MySQL Enterprise Backup provides fast, consistent, online backups of MySQL databases. It allows for backing up InnoDB and MyISAM tables while the database is running, minimizing downtime. The tool takes physical backups of the data files rather than logical backups, allowing for very fast restore times compared to alternatives like mysqldump. It supports features like compressed backups, incremental backups, and point-in-time recovery.
MySQL 8.0 is the latest Generally Available version of MySQL. This session will help you upgrade from older versions, understand what utilities are available to make the process smoother and also understand what you need to bear in mind with the new version and considerations for possible behavior changes and solutions.
This document discusses enterprise software security and provides examples of how organizations like Accenture and ANZ Bank have implemented software security programs using Fortify's platform. It describes what organizations are protecting (e.g. personal information, financial data), the risks of data breaches, and case studies of past breaches at companies like Heartland Payment Systems. It then outlines how ANZ Bank established a "SAFE Program" using Fortify to integrate security practices into development and meet compliance obligations. The document promotes Fortify as a software security partner that can help achieve compliance, identify vulnerabilities, and effectively manage security programs.
Secure web programming plus end users' awareness are the last line of defense against attacks targeted at the corporate systems, particularly web applications, in the era of world-wide web.
Most web application attacks occur through Cross Site Scripting (XSS), and SQL Injection. On the other hand, most web application vulnerabilities arise from weak coding with failure to properly validate users' input, and failure to properly sanitize output while displaying the data to the visitors.
The literature also confirms the following web application weaknesses in 2010: 26% improper output handling, 22% improper input handling, and 15% insufficient authentication, and others.
Abdul Rahman Sherzad, lecturer at Computer Science Faculty of Herat University, and Ph.D. student at Technical University of Berlin gave a presentation at 12th IT conference on Higher Education for Afghanistan in MoHE, and then conducted a seminar at Hariwa Institute of Higher Education in Herat, Afghanistan introducing web application security threats by demonstrating the security problems that exist in corporate systems with a strong emphasis on secure development. Major security vulnerabilities, secure design and coding best practices when designing and developing web-based applications were covered.
The main objective of the presentation was raising awareness about the problems that might occur in web-application systems, as well as secure coding practices and principles. The presentation's aims were to build security awareness for web applications, to discuss the threat landscape and the controls users should use during the software development lifecycle, to introduce attack methods, to discuss approaches for discovering security vulnerabilities, and finally to discuss the basics of secure web development techniques and principles.
This document provides an overview of deploying and configuring the open source security information and event management (SIEM) solution OSSIM. It discusses setting up OSSEC host-based intrusion detection system agents, configuring syslog forwarding and enabling plugins, performing vulnerability scans of network assets, and demonstrates OSSIM's integrated capabilities. The document emphasizes that prevention alone is not sufficient and that detective controls are also needed to effectively detect and respond to security incidents across the network.
The document provides an overview of MongoDB administration including its data model, replication for high availability, sharding for scalability, deployment architectures, operations, security features, and resources for operations teams. The key topics covered are the flexible document data model, replication using replica sets for high availability, scaling out through sharding of data across multiple servers, and different deployment architectures including single/multi data center configurations.
WannaCry Ransomware Attack: What to Do NowIBM Security
View on-demand webinar: http://bit.ly/2qoNQ8v
What you need to know and how to protect against the WannaCry Ransomware Attack, the largest coordinated cyberattack of its kind. WannaCry has already crippled critical infrastructure and multiple hospitals and telecommunications organizations, infecting 100s of thousands of endpoints in over 100 countries. In this on-demand webinar, we discuss the anatomy of this unprecedented attack and IBM Researchers share expert insights into what you can do now to protect your organization from this attack and the next one.
Oracle Transparent Data Encryption (TDE) 12cNabeel Yoosuf
This presentation provides an introduction to Oracle Transparent Data Encryption technology in 12c. It is provided as part of Oracle Advanced Security.
MySQL 8.0 is the latest Generally Available version of MySQL. This session will help you upgrade from older versions, understand what utilities are available to make the process smoother and also understand what you need to bear in mind with the new version and considerations for possible behavior changes and solutions.
This document discusses enterprise software security and provides examples of how organizations like Accenture and ANZ Bank have implemented software security programs using Fortify's platform. It describes what organizations are protecting (e.g. personal information, financial data), the risks of data breaches, and case studies of past breaches at companies like Heartland Payment Systems. It then outlines how ANZ Bank established a "SAFE Program" using Fortify to integrate security practices into development and meet compliance obligations. The document promotes Fortify as a software security partner that can help achieve compliance, identify vulnerabilities, and effectively manage security programs.
Secure web programming plus end users' awareness are the last line of defense against attacks targeted at the corporate systems, particularly web applications, in the era of world-wide web.
Most web application attacks occur through Cross Site Scripting (XSS), and SQL Injection. On the other hand, most web application vulnerabilities arise from weak coding with failure to properly validate users' input, and failure to properly sanitize output while displaying the data to the visitors.
The literature also confirms the following web application weaknesses in 2010: 26% improper output handling, 22% improper input handling, and 15% insufficient authentication, and others.
Abdul Rahman Sherzad, lecturer at Computer Science Faculty of Herat University, and Ph.D. student at Technical University of Berlin gave a presentation at 12th IT conference on Higher Education for Afghanistan in MoHE, and then conducted a seminar at Hariwa Institute of Higher Education in Herat, Afghanistan introducing web application security threats by demonstrating the security problems that exist in corporate systems with a strong emphasis on secure development. Major security vulnerabilities, secure design and coding best practices when designing and developing web-based applications were covered.
The main objective of the presentation was raising awareness about the problems that might occur in web-application systems, as well as secure coding practices and principles. The presentation's aims were to build security awareness for web applications, to discuss the threat landscape and the controls users should use during the software development lifecycle, to introduce attack methods, to discuss approaches for discovering security vulnerabilities, and finally to discuss the basics of secure web development techniques and principles.
This document provides an overview of deploying and configuring the open source security information and event management (SIEM) solution OSSIM. It discusses setting up OSSEC host-based intrusion detection system agents, configuring syslog forwarding and enabling plugins, performing vulnerability scans of network assets, and demonstrates OSSIM's integrated capabilities. The document emphasizes that prevention alone is not sufficient and that detective controls are also needed to effectively detect and respond to security incidents across the network.
The document provides an overview of MongoDB administration including its data model, replication for high availability, sharding for scalability, deployment architectures, operations, security features, and resources for operations teams. The key topics covered are the flexible document data model, replication using replica sets for high availability, scaling out through sharding of data across multiple servers, and different deployment architectures including single/multi data center configurations.
WannaCry Ransomware Attack: What to Do NowIBM Security
View on-demand webinar: http://bit.ly/2qoNQ8v
What you need to know and how to protect against the WannaCry Ransomware Attack, the largest coordinated cyberattack of its kind. WannaCry has already crippled critical infrastructure and multiple hospitals and telecommunications organizations, infecting 100s of thousands of endpoints in over 100 countries. In this on-demand webinar, we discuss the anatomy of this unprecedented attack and IBM Researchers share expert insights into what you can do now to protect your organization from this attack and the next one.
Oracle Transparent Data Encryption (TDE) 12cNabeel Yoosuf
This presentation provides an introduction to Oracle Transparent Data Encryption technology in 12c. It is provided as part of Oracle Advanced Security.
