Percona announces the release of Percona Server for MySQL 5.7.27-30 on August 22, 2019 (downloads are available here and from the Percona Software Repositories). This release merges changes of MySQL 5.7.27, including all the bug fixes in it. Percona Server for MySQL 5.7.27-30 is now the current GA release in the 5.7 series. All of Percona’s software is open-source and free.
Bug Fixes:
- Parallel doublewrite buffer writes must crash the server on an I/O error occurs. Bug fixed #5678.
- On a server with two million or more tables using foreign keys and AUTOINC columns, the shutdown may take a measurable length of time. Bug fixed #5639 (Upstream #95895).
- If large pages are enabled on the MySQL side, the maximum size for
innodb_buffer_pool_chunk_size
is effectively limited to 4GB. Bug fixed #5517 (Upstream #94747). - The TokuDB hot backup library continually dumps TRACE information to the Server error log. The user cannot enable or disable the dump of this information. Bug fixed #4850.
- Key rotation is redesigned to allow
Select rotate_system_key("percona_redo")
. The currently used key version is displayed in theinnodb_redo_key_version
status. Bug fixed #5565. - The TokuDBBackupPlugin is optional at cmake time. Bug fixed #5748.
- A multi-table
DELETE
with a foreign key breaks replication. Bug fixed #3845. - A
TRUNCATE
with any table and interfacing with Adaptive Hash Index (AHI) can cause server stalls due to the interaction with AHI, whether the AHI is enabled or not.
Bug fixed #5576 (upstream #94610). - In specific configurations and with
log_slow_verbosity
set to log InnoDB statistics, memory usage increases while running a stored procedure. Bug fixed #5581 - Thread pool ability to track network I/O was disabled. Bug fixed #5723.
- An instance started with the default values but setting the redo log to encrypt without specifying the keyring plugin parameters does not fail or throw an error. Bug fixed #5476.
- Setting the encryption to
ON
for the system tablespace generates the encryption key and encrypts system temporary tablespace pages. Resetting encryption toOFF
, all subsequent pages are written to the temporary tablespace without encryption. To allow any encrypted tables to be decrypted, the generated keys are not erased. Modifying theinnodb_temp_tablespace_encrypt
does not affect file-per-table temporary tables. This type of table is encrypted ifENCRYPTION
=’Y’ is set during the table creation. Bug fixed #5736 - After resetting the
innodb_temp_tablespace_encrypt
toOFF
during runtime, the subsequent file-per-table temporary tables continue to be encrypted. Bug fixed #5734
Other bugs fixed: #5752, #5749, #5746, #5744, #5743, #5742, #5740, #5711, #5695, #5681, #5669, #5645, #5638, #5593, #5532, #3970, #5696, #5689, #5146, #5715, #5662, #5420, #5149, #5686, #5688, #5697, #5716, #5725, #5773, #5775, #5820, and #5839.
Find the release notes for Percona Server for MySQL 5.7.27-30 in our online documentation. Report bugs in the Jira bug tracker.