## Different types of MongoDB monitoring tools

MongoDB monitoring service makes it easier for the users to have the ability to monitor their MongoDB clusters popularly known as MMS’. This is an online web interface, which enables you to access the custom dashboards, charts and constitutes the automated alerting options since it uses the clouds technology to get to the servers. These tools do not require minimum updates, setting, and configuration from the user and partly work alone in the monitoring process. Once you have developed this system, it becomes easier to start the administration in the management, deployment, and optimization of MongoDB.

Starting the set up

In order to activate the MongoDB monitoring service, you need to ensure that you have all the details of the Mongo DB community and they include

Opening an account with the software system

Start the download process of the MMS and install the agent on the cluster as directed by the program

In a matter of munities after he update, you will find the data visible and easy to start the process of monitoring.

Different MongoDB monitoring tools

There are various MongoDB monitoring tools monitoring tools and you need to understand the compete process of installing and updating them into the system and this makes it easy to start using it.

• Mongostat- this is one of the vital utility programs, which exposes the MongoDB metrics, and it is a good way to start the analysis, and sort any issues when it comes to matters of performance.
• Mongotop- this is a good way of monitoring the system and it has good and easy to customize tools listed on the page.
• Query profiler- this is a database profiler used to analyze all the slow queries, and you get to a snapshot of all the details happening on the page.

Http Console- this tool allows the process of simple diagnostics on the screen

• Mango shell commands- this gives the stats on the current database one is viewing. However it takes a longer time to run and can block other operations in the process.

Trending/ monitoring adaptors- this comprises a set of different monitoring and command tools, which include

• Munin- this retrieves the details from the server stats, and the collection stats displays collection in form of index sizes and needs the python and driver to connect.
• Motop- this is a tool used for monitoring various multiple MongoDB severs and it becomes easier to make all the settings since it has the ability to offer updates and conduct monitoring by the minute.

Other MongoDB monitoring tools

• Dex is one of the cores Mongo DB monitoring tools and this analyzes those who have logged into the system. This offers a number of different examples of indexes and this helps you to gain relevant results when you initiate the monitoring process.
• Hosted monitoring- this involves different monitoring services which include the cloudclick, server destiny, and scouts app, slow queries.

When you want to launch different MongoDB monitoring tools, it is important you understand all the functions and the command tools you will use to initiate the monitoring options.

Categories: MongoDB Tags:

Flash is by far the most popular streaming format on the Internet today.  The most popular RTMP server is the Adobe Flash Media Server by Adobe but the professional version could end up costing you up to $2,000 USD! There are open source RTMP servers, cheap RTMP servers or simply free RTMP servers to choose from. In this article, we have listed bunch of RTMP server alternatives to Adobe’s popular Flash Media Server. 1. Red5 – Advertised as an Open Source Media Server delivers a powerful video streaming and multi-user solution to the ©Adobe ©Flash Player and other exciting client technologies. Based on Java and some of the most powerful open source frameworks, Red5 stands as a solid solution for business of all sizes including the enterprise. 2. Wowza Media Server - the high-performance, high-value unified streaming media and video software for any screen. For live or on-demand streaming to computers, mobile devices and IPTV/OTT endpoints, the Wowza® platform delivers superior features, benefits and functionality. 3. RTMPDUMP - a toolkit for RTMP streams. All forms of RTMP are supported, including rtmp://, rtmpt://, rtmpe://, rtmpte://, and rtmps://. You can pull existing RTMP streams and store as FLV to stream as VOD. This tool is AWESOME. 4. ErlyVideo Streaming Server - a modern video streaming server, written in erlang. You can use Erlyvideo to stream to Flash, iPad, Android, SetTopBox. Unique features like capturing endless streams, streaming directly from Amazon S3-like storages and connecting to SDI make this server a best choice for building video infrastructure. 5. RubyIzumi - an open source RTMP Server for Flash Video/Audio Streaming. It is written in (Pure) Ruby and it supports to broadcast MP4(H.264 + AAC). You can watch it on the latest Flash player on your browser. 6. RTMPD – a high performance streaming server able to stream (live or recorded) in the following technologies: to and from Flash (RTMP, RTMPE, RTMPS, RTMPT, RTMPTE), to and from embedded devices (such as iPhone and Android), from surveillance cameras, and with IP-TV using MPEG-TS and RTSP/RTCP/RTP protocols. Also, crtmpserver can be used as a high performance rendesvous server. For example, it enables you to do audio/video conferencing, online gaming, online collaboration, and simple or complex chat applications. Hardcore RTMP streaming. 7. Cygnal - the Gnash Project’s Flash Media Server-compatible audio and video server. 8. RTMPy - RTMP for Python. A Twisted protocol implementing the Real Time Messaging Protocol (RTMP), used for streaming audio, video and data between the Adobe Flash Player and a server. 9. RTMPlite - a python implementation of the Flash RTMP server with minimal support needed for real-time streaming and recording using AMF0. It also includes an RTMP client and a SIP-RTMP gateway. 10. WebStreamer - a Web-based system that allows you to stream local video files to many different devices, either via pseudo RTMP or RTMP. 11. PHP Rtmp Client - Not really an RTMP server but worth mentioning here. a simple RTMP client for PHP. It allows you to connect to servers and invoke methods. So next time you have a streaming project in mind, don’t keep cost be the road block for you. Choose one of the alternatives listed above and enjoy. Categories: Streaming Tags: ## MongoDB advantages and disadvantages January 27th, 2013 No comments MongoDB is one of the greatest SQL free database, in the market. There have been different variations and introduction in java and programming but this is one of the best developments in the market. Most of the programmers find it easier to adjust to it since the infrastructure accommodates working abilities with other modes in the market. It enables high scalability, performance, and an open source of document database. With all the monitoring tools, you will find that it becomes easier to let the program run, and all the servers have the ability to adjust and make necessary updates once issued the commands. All the monitoring and command tools have the effective functioning handles making it easier to control and this means that you do not need to employ people to keep on upgrading or monitoring the system due to the presence of tools that can perfectly handle these functions. Due to the c ++ language, it becomes easier to deal with emergency issues due to the various database applications but this responds instantly to emergency ,making the system to run on smoothly. With the backup database, you only need to add and remove details on the serve based on your need. It is advisable for one to settle with most of the backup devices but the MongoDB makes it applicable to run multiple servers, and monitor, update them at the same time. The sharding aspect makes it possible to update servers even when you do not have space by duplicating the space and has different memory storage areas. This enables accommodation of data up to double the current amount you have. This is good for the systems that have various online clients like online gaming and big companies that have loads of data that the clients have to visit online. This makes it easier to hold information and disseminate upon request. There is the use of multiple document transactions since the program is document oriented and become easier to share. This means that one document used by numerous of people at the same time with no delays. The program is horizontally scalable meaning it has schema-less databases. This is one of the important aspects in the programs and when compared to the other versions, you find that this is due to effectiveness and ability to use joins for queries. When you have installed the MongoDB, you have higher chances of securing your data due to the duplication of content, which makes it easier to store in RAM, cloud technology amongst other areas, which enhance the accessibility, and easy to adjust the changes. However, the MongoDB programming does not offer all the solutions that users want and one of them is higher chances of losing data when you are adapting the content, and hard to retrieve it. This is the reason why you need to be sure of the clients you want to update or database duplication failure to which you have higher chances of never getting back the data. Most of the trained personnel using this system prefer using the replica methods in order to have backup content when doing any form of adjustments to the system. Categories: MongoDB Tags: ## What are some commercial and free open-source types of NoSQL databases? January 26th, 2013 No comments When you want to invest in the commercial databases, you need to make sure that you settle with some of the best in the market. You should have the ability to know the performance and take time to choose the best. CouchDB – Document Store Maps keys to data It provides a RESTful JSON API and is written in Erlang You can upload functions to index data and then you can call those functions Has a very simple REST interface Provides an innovative replication strategy – nodes can reconnect, sync, and reconcile differences after being disconnected for long periods of time Enables new distributed types of applications and data MongoDB – Document Store Free-form key-value-like data store with good performance Powerful, expansive query model Usability rivals that of Redis Good for complex data storage needs. Production-quality sharding capabilities Neo4j – GraphDB Disk-based Has a restricted, single-threaded model for graph traversal Has optional layers to expose Neo4j as an RDF store Can handle graphs of several billion nodes, relationships, or properties on a single machine Released under a dual license – free for non-commercial use Apache Hbase – Wide Column Store/Column Families Built on top of Hadoop, which has functionality similar to Google’s GFS and MapReduce systems Hadoop’s HDFS provides a mechanism that reliably stores and organizes large amounts of data Random access performance is on par with MySQL Has a high performance Thrift gateway Cascading source and sink modules Redis – Key Value/Tuple Store Provides a rich API and does more operations in memory, using disk only periodically. It’s extremely fast Lets you append a value to the end of a list of items that’s already been stored on a key. Has atomic operations, making it a best-of-breed tally server. Memcached – Key Value/Tuple Store High-performance, distributed memory object caching Free and open source Generic and agnostic to the objects/strings it caches It’s all in-memory data Simple yet elegant design enables easy development and deployment Language neutral caching scheme. Most of the large properties on the web are using it now, except for Microsoft Project Voldemort – Eventually Consistent Key Value Store Used by LinkedIn Handles server failure transparently Pluggable serialization supports rich keys and values including lists and tuples with named fields Supports common serialization frameworks including Protocol Buffers, Thrift, and Java Serialization Data items are versioned Supports pluggable data placement strategies Memory caching and the storage system are combined Tokyo Cabinet and Tokyo Tyrant – Key Value/Tuple Store Supports hashtable mode, b-tree mode, and table mode It’s fast and straightforward Good for small to medium-sized amounts of data that require rapid updating and can be easily modeled in terms of keys and values Cassandra – Wide Column Store/Column Families First developed by Facebook SuperColumns can turn simple key-value architecture into an architecture that handles sorted lists, based on an index specified by the user. Can scale from one node to several thousand nodes clustered in different data centers. Can be tuned for more consistency or availability Smooth node replacement if one goes down Categories: NoSQL Tags: ## Top 10 most popular books on the NoSQL architecture January 23rd, 2013 No comments When you want to get more details about NOSQL, it is important to have a descriptive look into the books and this makes it easier for one to get the latest versions and models in the creating of this database. The importance of getting the book is the ability for one to settle with the best descriptions and this means to nothing but the best results. You only need to settle with the best offers in the market can choose the books that have been verified to give you nothing but the best results. Some of the books include- 1] Refactoring: improving the design of existing code- this books is written by martin flower, and describes the different opportunities that the refactoring assistance and how to find it. This is suitable for people who are doing the NOSQL programing basis and gives then the refactoring steps in the developmental areas-link-books.google.co.ke/books?isbn=013306526X 2] Ubuntu unleashed 2012: covering 11.10 and 12.04 written by Matthew Helmke. This is a guide to the Ubuntu operating system covers such topics as installation and configuration, productivity applications, the command line, managing users, networking, remote access, security, kernel, and module management Link- books.google.co.ke/books?isbn=0672335786 3] Google APPs, the missing manual by Nancy Conner This book shows these applications together can ease your ability to collaborate with others, and allow you access to your documents, mail and appointments from any computer at any location. Link- books.google.co.ke/books?isbn=0596515790 4] Hadoop- the definitive guide by Tom White - It offers illuminating case studies that illustrate how Hadoop is used to solve specific problems. Link- books.google.co.ke/books?isbn=1449389732 5] Patterns of Enterprise Application Architecture by Martin Fowler This book is actually two books in one. The first section is a short tutorial on developing enterprise applications, which you can read from start to finish to understand the scope of the book’s lessons. Link- books.google.co.ke/books?isbn=0133065219 6] CouchDB: The Definitive Guide: The Definitive Guide by Chris Anderson, Jan Lehnardt, Noah Slater This book, shows how to work with CouchDB through its RESTful web interface, and become familiar with key features such as simple document CRUD (create, read, update, delete), advanced MapReduce, deployment tuning, and more. Link- books.google.co.ke/books?isbn=0596155891 7] Maven: The Definitive Guide Link books.google.co.ke/books?isbn=0596517335 Written by Sonatype Company – 2008 – Preview This is one of the descriptive guides that show one the effectiveness of all the NOSQL processes. To use Maven, everything you need to know is in this guide. 8] MongoDB in Action Link books.google.co.ke/books?isbn=1935182870 Written by Kyle Banker – MongoDB in Action is a comprehensive guide to MongoDB for application developers. The book begins by explaining what makes MongoDB unique and describing its ideal use cases. 9] Professional NoSQL Link-books.google.co.ke/books?isbn=1118167805 Written by Shashank Tiwari – 2011 They provide examples, practical solutions, and expert education in new technologies, all designed to help programmers do a better job. wrox.com Programmer Forums Join our Programmer to Programmer forums to ask and answer programming … 10] Core Python Programming: Text Link-books.google.co.ke/books?isbn=0130260363 Written by Wesley Chun – 2001 New to Python? This is the developer’s guide to Python development! Categories: NoSQL Tags: ## 3 Things You Must Know To Get Started With Wireless Internet Service January 23rd, 2013 No comments It is one thing to take a decision that you will switch from your conventional home cable connection and Wi-Fi setup to the more advanced mobile internet connectivity and it’s a complete different thing to actually get started using this new technology from scratch. This is why it is recommended that you have a clear idea about the starting blocks of the mobile internet connectivity technology and ensure that you seek help from your service provider at the sign of any problem. Here are the top and most important 3 things about starting off using a mobile wireless internet connectivity that you need to know in order to make your experience of transition a hassle-free one - 1. Getting Connected When you have subscribed to a plan with the service provider of wireless mobile internet connectivity of your choice, you will most probably be having the necessary device and login credentials with you. In case you don’t have it, then you need not worry. Your service provider will call you up with a convenient time for you to setup the connection once your order has been processed and approved. Remember to check with the service provider about any terms of usage that might be there for the device for the mobile internet connectivity. Also check to see that all necessary documentations of the device and the driver media are provided with the device. Many service providers will also provide a wireless Wi-Fi router for your device in order to enable you to get the internet connection on multiple devices simultaneously. 