Planet MySQL HA Blog
Audit Log Filter Component
The audit log filter component in MySQL 8.4 provides administrators with a powerful mechanism for auditing database activity at a fine-grained level. While it offers significant flexibility—such as selectively logging events based on users, hosts, or event types—it can also be challenging to understand and configure correctly.
In this article, we will examine how the audit log filter component works, walk through its core concepts, and share practical tips for configuring and managing audit filters effectively. Our goal is to help you leverage this feature to improve observability,…
Announcing MySQL AI
MySQL Basics: Understanding the Building Blocks of Databases
Developing applications using LangChain and MySQL HeatWave GenAI – Part 1
Archiving MySQL Audit Logs into OCI Object Storage buckets using OCI Data Integration(OCI-DI)
Unlocking Simplicity: Setting Up REST Service for MySQL HeatWave
Real-time analytics and simplified data pipelines with auto-refresh in MySQL HeatWave Lakehouse
Unleashing the Power of Data: Oracle & the AI Revolution (Live from TechCrunch)
Using MySQL HeatWave as a knowledge base with the OCI AI Agent Platform
Encrypting PostgreSQL Tables with PG_TDE: Step-by-Step Guide for Beginners
Let’s install and try out a new package for PostgreSQL — PG_TDE by Percona. This extension adds Transparent Data Encryption (TDE), a mechanism that allows data to be encrypted at the storage level without affecting application behavior.
TDE protects data in case of disk, dump, or backup compromise: everything stored at the file system level is encrypted. Meanwhile, the application continues to work with the data as usual — encryption and decryption happen transparently, without changes to SQL queries or logic.