List of MariaDB Integrations
This is a list of platforms and tools that integrate with MariaDB. This list is updated as of May 2026.
-
1
Ariga
Ariga
Streamline database management with safety, efficiency, and reliability.Present a clear and concise layout for your database structure in a straightforward, declarative manner. Our open-source solution generates migration plans that undergo verification in your team's existing CI pipeline before being deployed safely to production environments. The platform carefully simulates and assesses each proposed adjustment during the CI process, safeguarding against any unforeseen disruptions to the database. It proactively identifies detrimental changes, compatibility issues, unexpected table locks, and constraint violations well in advance of their potential impact on production settings. You can seamlessly integrate updates to the database schema into your continuous delivery pipelines using either our Terraform or Helm integrations. Additionally, our platform facilitates the secure execution of changes that may not be entirely verifiable during CI due to their dependence on the data in the target database, thereby bolstering the overall dependability of your database management practices. This thorough approach not only enhances operational efficiency but also introduces an additional layer of security to your deployment strategy, ultimately contributing to a more robust development workflow. By prioritizing both safety and performance, your team can confidently manage database changes while minimizing risks. -
2
Data Sentinel
Data Sentinel
Empower your business with trusted, compliant data governance solutions.In the competitive landscape of business leadership, it is essential to maintain steadfast trust in your data, ensuring it is meticulously governed, compliant, and accurate. This involves the seamless integration of all data from various sources and locations, unrestricted by any barriers. A thorough understanding of your data assets is vital for effective oversight. Regular audits should be conducted to evaluate risks, compliance, and quality, thereby supporting your strategic initiatives. Additionally, cultivating a comprehensive inventory of data across diverse sources and types promotes a unified comprehension of your data landscape. Implementing a prompt, economical, and accurate one-time audit of your data resources is crucial. Audits focused on PCI, PII, and PHI can be executed efficiently and thoroughly. This method negates the necessity for any software acquisitions. It is critical to assess and audit the quality and redundancy of data in all enterprise assets, whether they exist in the cloud or on-premises. Compliance with international data privacy regulations must be maintained on a large scale. Continuous efforts to discover, classify, monitor, trace, and audit adherence to privacy standards are imperative. Moreover, managing the dissemination of PII, PCI, and PHI data while automating compliance with Data Subject Access Requests (DSAR) is essential. This all-encompassing approach not only preserves the integrity of your data but also contributes significantly to enhancing overall business efficiency and effectiveness. By implementing these strategies, organizations can build a resilient framework for data governance that adapts to emerging challenges and opportunities in the data landscape. -
3
Syntho
Syntho
Securely synthesize data while ensuring privacy and compliance.Syntho is typically deployed within the secure infrastructures of our clients to ensure that confidential data stays within a reliable framework. Our pre-built connectors facilitate seamless integration with both source data and target systems with minimal effort. We offer compatibility with all major database platforms and file systems, featuring over 20 connectors for databases and more than 5 for file systems. Clients can choose their preferred method for data synthesis, allowing options such as realistic masking or the creation of entirely new values, while also enabling the automatic identification of sensitive data types. After safeguarding the data, it can be shared and utilized with confidence, maintaining compliance and privacy regulations throughout its entire lifecycle. This not only promotes a secure approach to data management but also encourages a culture of trust and accountability in handling sensitive information. -
4
CData Sync
CData Software
Streamline data replication effortlessly across cloud and on-premise.CData Sync serves as a versatile database pipeline that streamlines the process of continuous data replication across numerous SaaS applications and cloud-based sources. Additionally, it is compatible with any prominent data warehouse or database, whether located on-premise or in the cloud. You can effortlessly replicate data from a wide array of cloud sources to well-known database destinations, including SQL Server, Redshift, S3, Snowflake, and BigQuery. Setting up replication is straightforward: simply log in, choose the data tables you want to replicate, and select your desired replication frequency. Once that's done, CData Sync efficiently extracts data in an iterative manner, causing minimal disruption to operational systems. It only queries and updates data that has been modified or added since the previous update, ensuring efficiency. CData Sync provides exceptional flexibility for both partial and full replication scenarios, thus guaranteeing that your essential data remains securely stored in your preferred database. Take advantage of a 30-day free trial of the Sync app or reach out for further details at www.cdata.com/sync. With CData Sync, you can optimize your data management processes with ease and confidence. -