Security, Availability and Integrity are top concerns around DNS. Infoblox Secure DNS
* provides a secure platform to host DNS services
* provides resilient DNS services even under attack ( like DNS DDoS, exploits )
* prevents data theft by malware/APT that uses DNS
* maintains DNS integrity that can otherwise be compromised by DNS hijacking
DB2 is a multi-platform database server that can scale from laptops to large systems handling terabytes of data. It provides tools for extending capabilities to support multimedia, is fully integrated for web access, and supports universal access and multiple platforms. The tutorial covered key DB2 concepts like instances, schemas, tables, and indexes. It demonstrated how to use Control Center and other GUIs to perform tasks like creating databases and tables, querying data, and setting user privileges. Java applications can also access DB2 data through JDBC.
This document provides an overview of new features and enhancements in MySQL 8.0 over the last 18 months, from versions 8.0.23 to 8.0.30. It discusses improvements to replication, Group Replication, InnoDB, and primary keys. Some key changes include a new InnoDB redo log architecture, support for disabling the redo log at runtime, parallel index builds, and the ability to add an invisible auto-increment primary key column to tables without a primary key. The document is presented by Frédéric Descamps at the MySQL User Group NL.
This month, Community IT presents basic IT security training for end users. Learn about common threats and the best techniques for dealing with them. This webinar is intended for a broad audience of both technical and non-technical staff.
This document provides training on cybersecurity best practices for Borough of West Chester personnel. It defines cybersecurity as protecting information and systems from unauthorized access, use, disclosure, disruption or destruction. It outlines common cyber threats like viruses, worms, ransomware, and social engineering. It emphasizes using strong passwords, antivirus software, firewalls, and regular software updates. It also recommends avoiding malicious emails and websites, and backing up important data.
This document provides an overview and introduction to MongoDB, an open-source, high-performance NoSQL database. It outlines MongoDB's features like document-oriented storage, replication, sharding, and CRUD operations. It also discusses MongoDB's data model, comparisons to relational databases, and common use cases. The document concludes that MongoDB is well-suited for applications like content management, inventory management, game development, social media storage, and sensor data databases due to its flexible schema, distributed deployment, and low latency.
FOSSASIA - MySQL Cookbook 4e Journey APR 2023.pdfAlkin Tezuysal
Presenting the newly released MySQL Cookbook 4th edition to help developers and administrators to understand simple to complex recipes.
MySQL Cookbook 4th edition was released this summer. We are the book's authors and will show you how to "cook" MySQL. We will show you a few tasks with different priorities, such as JSON in MySQL for those who need flexibility, modern SQL for analytics, and Group Replication for high availability. We will also show how to write programs using JavaScript and Python languages, X DevAPI, and MySQL Shell. We will touch on some of the exciting features of MySQL Spatial Indexes and Geographical Data, Using a Full-Text Search, and more. We're hoping this talk will interest developers and administrators of MySQL.
I'd like to share my authoring experience e and knowledge about an open-source database product MySQL. I also want to touch on this journey's technical and non-technical aspects giving vision and inspiration to future authors. At the end of the talk, I will give away one printed copy of the MySQL Cookbook 4e to an audience after a trivia question.
Creating Highly-Available MongoDB Microservices with Docker Containers and Ku...MongoDB
Speaker: Marco Bonezzi, Senior Technical Services Engineer, MongoDB
Level: 300 (Advanced)
Track: Microservices
Microservices architectures are becoming more popular and we see a trend towards smaller units of deployment based on containers. While most microservices need databases, implementing MongoDB on containers adds additional complexity: databases are stateful applications where data is critical. MongoDB is a complex distributed system with its own high availability implementation where using containers can expose additional risks.
In this session we will explore how to successfully define our database infrastructure with MongoDB running on Docker containers, how to orchestrate MongoDB containers with Kubernetes in multiple environments, considerations and strategies for managing stateful MongoDB containers, and how to manage high availability and resiliency in a distributed system while running on a container technology such as Kubernetes.
What You Will Learn:
- What to consider and how to maintain stateful databases in containers.
- How to configure deployment files, build a MongoDB deployment, and orchestrate it with Kubernetes, including how to test it on a laptop and then deploy it to Cloud.
- How to handle high availability in this environment, including data and application availability as well the additional error conditions the cloud and microservices introduce.
Highly efficient backups with percona xtrabackupNilnandan Joshi
Percona XtraBackup is an open source, free MySQL hot backup software that performs non-blocking backups for InnoDB and XtraDB databases. In this talk we'll describe below things.
- How it works with MySQL/Percona Server and what are the features provided
- Difference between Xtrabackup and Innobackupex
- How to take full/increment/partial backup and restore
- How to use features like streaming, compression, remote and compact backups
- How to troubleshoot the issue with xtrabackup
ElasticSearch introduction talk. Overview of the API, functionality, use cases. What can be achieved, how to scale? What is Kibana, how it can benefit your business.
The document provides an overview of ArcSight basics including event logging and log management. Key points include:
1) Devices generate event logs that record system activities and security events. ArcSight tools collect, analyze, correlate, and report on these logs to monitor network health, threats, and user activity.
2) ArcSight components include smart connectors that collect logs, a manager that correlates events and writes to the database, and a console for viewing reports and active channels.
3) The event life cycle involves collection, normalization, correlation, and monitoring phases. Events are analyzed in real-time and stored in the database for later reporting and investigation.
Analyzing MySQL Logs with ClickHouse, by Peter ZaitsevAltinity Ltd
This document discusses analyzing MySQL logs with ClickHouse. It describes how ClickHouse is fast, efficient, and easy to use for log analysis. Various options for loading MySQL logs into ClickHouse are presented, including using Logstash, Kafka, or writing your own loader. Specific examples covered include analyzing MySQL audit logs and slow query logs in ClickHouse for troubleshooting and performance insights. The document also briefly mentions using Percona Monitoring and Management for processed log monitoring and Grafana dashboards for ClickHouse.
Oracle is planning to release Oracle Database 12c in calendar year 2013. The new release will include a multitenant architecture that allows for multiple pluggable databases to be consolidated and managed within a single container database. This new architecture enables fast provisioning of new databases, efficient cloning of pluggable databases, simplified patching and upgrades applied commonly to all pluggable databases, and other benefits that improve database consolidation on cloud platforms.
The document discusses hunting for fileless malware using SysInternals tools and digital forensics techniques. It defines fileless malware as malicious code that infects a computer's dynamic memory rather than files. It then provides examples of hunting fileless malware by checking the boot chain for anomalous processes, gathering detailed information on suspicious processes, and analyzing RAM dumps to obtain indicators of compromise and behavioral details that can be confirmed with file system artifacts.
The document summarizes a presentation on the internals of InnoDB file formats and source code structure. The presentation covers the goals of InnoDB being optimized for online transaction processing (OLTP) with performance, reliability, and scalability. It describes the InnoDB architecture, on-disk file formats including tablespaces, pages, rows, and indexes. It also discusses the source code structure.
