Run Differentials
This tutorial shows how you can recover data from either a fat finger or malicious data attack. This tutorial can be utilized if the data issue is found within the Cockroach GC window for a particular zone configuration which by default is 25 hours. An additional tutorial will show how to recover using a backup.
Setup Movr With a Bad Actor Record
For this example, we’ll create a MOVR workload and show how to recover from a malicious attack from a user called devil. On the MOVR rides table, let’s activate an audit log so we can see all of the SQL transactions that incur on the table. While the workload is running, we’ll inject the rogue user called devil and have that user create a malicious transaction that updates all of Tyler Dalton’s transactions to be $1000.