5
Tweakstreet
Twineworks
Streamline your data operations with customized automation workflows.Enhance your data science operations by creating customized automation workflows that meet your specific requirements. This innovative data integration tool allows you to design workflows on your desktop and execute them anywhere, giving you total command over your information. Tweakstreet operates as a locally-installed program on your computer, which helps you retain control and security over your data. You can effortlessly create and run your workflows whether you're on a desktop, in your private data center, or utilizing cloud servers. It boasts an extensive array of connectivity options, featuring connectors for multiple popular data sources, including various file formats, databases, and online services, with new connectors being introduced frequently. Users gain advantages from built-in support for vital data exchange formats such as CSV, XML, and JSON, in addition to compatibility with well-established SQL databases like Postgres, MariaDB, SQL Server, Oracle, MySQL, and DB2. Additionally, Tweakstreet is capable of interfacing with any database that has JDBC drivers and offers support for HTTP interfaces, including REST APIs, fortified by robust OAuth 2.0 authentication for secure access to commonly-used APIs. This level of flexibility and thorough support renders Tweakstreet an essential resource for data professionals aiming to optimize their workflows. Furthermore, the continual updates and enhancements ensure that users are always equipped with the latest tools and features to maximize their efficiency. -
6
SQL Diagnostic Manager for MySQL
IDERA
Streamline database management with insightful monitoring and secure access.Evaluate the usage of disk space by cataloging the total number of databases alongside their individual data and index sizes to determine which MySQL and MariaDB servers are the most storage-intensive. Utilize visual representations and summaries that illustrate the disk space allocated to databases across various servers and the tables contained within them, facilitating the swift identification of the largest data entities. Acquire a thorough insight into the security, availability, health, and performance metrics of all MySQL and MariaDB servers through an intuitive and modern web interface that simplifies navigation. Take advantage of a variety of monitoring tools that continually evaluate server configurations and security protocols. Identify and receive alerts regarding potential security vulnerabilities and optimization recommendations based on expert advice. Establish user profiles with controlled access to designated servers and configurations, specifying user categories, roles, authorized actions, as well as prohibited actions, tags, and tabs. This regulation of user access plays a crucial role in avoiding unintended actions, carrying out irreversible tasks, or altering server settings without administrator oversight, thus improving overall server reliability. Additionally, this systematic approach fosters a more organized and secure framework for managing and monitoring databases while also ensuring compliance with best practices. -
7
Text2SQL.AI
Text2SQL.AI
Transform ideas into SQL queries effortlessly with AI.Effortlessly transform your concepts into complex SQL commands in just seconds with AI-driven tools. Text2SQL.AI utilizes the cutting-edge capabilities of the OpenAI GPT-3 Codex model, allowing it to seamlessly convert English language prompts into SQL queries and the other way around, positioning it as a premier solution in the realm of Natural Language Processing, akin to the innovative technology powering GitHub Copilot. This application boasts a multitude of features, including the ability to generate SQL commands from English descriptions, execute a variety of operations like SELECT, UPDATE, DELETE, and modify tables, while also managing constraints and window functions. Furthermore, it offers clear English explanations for the SQL commands it produces and enables users to connect their unique database schemas, enriched with historical context. In addition, it supports a variety of SQL dialects such as MySQL, PostgreSQL, Snowflake, BigQuery, and MS SQL Server, providing flexibility to meet the varied requirements of users. We encourage your feedback on potential features that could further improve your user experience, as we are committed to continuous enhancement.