task for all DBA’s and Developers. Continue reading to learn how easy it is using MySQL Workbench…
Image by OpenClipart-Vectors from Pixabay
Self-Promotion:
If you enjoy the content written here, by all means, …
[Read more]Some believe the most important part of SQL is the ability to query data. Queries typically retrieve data by joining many tables together into useful result sets. This tutorial takes the position that visibility into the data helps those new to SQL understand how joins work. To that end, the queries use Common Tabular Expressions (CTEs) instead of tables.
Default behavior of a JOIN
without a qualifying
descriptor is not simple because it may return:
- A
CROSS JOIN
(or Cartesian Product) when there is noON
orUSING
subclause, or - An
INNER JOIN
when you use anON
orUSING
subclause.
The following query uses JOIN without a qualifier or an ON or USING subclause. It also uses two copies of the single CTE, which is more or less a derived table and the result of a subquery held in memory. This demonstrates the key …
[Read more]ProxySQL is proud to announce the latest release of ProxySQL version 2.0.16 on the 26th of January 2021
ProxySQL is a high performance, high availability, protocol aware proxy for MySQL, with a GPL license! It can be downloaded here or alternatively from the ProxySQL Repository, or the Docker image available on our Official ProxySQL Docker Repository. ProxySQL is freely usable and accessible according to the GNU GPL v3.0 license.
Release Overview Highlights
ProxySQL v2.0.16 is a patch release comprising of minor backward compatible changes and bug fixes. This release brings several fixes to ProxySQL’s Native Galera monitor, AWS Aurora and connection handling.
…
[Read more]Monitoring your RDS instances is very important, and the same applies to other resources. In this article, we will create a simple alarm for an RDS MySQL instance which will check for free storage space on the instance.