Preparing Your Databases For a COVID Battle with ClusterControl
During these COVID-ridden days, chances are that your database instances are facing a lot of problems. Some of these problems might be related to performance issues (we mean, have you ever thought about how many...
Still Looking for a Machine That Unleashes the Power in Your Database Instances?
If you are a frequent reader of database-related blogs, you have probably heard about the Severalnines blog. Well, we mean, you are reading it right now, aren’t you? And if you’re reading the Severalnines blog,...
ClusterControl supports Redis with version 1.9
If you are a frequent user of ClusterControl, you might have heard that the Severalnines team recently released ClusterControl version 1.9.0. The full changelog can be found here, but in this blog post, we are...
Installing Redis Master-Slave with Manual Failover
The use of in memory databases as a data structure layer for storing frequently accessed data is on the rise. Infrastructure built for high concurrent traffic typically use an in memory database layer to implement...
Full Ops Automation of your Hybrid Cloud Database
In a previous blog, we wrote about about the architecture of hybrid cloud databases. Having database instances in different datacenters sounds all good, but how do you manage all that? How do you know if...
A Guide to Database Automation with Severalnines ClusterControl
Nowadays, database automation is a very hot topic. Database automation, simply speaking, refers to leveraging processes and tools to make administrative tasks for database developers and database administrators simpler. Why Database Automation? Database automation refers...
Audit Logging for MongoDB
One of the security aspects of managing a database is to understand who accessed the database, when, and what did they do. Although we have already secured the MongoDB service, we still want to know...
Architecting for Security : A Guide for MongoDB
The prevalence of data breaches is no longer surprising. Based on the just released FBI cybercrime report, victims of cybercrime have cumulatively lost a whopping $4.2 billion in 2020 which is $700 million more than...
Architecting for Security: A Guide for MySQL
Security is paramount today across the whole of IT. From time to time we hear about ransomware attacks or data leaks that have their origin in not secured databases or IT infrastructure. You may wonder:...
Database Security 101: Security in Open Source Databases
Data security is one of the most significant aspects of administering a database. Depending on the organizational structure, if you are managing the production database, you must monitor for unauthorized access and usage. This also...
Database Security 101: Understanding Database Access Privileges
Data is the new gold for big companies and organizations It's considered as the lifeblood of most modern businesses and there's a bonanza of opportunities to sell or to market to the large audience of...
Standardizing PostgreSQL Security Across Multi-Cloud Environments
Multi-Cloud Environment is a common topology and even recommended for a Disaster Recovery Plan (DRP), but the security could be a risk here as you need to add to the common security checks an extra...