Amazon Aurora is a MySQL-compatible relational database engine that combines the speed and availability of high-end commercial databases with the simplicity and cost-effectiveness of open source databases. Amazon Aurora is disruptive technology in the database space, bringing a new architectural model and distributed systems techniques to provide far higher performance, availability and durability than previously available using conventional monolithic database techniques. In this session, we will do a deep-dive into some of the key innovations behind Amazon Aurora, discuss best practices and configurations, and share early customer experience from the field.
The document discusses various cybersecurity risks and best practices for protection. It notes that the internet allows attackers to strike from anywhere in the world. Poor security practices can enable identity theft, monetary theft, and legal issues. According to SANS.org, the top vulnerabilities are web browsers, IM clients, web applications, and excessive user rights. The document provides tips for protecting computers and data, such as using secure passwords, updating software, and practicing safe online behaviors. It also outlines common cyber attacks like viruses, worms, trojans, and social engineering and recommends defenses such as antivirus software, firewalls, and regular software updates.
Security, Availability and Integrity are top concerns around DNS. Infoblox Secure DNS
* provides a secure platform to host DNS services
* provides resilient DNS services even under attack ( like DNS DDoS, exploits )
* prevents data theft by malware/APT that uses DNS
* maintains DNS integrity that can otherwise be compromised by DNS hijacking
DB2 is a multi-platform database server that can scale from laptops to large systems handling terabytes of data. It provides tools for extending capabilities to support multimedia, is fully integrated for web access, and supports universal access and multiple platforms. The tutorial covered key DB2 concepts like instances, schemas, tables, and indexes. It demonstrated how to use Control Center and other GUIs to perform tasks like creating databases and tables, querying data, and setting user privileges. Java applications can also access DB2 data through JDBC.
This document provides an overview of new features and enhancements in MySQL 8.0 over the last 18 months, from versions 8.0.23 to 8.0.30. It discusses improvements to replication, Group Replication, InnoDB, and primary keys. Some key changes include a new InnoDB redo log architecture, support for disabling the redo log at runtime, parallel index builds, and the ability to add an invisible auto-increment primary key column to tables without a primary key. The document is presented by Frédéric Descamps at the MySQL User Group NL.
This month, Community IT presents basic IT security training for end users. Learn about common threats and the best techniques for dealing with them. This webinar is intended for a broad audience of both technical and non-technical staff.
This document provides training on cybersecurity best practices for Borough of West Chester personnel. It defines cybersecurity as protecting information and systems from unauthorized access, use, disclosure, disruption or destruction. It outlines common cyber threats like viruses, worms, ransomware, and social engineering. It emphasizes using strong passwords, antivirus software, firewalls, and regular software updates. It also recommends avoiding malicious emails and websites, and backing up important data.
This document provides an overview and introduction to MongoDB, an open-source, high-performance NoSQL database. It outlines MongoDB's features like document-oriented storage, replication, sharding, and CRUD operations. It also discusses MongoDB's data model, comparisons to relational databases, and common use cases. The document concludes that MongoDB is well-suited for applications like content management, inventory management, game development, social media storage, and sensor data databases due to its flexible schema, distributed deployment, and low latency.
FOSSASIA - MySQL Cookbook 4e Journey APR 2023.pdfAlkin Tezuysal
Presenting the newly released MySQL Cookbook 4th edition to help developers and administrators to understand simple to complex recipes.
MySQL Cookbook 4th edition was released this summer. We are the book's authors and will show you how to "cook" MySQL. We will show you a few tasks with different priorities, such as JSON in MySQL for those who need flexibility, modern SQL for analytics, and Group Replication for high availability. We will also show how to write programs using JavaScript and Python languages, X DevAPI, and MySQL Shell. We will touch on some of the exciting features of MySQL Spatial Indexes and Geographical Data, Using a Full-Text Search, and more. We're hoping this talk will interest developers and administrators of MySQL.
I'd like to share my authoring experience e and knowledge about an open-source database product MySQL. I also want to touch on this journey's technical and non-technical aspects giving vision and inspiration to future authors. At the end of the talk, I will give away one printed copy of the MySQL Cookbook 4e to an audience after a trivia question.
Creating Highly-Available MongoDB Microservices with Docker Containers and Ku...MongoDB
Speaker: Marco Bonezzi, Senior Technical Services Engineer, MongoDB
Level: 300 (Advanced)
Track: Microservices
Microservices architectures are becoming more popular and we see a trend towards smaller units of deployment based on containers. While most microservices need databases, implementing MongoDB on containers adds additional complexity: databases are stateful applications where data is critical. MongoDB is a complex distributed system with its own high availability implementation where using containers can expose additional risks.
In this session we will explore how to successfully define our database infrastructure with MongoDB running on Docker containers, how to orchestrate MongoDB containers with Kubernetes in multiple environments, considerations and strategies for managing stateful MongoDB containers, and how to manage high availability and resiliency in a distributed system while running on a container technology such as Kubernetes.
What You Will Learn:
- What to consider and how to maintain stateful databases in containers.
- How to configure deployment files, build a MongoDB deployment, and orchestrate it with Kubernetes, including how to test it on a laptop and then deploy it to Cloud.
- How to handle high availability in this environment, including data and application availability as well the additional error conditions the cloud and microservices introduce.
Highly efficient backups with percona xtrabackupNilnandan Joshi
Percona XtraBackup is an open source, free MySQL hot backup software that performs non-blocking backups for InnoDB and XtraDB databases. In this talk we'll describe below things.
- How it works with MySQL/Percona Server and what are the features provided
- Difference between Xtrabackup and Innobackupex
- How to take full/increment/partial backup and restore
- How to use features like streaming, compression, remote and compact backups
- How to troubleshoot the issue with xtrabackup
ElasticSearch introduction talk. Overview of the API, functionality, use cases. What can be achieved, how to scale? What is Kibana, how it can benefit your business.
The document provides an overview of ArcSight basics including event logging and log management. Key points include:
1) Devices generate event logs that record system activities and security events. ArcSight tools collect, analyze, correlate, and report on these logs to monitor network health, threats, and user activity.
2) ArcSight components include smart connectors that collect logs, a manager that correlates events and writes to the database, and a console for viewing reports and active channels.
3) The event life cycle involves collection, normalization, correlation, and monitoring phases. Events are analyzed in real-time and stored in the database for later reporting and investigation.
Analyzing MySQL Logs with ClickHouse, by Peter ZaitsevAltinity Ltd
This document discusses analyzing MySQL logs with ClickHouse. It describes how ClickHouse is fast, efficient, and easy to use for log analysis. Various options for loading MySQL logs into ClickHouse are presented, including using Logstash, Kafka, or writing your own loader. Specific examples covered include analyzing MySQL audit logs and slow query logs in ClickHouse for troubleshooting and performance insights. The document also briefly mentions using Percona Monitoring and Management for processed log monitoring and Grafana dashboards for ClickHouse.
Oracle is planning to release Oracle Database 12c in calendar year 2013. The new release will include a multitenant architecture that allows for multiple pluggable databases to be consolidated and managed within a single container database. This new architecture enables fast provisioning of new databases, efficient cloning of pluggable databases, simplified patching and upgrades applied commonly to all pluggable databases, and other benefits that improve database consolidation on cloud platforms.
The document discusses hunting for fileless malware using SysInternals tools and digital forensics techniques. It defines fileless malware as malicious code that infects a computer's dynamic memory rather than files. It then provides examples of hunting fileless malware by checking the boot chain for anomalous processes, gathering detailed information on suspicious processes, and analyzing RAM dumps to obtain indicators of compromise and behavioral details that can be confirmed with file system artifacts.
