Severalnines Blog
The automation and management blog for open source databases

Get all the insight on open source database management and infrastructure operations with Severalnines whitepapers

Posted in:

Whether you’re looking into ways to automate various aspects of administering your open source databases or to take better control of your data, we have the relevant whitepaper that will help you in your quest and hopefully provide you with good food for thought on how to achieve your database management objectives.

Management and Automation of Open Source Databases

As the adoption of open source databases, such as MySQL / MariaDB, PostgreSQL or MongoDB, increases in the enterprise, especially for mission-critical applications, so does the need for robust and integrated tools. Operational staff need to able to manage everything from provisioning, capacity, performance and availability of the database environment. This is needed to minimize the risk for service outages or poor application performance.

This whitepaper discusses the database infrastructure lifecycle, what tools to build (or buy) for effective management, database deployment options beyond Chef or Puppet, important aspects of monitoring and managing open source database infrastructures and how ClusterControl enables a systematic approach to open source database operations.

You may also be interested in our related blog series on:

All of our white papers can be downloaded here:

Happy clustering!

Related Post

ClusterControl Tips & Tricks: How to Manage Configuration Templates for your databases

ClusterControl comes with a set of configuration template files to simplify deployments. This blog post provides an overview of these configuration templates, and how to best make use of them.

How to secure MongoDB from ransomware - ten tips

Need tips on how to secure your MongoDB setup and protect yourself against ransomware? We have collected ten tips that are easy to follow and execute on your MongoDB databases.

Posted in:

Secure MongoDB and Protect Yourself from the Ransom Hack

Recently, several attackers were able to break into thousands of MongoDB systems, wipe the databases and leave a ransom note. This could have been prevented if those in charge would have followed some standard security procedures. This blog post describes how to protect yourself from MongoDB ransomware. What is it, why is it a problem and what can you do to protect yourself against it?

Tips and Tricks - How to shard MySQL with ProxySQL in ClusterControl

Sharding can be a painful exercise. Databases need to be split on multiple servers, data migrated, and applications have to be tweaked to be aware of the shards. However, there are ways to make this less painful. This blog explains how to use ProxySQL to shard a table to another cluster in ClusterControl without changing your application.