Planet MySQL HA Blog
pg_tde can now encrypt your WAL on PROD!
Just recently, we announced the production-ready release of pg_tde, bringing open source Transparent Data Encryption (TDE) to PostgreSQL.
Now, I may have spoiled the fun a little with the title, but take a look at the word puzzle below—can you guess the announcement? Bear with me… and my sense of humor, which might be a bit too dry for some :)
Encrypting PostgreSQL Tables with PG_TDE: Step-by-Step Guide for Beginners
Let’s install and try out a new package for PostgreSQL — PG_TDE by Percona. This extension adds Transparent Data Encryption (TDE), a mechanism that allows data to be encrypted at the storage level without affecting application behavior.
TDE protects data in case of disk, dump, or backup compromise: everything stored at the file system level is encrypted. Meanwhile, the application continues to work with the data as usual — encryption and decryption happen transparently, without changes to SQL queries or logic.
Introducing Natural Language to SQL for MySQL HeatWave
Two Models, One World: Introducing JSON Relational Duality Views in MySQL HeatWave
Log Anomaly Detection with MySQL HeatWave AutoML
Why Most MySQL HA Setups Fail – And How to Fix Them
After two decades of helping enterprises achieve continuous MySQL operations, we've probably seen it all. The midnight calls about failed failovers. The "highly available" systems that went down for hours during a simple maintenance window. The multi-million-dollar applications that were brought to their knees by a single database node failure.
Here's the uncomfortable truth: most MySQL high-availability implementations fail when they're needed most. Not because the technology is fundamentally flawed, but because of predictable, avoidable design and…