The document summarizes a presentation on the internals of InnoDB file formats and source code structure. The presentation covers the goals of InnoDB being optimized for online transaction processing (OLTP) with performance, reliability, and scalability. It describes the InnoDB architecture, on-disk file formats including tablespaces, pages, rows, and indexes. It also discusses the source code structure.
Amazon Aurora is a MySQL-compatible relational database engine that combines the speed and availability of high-end commercial databases with the simplicity and cost-effectiveness of open source databases. Amazon Aurora is disruptive technology in the database space, bringing a new architectural model and distributed systems techniques to provide far higher performance, availability and durability than previously available using conventional monolithic database techniques. In this session, we will do a deep-dive into some of the key innovations behind Amazon Aurora, discuss best practices and configurations, and share early customer experience from the field.
The document discusses various cybersecurity risks and best practices for protection. It notes that the internet allows attackers to strike from anywhere in the world. Poor security practices can enable identity theft, monetary theft, and legal issues. According to SANS.org, the top vulnerabilities are web browsers, IM clients, web applications, and excessive user rights. The document provides tips for protecting computers and data, such as using secure passwords, updating software, and practicing safe online behaviors. It also outlines common cyber attacks like viruses, worms, trojans, and social engineering and recommends defenses such as antivirus software, firewalls, and regular software updates.
This document discusses using EXPLAIN to optimize queries in MySQL. It covers traditional, structured, and visualized EXPLAIN outputs. Traditional EXPLAIN can be complex and difficult to understand for complex queries. Structured EXPLAIN (with FORMAT=JSON) and visualized EXPLAIN in tools like MySQL Workbench provide more detailed and easier to understand outputs. The document also provides examples of using EXPLAIN for single table queries, index usage, range optimizations, and index merges.
This document provides an overview and summary of updates and new features in MySQL 5.6:
- MySQL 5.6 improves performance, scalability, instrumentation, transactional throughput, availability, and flexibility compared to previous versions.
- Key areas of focus include improvements to InnoDB for transactional workloads, replication for high availability and data integrity, and the optimizer for better performance and diagnostics.
- New features in MySQL 5.6 include enhanced replication utilities for high availability, improved subquery and index optimizations in the query optimizer, and expanded performance schema instrumentation for database profiling.
Overview of Optimizer Features in 5.6 and 5.7-Manyi Lu郁萍 王
The document discusses improvements to the MySQL optimizer in versions 5.6 and 5.7. Some key improvements include better handling of subqueries, optimization of queries with small LIMIT values, use of multi-range reads to improve join performance, persisting optimizer statistics, showing EXPLAIN output in JSON format, and using condition filtering to more accurately estimate costs. The optimizer is important for efficiently designing schemas and queries.
The document discusses MySQL 5.7's new GIS features, including integrating the Boost.Geometry library for geometry representation and comparisons, adding spatial indexes to InnoDB for faster spatial queries, supporting GeoJSON and additional functions, and providing examples of using spatial data from OpenStreetMap for proximity searches of restaurants near a given location.
This document discusses indexing strategies in MySQL to improve performance and concurrency. It covers how indexes can help avoid lock contention on tables by enabling concurrent queries to access and modify different rows. However, indexes can also cause deadlocks in some situations. The document outlines several cases exploring how indexes impact locking, covering indexes, sorting and query plans.
The technology has almost written off MySQL as a database for new fancy NoSQL databases like MongoDB and Cassandra or even Hadoop for aggregation. But MySQL has a lot to offer in terms of 'ACID'ity, performance and simplicity. For many use-cases MySQL works well. In this week's ShareThis workshop we discuss different tips & techniques to improve performance and extend the lifetime of your MySQL deployment.
This document provides tips for tuning a MySQL database to optimize performance. It discusses why tuning is important for cost effectiveness, performance, and competitive advantage. It outlines who should be involved in tuning including application designers, developers, DBAs and system administrators. The document covers what can be tuned such as applications, databases structures, and hardware. It provides best practices for when and how much to tune a database. Specific tuning techniques are discussed for various areas including application development, database design, server configuration, and storage engine optimizations.
MySQL Enterprise Backup provides fast, consistent, online backups of MySQL databases. It allows for full and incremental backups, compressed backups to reduce storage needs, and point-in-time recovery. MySQL Enterprise Backup works by backing up InnoDB data files, copying and compressing the files, and backing up the transaction log files from the time period when the data files were copied. This allows for consistent backups and point-in-time recovery of the database.
Presentation backup and recovery best practices for very large databases (v...xKinAnx
This document provides best practices for backup and recovery of very large databases (VLDBs). It discusses VLDB trends requiring databases to scale to terabytes and beyond. The key is protecting growing data while maintaining cost efficiency. The presentation covers assessing recovery requirements, architecting backup environments, leveraging Oracle tools, planning data layout, developing backup procedures, and recovery strategies. It also provides a Starbucks case study example.
Power point presentation on backup and recovery.
A good presentation cover all topics.
For any other type of ppt's or pdf's to be created on demand contact -dhawalm8@gmail.com
mob. no-7023419969
This document discusses backup and recovery strategies for Oracle Exadata systems. It provides an overview of using Recovery Manager (RMAN) to manage backups and outlines several backup destination options for Exadata, including storing backups on Exadata storage, external disk storage like the ZFS Storage Appliance, or tape libraries. The document also reviews considerations for designing an Exadata backup and recovery solution, including sizing backups and choosing retention policies based on recovery time and data loss objectives.
A Backup Today Saves Tomorrow is a presentation from Percona Live 2013 that provides insight into planning and the tools used today to capture MySQL backups.
Exchange Server 2013 : les mécanismes de haute disponibilité et la redondance...Microsoft Technet France
La nouvelle version d'Exchange Server 2013 intègre une foule de nouveautés lui permettant d'être aujourd'hui le serveur de messagerie le plus sécurisé et le plus fiable sur le marché. L'expérience acquise par la gestion des solutions de messagerie Cloud par les équipes Microsoft a été directement intégrée dans cette nouvelle version du produit ce qui va vous permettre la mise en place d'un système de messagerie ultra résilient. Scott Schnoll, Principal Technical Writer dans l'équipe Exchange à Microsoft Corp va vous expliquer de manière didactique l'ensemble des mécanismes de haute disponibilité et les solutions de resilience inter sites dans les plus petits détails. Venez apprendre directement par l'expert qui a travaillé sur ces sujets chez Microsoft ! Attention, session très technique, en anglais.
RMAN uses backups to clone databases, which takes time and storage space. Delphix clones databases virtually by linking to a source and sharing blocks, allowing near-instant clones that use minimal storage. The document compares RMAN and Delphix approaches to cloning databases for development environments.
The document discusses data and database administration. It covers:
1) The functions of data administration including data policies, planning, and managing the information repository.
2) The functions of database administration including hardware/software selection, performance tuning, security, backups, and recovery.
3) Techniques for managing data security including views, integrity controls, authorization rules, encryption, and authentication.
4) The importance of regularly backing up databases and using journaling facilities to facilitate recovery in case of data loss or damage.
Session from SQLDay 2016 Conference in Wroclaw.