2. The Devices For The Connection Once you have the necessary devices you will need to install the same with the computer. Connect the device and wait for the computer to recognize the same. Once it has recognized the device, it will ask for the driver media which you will need to insert for installation of the driver and the service provider’s software. Once done with these, you are all set to go. There are various ways in which you can pay for your device, both the USB dongle come antenna for connecting to the internet and the Wi-Fi router that your service provider provides along with the package. You might need to pay an initial one time refundable security deposit for these devices or you might be required to purchase the same from the service provider or buy your own from a shop. Some service providers like clear internet promotions offer the device free of any additional cost. 3. Range And Security Of The Devices Remember that any form of wireless or Wi-Fi device, no matter how strong it is comes with a range beyond which it will be unable to transmit any data and provide internet connectivity. You will need to ensure that you take care of this aspect of the router when setting it up in your home. Also ensure that you have a secure password protecting your internet connection from unauthorized intrusion. With these 3 aspects of the getting started of wireless mobile internet connectivity taken care of, you can rest assured of a good time! Categories: General Tags: ## 5 Ways You Can Protect Yourself from Online Threats January 22nd, 2013 1 comment In a world where everything is connected online, it is very easy to lose the files on your computer or even your own identity. Protecting yourself from the threats in the virtual world is one of the primary concerns. There are scams being hatched to hoodwink people into disclosing their personal details and account numbers and the security breach is too advanced to control. Do worry too much because there are experts who can guide you through these problems. Given below are five ways in which you can protect yourself from these online threats. 1. Install Software For Internet Security It is no longer sufficient to install only antivirus software in your computer or laptop. Use software that not only prevents your computer from virus threat but also protects you from spyware and key loggers. The software should also be able to monitor if your computer is being accessed by any unauthorized person. Some softwares, which work as both antivirus and protect your computer, may be a little expensive. But they are worth it. If you do not want something expensive, you can also find some free software on the net that you can download. 2. Install A Firewall A firewall acts like buffer zone between your computer and the whole internet. It is created in a manner that it allows only that information that you allow to pass through it. This is a great safety device for your computer, as its programming helps you stop the attack from key loggers, malicious hackers and worms. You can get lot of internet security software that also has a firewall. 3. Scan Your Computer Every Week There are several applications that automatically check the computer for any potential threats. If your software doesn’t carry out automatic checks then you should scan your computer at least one every week. It may be a hassle when you are working on the computer, so you may do this when you are not working. This is important to check that your computer and all the data you store in it are safe. 4. Update All Your Software Regularly The hackers and people who are phishing are regularly updating their moves, so it is important that you keep your internet security software updated as well. You do not have to buy an updated version from the market, most companies allow you to download the latest version from their website once you have bought the product from them. 5. Keep Back Up For All Your Files You have your whole life on your computer and when your computer falls prey to a virus or is hacked, you are completely at loss. To avoid this, you should make a smart move and use any reputed online backup service for your files and documents. There are various services online, which are trustworthy and you can make full use of them. Follow these safety measures and be wary when interacting with unknown people on the internet. Categories: Security Tags: ## Backup methods and tools for Oracle January 20th, 2013 No comments In order for one to get appealing results, they have higher chances of getting positive results in terms of using the best options that enable one to settle with affirmative and timely operational methods There are different factors that promote backup frequency and they include The rate of transaction rate Availability of database The value of the data company ARCHIVELOG mode: SQL> CONNECT sys AS SYSDBA SQL> STARTUP MOUNT EXCLUSIVE; SQL> ALTER DATABASE ARCHIVELOG; SQL> ARCHIVE LOG START; SQL> ALTER DATABASE OPEN; databases in ARCHIVELOG mode: log_archive_start = TRUE log_archive_dest_1 = ‘LOCATION=/arch_dir_name’ log_archive_dest_state_1 = ENABLE log_archive_format = %d_%t_%s.arc difference between restoring and recovering? SQL> connect SYS as SYSDBA SQL> RECOVER DATABASE UNTIL TIME ’2001-03-06:16:00:00′ USING BACKUP CONTROLFILE; RMAN> run { set until time to_date(’04-Aug-2004 00:00:00′, ‘DD-MON-YYYY HH24:MI:SS’); restore database; recover database; online database backups? ALTER TABLESPACE xyz BEGIN BACKUP; ! cp xyzFile1 /backupDir/ ALTER TABLESPACE xyz END BACKUP; ALTER SYSTEM SWITCH LOGFILE; — Force log switch to update control file headers ALTER DATABASE BACKUP CONTROLFILE TO ‘/backupDir/control.dbf’; RMAN can be operated from Oracle Enterprise Manager, or from command line. Here are the command line arguments: Argument Value Description —————————————————————————– target quoted-string connect-string for target database catalog quoted-string connect-string for recovery catalog nocatalog none if specified, then no recovery catalog cmdfile quoted-string name of input command file log quoted-string name of output message log file trace quoted-string name of output debugging message log file append none if specified, log is opened in append mode debug optional-args activate debugging msgno none show RMAN-nnnn prefix for all messages send quoted-string send a command to the media manager pipe string building block for pipe names timeout integer number of seconds to wait for pipe input [oracle@localhost oracle]$ rman