2 AM. We're sleeping well and our mobile is ringing and ringing. Message: DISASTER! In this session (on slides) we are NOT talking about the potential disaster (such BCM); we talk about: What happened NOW? Which tasks should have been finished BEFORE. Does virtual or physical SQL Server matter? We talk about systems, databases, people, encryption, passwords, certificates and users. In this session (on few demos) I'll show which part of our SQL Server environment are critical and how to be prepared for disaster. In some documents, I'll show You how to be BEST prepared.
• We sleeping well. And our mobile ringing and ringing. Message: DISASTER! In this session (on slides) we are NOT talk about potential disaster (such BCM); we talk about: And what NOW? New version old my old well-known session updated for whole changes which happened in DBA World in last two-three years.
• So, from the ground to the Sky and further - everything for surviving disaster. Which tasks should have been finished BEFORE. Is virtual or physical SQL matter? We talk about systems, databases, peoples, encryption, passwords, certificates and users.
• In this session (on few demos) I'll show which part of our SQL Server Environment are critical and how to be prepared to disaster. In some documents I'll show You how to be BEST prepared.
Backing up your virtual environment best practicesInterop
- Image-based backups provide faster and more efficient protection of virtual environments compared to traditional agent-based backups. With image-based backups, entire virtual machines are captured in binary image files.
- There are two methods for image-based backups - direct-to-target which has better performance and proxy-based which can preserve SAN investments.
- Best practices for backups include implementing weekly or bi-weekly full backups and daily incremental backups, with additional snapshots, replication, and off-site storage for critical systems based on recovery SLAs. A tiered approach is needed for large environments.
This document discusses various methods for performing database backups, including Recovery Manager (RMAN), Oracle Secure Backup, and user-managed backups. It covers key backup concepts like full versus incremental backups, online versus offline backups, and image copies versus backup sets. The document also provides instructions on configuring backup settings and scheduling automated database backups using RMAN and Enterprise Manager.
This document discusses best practices for improving backup and recovery of Oracle Exadata databases. It recommends using the Sun ZFS Backup Appliance for fast, direct backups of Exadata to disk using RMAN, and then optionally copying backups to tape for long term storage. Using the Sun ZFS Backup Appliance avoids the need to change current backup procedures, provides end-to-end data integrity checking, and allows restoring data directly from disk for the fastest recovery times. Oracle support services are also discussed.
This document discusses best practices for preparing for and responding to a disaster involving critical IT systems like servers and databases. It emphasizes the importance of regular backups, having recovery procedures documented, testing restores, and defining roles and responsibilities of team members. It provides guidance on backup strategies for SQL Server and SharePoint, including using different types of backups, storing backups offline, and setting backup schedules. It also stresses the value of preparation, being ready to restore from backups, and having contact information and credentials documented in advance in case of an emergency.
The document discusses the capabilities of RMAN, the Oracle database backup and recovery tool. It notes that RMAN offers flexibility, knowledge of database internals, data file checking, and quick recovery and cloning processes. While the syntax can be complex and there is a lack of practical knowledge, RMAN allows for efficient backups in various forms including incremental, retention settings, compression, and automatic control file backups. RMAN scripts can implement backup schedules and perform cleanup of backups and archive logs. RMAN also enables restore, recovery, point-in-time recovery, and bare database recovery. Control files store limited backup information locally while catalogs centralize information but require a catalog database.
This document discusses various concepts related to ensuring adequate performance of IT infrastructure. It covers perceived performance from an end user perspective and how to account for performance during infrastructure design. Methods discussed for evaluating performance during the design phase include benchmarking, leveraging vendor experience, prototyping, and user profiling. The document also addresses managing performance of running systems through techniques like performance testing, identifying and addressing bottlenecks, leveraging caching, and scaling infrastructure through vertical and horizontal expansion approaches like load balancing.
High availability and disaster recovery in IBM PureApplication SystemScott Moonen
This document discusses high availability and disaster recovery strategies for IBM PureApplication System. It begins with definitions of key terms like HA, DR, RTO, and RPO. It then outlines the various tools in PureApplication System that can be used to achieve HA and DR, such as compute node availability, block storage, storage replication, and external storage. The document provides examples of how to compose these tools to meet different HA and DR scenarios, like handling compute node failures, database updates, and site failures. It concludes with some caveats around networking considerations and middleware-specific factors.
This document provides an agenda and overview for a MySQL Cluster workshop. The agenda covers basics of MySQL, high availability options, an overview of MySQL Cluster, installation, configuration, programs, management and replication in MySQL Cluster. The document then goes into more detail on the basics of MySQL architecture and components, different high availability architectures in MySQL including master-slave, master-master and MySQL Cluster. It provides terminology and components used in MySQL Cluster including management nodes, data nodes, SQL nodes and APIs. It discusses different installation methods for MySQL Cluster including the auto-installer, traditional method and MySQL Cluster Manager.
From Nice to Have to Mission Critical: MySQL Enterprise Edition郁萍 王
This document outlines an agenda for a presentation on MySQL Enterprise Edition. The agenda includes an introduction to MySQL, discussing data in the modern enterprise, an overview of MySQL Enterprise Edition, Oracle product integrations and certifications, opportunities for learning more, and a question and answer session. It also includes a safe harbor statement indicating the product direction outlines are for information purposes only and not binding commitments.
The document discusses the benefits of meditation for reducing stress and anxiety. Regular meditation practice can help calm the mind and body by lowering heart rate and blood pressure. Making meditation a part of a daily routine, even if just 10-15 minutes per day, can have mental and physical health benefits over time by reducing stress levels and promoting relaxation.
The document discusses the benefits of exercise for mental health. Regular physical activity can help reduce anxiety and depression and improve mood and cognitive function. Exercise causes chemical changes in the brain that may help protect against developing mental illness and improve symptoms for those who already suffer from conditions like anxiety and depression.
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyScyllaDB
Freshworks creates AI-boosted business software that helps employees work more efficiently and effectively. Managing data across multiple RDBMS and NoSQL databases was already a challenge at their current scale. To prepare for 10X growth, they knew it was time to rethink their database strategy. Learn how they architected a solution that would simplify scaling while keeping costs under control.
Discover top-tier mobile app development services, offering innovative solutions for iOS and Android. Enhance your business with custom, user-friendly mobile applications.
Essentials of Automations: Exploring Attributes & Automation ParametersSafe Software
Building automations in FME Flow can save time, money, and help businesses scale by eliminating data silos and providing data to stakeholders in real-time. One essential component to orchestrating complex automations is the use of attributes & automation parameters (both formerly known as “keys”). In fact, it’s unlikely you’ll ever build an Automation without using these components, but what exactly are they?
Attributes & automation parameters enable the automation author to pass data values from one automation component to the next. During this webinar, our FME Flow Specialists will cover leveraging the three types of these output attributes & parameters in FME Flow: Event, Custom, and Automation. As a bonus, they’ll also be making use of the Split-Merge Block functionality.
You’ll leave this webinar with a better understanding of how to maximize the potential of automations by making use of attributes & automation parameters, with the ultimate goal of setting your enterprise integration workflows up on autopilot.
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsDianaGray10
Join us to learn how UiPath Apps can directly and easily interact with prebuilt connectors via Integration Service--including Salesforce, ServiceNow, Open GenAI, and more.