Recovery Manager: Release 10.1.0.2.0 – Production

RMAN> connect target;

connected to target database: ORCL (DBID=1058957020)

RMAN> backup database;

backup and restore a database using RMAN?

rman target sys/*** nocatalog

run {

allocate channel t1 type disk;

backup

format ‘/app/oracle/backup/%d_t%t_s%s_p%p’

(database);

release channel t1;

}

Example RMAN restore:

rman target sys/*** nocatalog

run {

allocate channel t1 type disk;

# set until time ‘Aug 07 2000 :51′;

restore tablespace users;  recover tablespace users;

release channel t1;

Categories: Tags:

## Backup methods and tools for MySQL

January 18th, 2013 1 comment

MySQL needs to have different backup recovery system, which will prevent loss of files generated into the system. This mostly happens during upgrading of systems or integration of different networks.

Causes of crashes

There are different causes that lead crashing of the system and this makes it harder for one to recover. With a number of different solutions to use, it is wise to understand the methods that cause hitches and try different ways to prevent. Some of the common causes include

Crashing of the operation system

Abrupt and constant power failure

Crashing of the file system

Where there are issues with hardware, motherboard, or hard drive

These are the possible areas ,that lead to constant crashing of the system and this means all data stored have higher chances of getting lost but there are different methods one can use to restore the files.

How to manage using a file snapshot system

It is important for the programmer to take into account different methods that make it easier for one to get the data files in the system. This systematic process needs attention to detail in order to get recommendable results.

-  create a client program, and execute FLUSH TABLES WITH READ LOCK.

- create another shell, execute mount vxfs snapshot

-    choose first client, execute UNLOCK TABLES.

-    Copy files from the snapshot

-    Unmount the snapshot.

Tools used in the backup and recovery process

XtraBackup

mydumper

mysqlhotcopy

Zmanda Recovery Manager (ZRM) for My

mysqldump

mylvmbackup

ZRM with XtraBackup (and streaming)

MySQL backup methods and characteristics

Backup uses querying the MySQL server to get database construction and gratified information

Backup is gentler than physical approaches because the server should access database material and adapt it to logical format. If the production is written on the client side, the server must also send it to the holdup program.

Output is particularly bigger than physical backup, predominantly when saved in text setup

Backup and reinstate granularity is obtainable at the server level), database level (all tables in a, or table level. this happens regardless of the type of server of backup device.

The backup should not compose log or configuration files, or database-related files that are not part of databases.