The best part is you can achieve this without building a custom workflow! Say goodbye to the hassle of using separate automations to call APIs. By seamlessly integrating within App Studio, you can now easily streamline your workflow, while gaining direct access to our Connector Catalog of popular applications.
We’ll discuss and demo the benefits of UiPath Apps and connectors including:
Creating a compelling user experience for any software, without the limitations of APIs.
Accelerating the app creation process, saving time and effort
Enjoying high-performance CRUD (create, read, update, delete) operations, for
seamless data management.
Speakers:
Russell Alfeche, Technology Leader, RPA at qBotic and UiPath MVP
Charlie Greenberg, host
What is an RPA CoE? Session 1 – CoE VisionDianaGray10
In the first session, we will review the organization's vision and how this has an impact on the COE Structure.
Topics covered:
• The role of a steering committee
• How do the organization’s priorities determine CoE Structure?
Speaker:
Chris Bolin, Senior Intelligent Automation Architect Anika Systems
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...Jason Yip
The typical problem in product engineering is not bad strategy, so much as “no strategy”. This leads to confusion, lack of motivation, and incoherent action. The next time you look for a strategy and find an empty space, instead of waiting for it to be filled, I will show you how to fill it in yourself. If you’re wrong, it forces a correction. If you’re right, it helps create focus. I’ll share how I’ve approached this in the past, both what works and lessons for what didn’t work so well.
Your One-Stop Shop for Python Success: Top 10 US Python Development Providersakankshawande
Simplify your search for a reliable Python development partner! This list presents the top 10 trusted US providers offering comprehensive Python development services, ensuring your project's success from conception to completion.
Session 1 - Intro to Robotic Process Automation.pdfUiPathCommunity
👉 Check out our full 'Africa Series - Automation Student Developers (EN)' page to register for the full program:
https://bit.ly/Automation_Student_Kickstart
In this session, we shall introduce you to the world of automation, the UiPath Platform, and guide you on how to install and setup UiPath Studio on your Windows PC.
📕 Detailed agenda:
What is RPA? Benefits of RPA?
RPA Applications
The UiPath End-to-End Automation Platform
UiPath Studio CE Installation and Setup
💻 Extra training through UiPath Academy:
Introduction to Automation
UiPath Business Automation Platform
Explore automation development with UiPath Studio
👉 Register here for our upcoming Session 2 on June 20: Introduction to UiPath Studio Fundamentals: https://community.uipath.com/events/details/uipath-lagos-presents-session-2-introduction-to-uipath-studio-fundamentals/
Fueling AI with Great Data with Airbyte WebinarZilliz
This talk will focus on how to collect data from a variety of sources, leveraging this data for RAG and other GenAI use cases, and finally charting your course to productionalization.
inQuba Webinar Mastering Customer Journey Management with Dr Graham HillLizaNolte
HERE IS YOUR WEBINAR CONTENT! 'Mastering Customer Journey Management with Dr. Graham Hill'. We hope you find the webinar recording both insightful and enjoyable.
In this webinar, we explored essential aspects of Customer Journey Management and personalization. Here’s a summary of the key insights and topics discussed:
Key Takeaways:
Understanding the Customer Journey: Dr. Hill emphasized the importance of mapping and understanding the complete customer journey to identify touchpoints and opportunities for improvement.
Personalization Strategies: We discussed how to leverage data and insights to create personalized experiences that resonate with customers.
Technology Integration: Insights were shared on how inQuba’s advanced technology can streamline customer interactions and drive operational efficiency.
How information systems are built or acquired puts information, which is what they should be about, in a secondary place. Our language adapted accordingly, and we no longer talk about information systems but applications. Applications evolved in a way to break data into diverse fragments, tightly coupled with applications and expensive to integrate. The result is technical debt, which is re-paid by taking even bigger "loans", resulting in an ever-increasing technical debt. Software engineering and procurement practices work in sync with market forces to maintain this trend. This talk demonstrates how natural this situation is. The question is: can something be done to reverse the trend?
The Microsoft 365 Migration Tutorial For Beginner.pptxoperationspcvita
This presentation will help you understand the power of Microsoft 365. However, we have mentioned every productivity app included in Office 365. Additionally, we have suggested the migration situation related to Office 365 and how we can help you.
You can also read: https://www.systoolsgroup.com/updates/office-365-tenant-to-tenant-migration-step-by-step-complete-guide/
Monitoring and Managing Anomaly Detection on OpenShift.pdfTosin Akinosho
Monitoring and Managing Anomaly Detection on OpenShift
Overview
Dive into the world of anomaly detection on edge devices with our comprehensive hands-on tutorial. This SlideShare presentation will guide you through the entire process, from data collection and model training to edge deployment and real-time monitoring. Perfect for those looking to implement robust anomaly detection systems on resource-constrained IoT/edge devices.
Key Topics Covered
1. Introduction to Anomaly Detection
- Understand the fundamentals of anomaly detection and its importance in identifying unusual behavior or failures in systems.
2. Understanding Edge (IoT)
- Learn about edge computing and IoT, and how they enable real-time data processing and decision-making at the source.
3. What is ArgoCD?
- Discover ArgoCD, a declarative, GitOps continuous delivery tool for Kubernetes, and its role in deploying applications on edge devices.
4. Deployment Using ArgoCD for Edge Devices
- Step-by-step guide on deploying anomaly detection models on edge devices using ArgoCD.
5. Introduction to Apache Kafka and S3
- Explore Apache Kafka for real-time data streaming and Amazon S3 for scalable storage solutions.
6. Viewing Kafka Messages in the Data Lake
- Learn how to view and analyze Kafka messages stored in a data lake for better insights.
7. What is Prometheus?
- Get to know Prometheus, an open-source monitoring and alerting toolkit, and its application in monitoring edge devices.
8. Monitoring Application Metrics with Prometheus
- Detailed instructions on setting up Prometheus to monitor the performance and health of your anomaly detection system.
9. What is Camel K?
- Introduction to Camel K, a lightweight integration framework built on Apache Camel, designed for Kubernetes.
10. Configuring Camel K Integrations for Data Pipelines
- Learn how to configure Camel K for seamless data pipeline integrations in your anomaly detection workflow.
11. What is a Jupyter Notebook?
- Overview of Jupyter Notebooks, an open-source web application for creating and sharing documents with live code, equations, visualizations, and narrative text.
12. Jupyter Notebooks with Code Examples
- Hands-on examples and code snippets in Jupyter Notebooks to help you implement and test anomaly detection models.
2. The preceding is intended to outline our general
product direction. It is intended for information
purposes only, and may not be incorporated into any
contract. It is not a commitment to deliver any
material, code, or functionality, and should not be
relied upon in making purchasing decisions.
The development, release, and timing of any
features or functionality described for Oracle’s
products remains at the sole discretion of Oracle.
5. DBA Challenge
• Core responsibility for backup and recovery
• But, its not easy
– Databases are growing exponentially
– Backup times are increasing even faster
• Your Backups impact other activities
– End Users
– DBA Maintenance
• And your storage costs are out of control
• And when bad things happen
• Needs to work
• Taking forever to recover
6. Database Backup: Terms
• Online Backup (aka “Hot” or “Online”)
– Backup while database is running
– Zero business interruption during backups
• Incremental Backup
– Backup of data that has changed since the last full backup.
• Partial Backup
– Backup of select tables
• Consistent Point in Time Recovery
– Restoring a database with data in a consistent state at a date
and time
• Roll Forward Recovery
– Recovery that restores a database to a specific date and
time.
7. Most Critical Questions to Ask First
• What are my recovery requirements?
– Assess tolerance for data loss: Recovery Point Objective (RPO)
• How frequently should backups be taken?
• Is point-in-time recovery required?
– Assess tolerance for downtime: Recovery Time Objective (RTO)
• Downtime: Problem identification + recovery planning +
systems recovery
• Tiered RTO per level of granularity, e.g. database, tablespace,
table, row
– Determine backup retention policy
• Onsite, offsite, long-term
• How Does MySQL Enterprise Backup strategy fulfill
those requirements?
8. Backup Method 1: Full
• Well Suited for:
– Databases that can tolerate hours/days RTO
– Medium-High change between backups (e.g. over 30%)
– Environments where disk can be allocated for 1x size of database
• Backup Strategy
– Full backups with optional backup compression
– Full backup archived to tape, as needed
9. Backup Method 2: Full + Incremental
• Well suited for
– Databases that can tolerate no more than a few hours RTO
– Environments where disk can be allocated for 1x size of database
• Backup strategy
–
–
–
–
Occasional Full backup, followed by more frequent incremental
To recover - apply Full and then applying 1 or more Incremental
Full backups archived to tape, as needed
Incremental Backups retained on-disk, as needed
10. Backup Method 3: Full + Incremental + Log
• Well suited for
– Databases that can tolerate no more than a few minutes RTO
– Environments where disk can be allocated for more than1x size of
database
• Backup strategy
–
–
–
–
–
–
Initial full backup, followed by incremental backups
Backup Transaction Logs
To recover - apply Full and then applying 1 or more Incremental
Finally Roll Forward with Transaction Log to “minute” desired.
Full backups and incrementals archived to tape, as needed
Logs are backup up and retained on-disk, as needed
11. Backup Method 4: Offload Backups to Slave
(Replication)
• Well Suited for:
– Databases that require no more than several minutes of
recovery time, in event of failure
– Environments that can preferably allocate symmetric
hardware and storage for physical standby database
– Environments whose backup storage infrastructure can be
shared between master and slave database sites
• Backup Strategy
–
–
–
–
–
Setup Master / Slave replication
Slave acts as physical standby database
Run full and incremental backup on slave
Backup can be restored to master or slave database
Backups can be taken at each database for optimal
protection
12. Determining Backup Strategy
Low Value Data
High Value Data
F: Daily
A: Replication,
Backup on Slave
F: Weekly
I: Daily
F: Daily
F: Daily
I: Hourly
I: Hourly
Low Change
Change Frequency
I: Hourly
A: Binlog Backups: 5 min
F: Monthly
F: Full
I: Incremental
A: Additional
I: Weekly
F: Weekly
I: Daily
F: Monthly
Value of Data
High Change
13. Backup Strategies Comparison
Method
Backup Factors
Recovery Factors
Method 1:
Full Backups
• Longest Backup Times
• Largest Storage Space
• Save space with compression
• Easy to Recover
• Fastest Restore Times
Method 2:
Full + Incremental
Backup
• Shortest Backup Time
• Reduced Storage Requirements
• Requires 1X production storage
for copy
• Finer-grained Recovery
• Slower Restore Times
• First Restore Full Backup
• Then Restore Incrementals
Method 3:
Full + Incremental +
Log Backup
• Added Storage Requirements
• Requires more than 1X
production storage for copy
• Finest-grained Recovery
• Slowest Restore Times
• First Restore Full Backup
• Then Restore Incrementals
• Then Apply Logs
Method 4:
• Used with 1 of the above
Offload Backups Slave • Frees Master for more workload
Replication
• Requires 1X production hardware
and storage for standby database
• Fast failover to standby
• Backups are last resort, in
event of double site failure
or need to perform PITR
17. MySQL Enterprise Backup
•
•
•
•
•
•
•
•
•
•
Online Backup for InnoDB
Support for MyISAM (Read-only)
High Performance Backup & Restore
Compressed Backup
Full Backup
Incremental Backup
Partial Backups
Point in Time Recovery
Unlimited Database Size
Cross-Platform
– Windows, Linux, Unix
18. Benefits
• Online “Hot” Backup (Non-blocking)
– Reads and Writes to InnoDB
– Reads for MyISAM tables
• High Performance
– Backup: >3x faster than mysqldump (export)
– Restore: >10x than mysqldump recovery
• Consistent Backups
– Point in Time Recovery
• Compression
– Multi-level compression
– Save 70% or more of the storage required
19. Benefits
• Reliable
– Proven for 7+ Years
• Scalable for Large Databases
– No Database Size Limitations
• Easy to automate
– Easily integrate within various scheduling systems
– Examples: cron, OSB scheduler, others
20. MySQL Enterprise Backup 3.5: New Features
• Incremental backup
• Support of InnoDB Barracuda file format
• Backup of compressed tables
• Backup of partition files
• Backup of in-memory database
• with --exec-when-locked option
• Adds mysql system tables to keep backup status,
progress, and history
22. High Performance Restore
Restore is up to 16x Faster than MySQL Dump
- mysqldump performance is non-linear (more table/indexes impacts performance)
- MySQL Enterprise performance is near linear
25. MySQL Backup Tools
•
Hot Backup (online)
– MySQL Enterprise Backup
•
Export/Import (portable copies – a logical backup)
– mysqldump
•
Standby Copy (hot swap)
•
•
MySQL Replication
Cold Backup (offline)
– Simple File Copies when server is shutdown
•
File System Volume Managers (snapshots)
– LVM for example - create snapshot copy
26. mysqldump
• Advantages
– Good for small databases or tables
– Good assurance that database files are not corrupt
– Logical Backup – thus flexible and portable
• Disadvantages
– Very slow restore times
– Uses database processing cycles and resources
– Not Online (requires Transaction or Locks on Tables in the
database)
– Not Incremental (requires a Full Backup every time)
– Not Consistent (unless transaction is used)
27. MySQL Replication
• Advantages
–
–
–
–
Rolling “snapshot”
Quick Recovery - via failover
Non-Blocking
Works well in conjunction with other backup options
• Disadvantages
–
–
–
–
Only latest “Point in Time” (point it time keeps moving forward)
Not historical
Not for archival purposes
Doesn’t protect from “oops”
28. LVM Snapshots
• Advantages
– Quick
– Feature of Linux
– Good to use in conjunction with backups
• Disadvantages
– It’s a snapshot
– Still need to make a backup copy – which is “full” in size
– Performance degrades with each concurrent snapshot
– Snapshots need to be released
– Cross File System Limitations
29. MySQL Enterprise Backup
• Advantages
–
–
–
–
–
–
Physical Backup so Fast – esp. restores
Flexible - many options
Archival
Scalable
Consistent
Supported
• Disadvantages
• Requires some planning
30. MySQL Backup Types: Comparison
mysqldump
LVM Snapshots
MySQL
Replication
MySQL Enterprise
Backup
Full Backup
✔
✔
✔
✔
Incremental
Backups
✖
✔
✖
✔
Partial Backups
✔
✖
✖
✔
Compression
Support
✖
✖
✖
✔
Allows updates
✖
✖
✔
✔
Point in Time Consistent
✖
✔
✔
✔
Backup Speed
Poor
Good
Very Good
Very Good
Very Poor
Good
Very Good
Very Good
Partial Restore
✔
✖
✖
✔
Corruption
Detection
✔
✖
✖
✔
Meets Regulatory
Archive Req.