Process of data backup and recovery process sign MySQL

InnoDB: Database not shut down normally.

InnoDB: Starting recovery from log files…

InnoDB: Starting log scan based on checkpoint at

InnoDB: log sequence number 0 13674004

InnoDB: Doing recovery: scanned up to log sequence number 0 13739520

InnoDB: Doing recovery: scanned up to log sequence number 0 13805056

InnoDB: Doing recovery: scanned up to log sequence number 0 13870592

InnoDB: Doing recovery: scanned up to log sequence number 0 13936128

InnoDB: Doing recovery: scanned up to log sequence number 0 20555264

InnoDB: Doing recovery: scanned up to log sequence number 0 20620800

InnoDB: Doing recovery: scanned up to log sequence number 0 20664692

InnoDB: 1 uncommitted transaction(s) which must be rolled back

InnoDB: Starting rollback of uncommitted transactions

InnoDB: Rolling back trx no 16745

InnoDB: Rolling back of trx no 16745 completed

InnoDB: Rollback of uncommitted transactions completed

InnoDB: Starting an apply batch of log records to the database…

InnoDB: Apply batch completed

InnoDB: Started

Categories: mysql Tags:

## Backup methods and tools for PostgresQL

There are different methods that one can use in order to backup and restore files.

Using pgdump, new file for each day

Process

Go to Server create a Directory called Drive:\PostgresqlBack then create a sub directory called “bin” in the Drive:\PostgresqlBack

comerr32.dll

gssapi32.dll

k5sprt32.dll

krb_32.dll

libeay32.dll

libiconv2.dll

libpq.dll

Microsoft.VC80.CRT.manifest

msvcm80.dll

msvcp80.dll

msvcr80.dll

pg_dump.dll

ssleay32.dll

zlib1.dll

Create batch file called something, example is postgresqlBackup.bat. The file must be located in PostgresqlBack directory not the bin folder.

Open the File then Copy/Paste the following

@echo off

for /f “tokens=1-4 delims=/ ” %%i in (“%date%”) do (

set dow=%%i

set month=%%j

set day=%%k

set year=%%l

)

set datestr=%month%_%day%_%year%

echo datestr is %datestr%

set BACKUP_FILE=<NameOfTheFile>_%datestr%.backup

echo backup file name is %BACKUP_FILE%

echo on

bin\pg_dump -i -h <HostName> -p 5432 -U <UserName> -F c -b -v -f %BACKUP_FILE% <DATABASENAME>

Change <NameOfTheFile> to something. Setting is the first part of the file name then followed by the date the file was created with the extension .backup

Change the <PassWord > setting above to the correct password for the backup users.

Change <HostName> either to ip address or dns name of the server hosting Postgresql.

Change <DATABASENAME> to the database name being backed up.

Save the File

Using .pgpass and pgdumpall, same file

Achieving automated backup in a windows environment

Create a .pgpass file

Lock down the .pgpass file

Using NTFS permissions, disable access to this file for everybody except the user pg is running as

Create a script to call pg_dumpall

SET PGPASSFILE=C:\foo\bar\PG_BACKUP\PGPASSFILE\pgpass.conf

“C:\Program Files\PostgreSQL\8.2\bin\pg_dumpall.exe” -U scfcu_postgres > C:\foo\bar\PG_BACKUP\db.out cu

Handling Large Databases

Use compressed dumps. You can use your favorite compression program, for example gzip:

pg_dump dbname | gzip > filename.gz

gunzip -c filename.gz | psql dbname

or:

cat filename.gz | gunzip | psql dbname

Use split. pg_dump dbname | split -b 1m – filename

Reload with: cat filename* | psql dbname

You can use PostgreSQL’s continuous WAL archiving method. First you need to set wal_level=archive, then do a full filesystem-level backup (between issuing pg_start_backup() and pg_stop_backup() commands) and then just copy over newer WAL files by configuring the archive_command option.

Update: Check out Barman for an easier way to set up WAL archiving for backup.

You can use PostgreSQL’s continuous WAL archiving method. First you need to set wal_level=archive, then do a full filesystem-level backup (between issuing pg_start_backup() and pg_stop_backup() commands) and then just copy over newer WAL files by configuring the archive_command option.

Incremental, the WAL archives include everything necessary to restore the current state of the database

Almost no overhead, copying WAL files is cheap

You can restore the database at any point in time (this feature is called PITR, or point-in-time recovery)