✔
✖
✖
✔
Supports DDL
✔
✖
✖
✔
Recovery Speed
32. MySQL Enterprise Backup
• MySQL Enterprise Backup CLI
• MySQL Enterprise Monitor
• Oracle Secure Backup
Intrinsic knowledge of
database file formats
• Block Validation
Media Manager
(like Oracle Secure Backup)
• Tablespace/Data file
recovery
• Unused Block
Compression
• Consistent Recovery
• File Compression
Database
Quickly
Accessible
Disk Storage
Tape
Archive
33. MySQL Enterprise Backup: Terms
• mysqlbackup : backup executable which includes InnoDB, MyISAM
and other MySQL Data. mysqlbackup is a compatible replacement
for the innobackup post 3.5.1 and includes additional features and
capabilites
• ibbackup: finer grained raw innodb backup executable for innodb
files alone
• binlog: contains database changes – eg DDL and DML
• LSN: Log Sequence Number – the unique monotonically increasing
id for each change in the binlog
• Ibdata: system tablespace files
• .ibd: single table space file
34. How it Works: Backup for InnoDB
• Step 1: Backing Up InnoDB Data Files
– Copies and compresses InnoDB data files
• System Database (ibdata) & Single-table Tablespaces (.ibd)
– Produces “Fuzzy Backup
• Backup of data files doesn’t correspond to any specific log
sequence number (LSN)
• Different database pages are copied at varying times
ibbackup
1. InnoDB
Tables & Indexes
MEB Backup
Files
MySQL
Database
Files
35. How it Works: Backing Up InnoDB Data Files
Newest LSN
InnoDB
data
file
compressed
data file
L
S
N
data
L
S
N
L
S
N
data
data
L
S
N
L
S
N
data
Oldest LSN
data
L
S
N
data
L
S
N
L
S
N
data
data
L
S
N
L
S
N
data
data
L
S
N
data
L
S
N
data
L
S
N
L
S
N
data
data
• Backup files size is reduced by 70%
– Omits unused storage in each block, empty pages
• Produces “Fuzzy Backup”
• Notes earliest and latest Log Sequence Number (LSN)
36. How it Works: Backup for InnoDB
• Step 2: Backing up InnoDB Log Files
– Copies Log Records accumulated during data file copy
– All redo records with LSNs during data file copy
ibbackup
1. InnoDB
Tables & Indexes
MEB Backup
Files
2. Log Files
MySQL
Database
Files
37. How it Works: Backing up InnoDB Log Files
Log File
Earliest needed
redo info
L
S
N
redo
info
L
S
N
redo
info
L
S
N
redo
info
Last needed
redo info
L
S
N
redo
info
L
S
N
redo
info
L
S
N
redo
info
ibbackup_logfile
L
S
N
Oldest LSN
Log file w/relevant redo
L
S
N
Newest LSN
• Copies portion of the log file that contains all required redo
information
• Covers the time from beginning to end of data backup
• Recovers all data blocks modified after copied to compressed data
file
38. Full & Partial Backups
• Backup contains all tables in
system tablespace
– Plus those separate tables that
match the pattern
• When using “file per table”,
you can backup a subset of
InnoDB tables
– Tables included in the backup
are specified with regular
expressions
– Use the -- include option
Full Backup
Table A
Multiple tables &
indexes in the
system tablespace
(ibdata files)
Table B
Table C
Partial Backup
One table &
indexes per file
(.ibd files)
Table D
Table E
Table F
40. mysqlbackup (innobackup) Examples
• Full Backup
mysqlbackup --user=dba --password=xyz --compress /etc/my.cnf /backups
• Incremental Backup
– The backup only contains changed data
mysqlbackup --incremental --lsn 2261747124 /etc/my.cnf /incr-backup
• Partial
– The backup contains tables in test database that match the .ib.* regular
expression.
mysqlbackup --include 'test.ib.*' /etc/my.cnf /backups
41. How mysqlbackup Works
SQL:
“FLUSH
TABLES
WITH READ
LOCK”
mysqlbackup
Exec’s
MySQL
Command-line
Client
ibbackup
InnoDB
Tables & Indexes
Hot Backup
Files
MyISAM
Tables & Indexes,
.frm, & .mrg files
MySQL
Database
Files
Flush, Lock
SQL
MySQL
Server
42. Tips: InnoDB and MyISAM Backup
• InnoDB tables are fully accessible during backup
– Insert, Update & Delete
• MyISAM tables cannot be updated during backup
– Uses FLUSH TABLES WITH READ LOCK near the end of the
backup
• Works best if …
– Wait for insert/update/delete transactions during MyISAM backup
– Do not run long SELECT queries during the backup
– MyISAM tables are small, thus copied quickly
46. Tips: “Raw Backup” Files
• The “raw backup” files from backup phase cannot be
directly consumed by MySQL
• These files can be copied to media
• The database must be “restored” first
• Use mysqlbackup to restore database before use
Compressed copy of
InnoDB data file(s)
ibbackup_logfile
Copy of MyISAM, frm, .mrg files
Raw Backup Files
47. How it Works: Restoring a Database
MySQL data dir
Compressed copy of
InnoDB data file(s)
1. Uncompresses InnoDB
files to data dir
InnoDB
data files
2. Recreates InnoDB Log
files
log files
MyISAM,
.frm, .mrg
files
ibbackup_logfile
3. Applies log, so InnoDB
files are consistent
4. Restores MyISAM and
other files
Copy of MyISAM, frm, .mrg files
48. Restoring a Database Con’t…
• MEB restore rolls forward data files to a common
point in time (the time at the end of backup)
• After restore, MEB Backup prints the location in the
binlog for the next SQL operation that executed after
the backup completed
• Note: the restore phase need not run on database
server host
– You can perform recovery on any machine, and copy
recovered files to your database server host
49. Backup and Roll forward “Log” Recovery
• Also known as log archiving or log backups
• Add executing mysqlbinlog to copy logs to your full
and incremental backup schedules
• Restore Full and Incremental as previously described
• Roll forward using binlog from the final lsn to the lsn
for the desired recovery point in time
50. Roll Forward Backup and Recovery
• Log Backup
– Use mysqlbinlog to make a continuous backup of the binary
log
– mysqlbinlog --read-from-remote-server --host=host_name
--raw --stop-never binlog.000999
• Restore
– If data loss occurs (for example, if the server crashes),
restore the most recent MEB backup
– Edit output file to truncate at desired point
– Note end lsn and use for roll forward start position
• mysqlbinlog --start-position=27284 binlog.001002
binlog.001003 binlog.001004 | mysql --host=host_name -u
root -p
51. Additional Resources
• Product Information
http://www.mysql.com/products/enterprise/backup.html
• Documentation
http://dev.mysql.com/doc/mysql-enterprise-backup/3.5/en/index.html
• Backup Forum
http://forums.mysql.com/list.php?28
• Download (30 Day Trial)
http://edelivery.oracle.com/