Categories
Products
Technologies
Top Rated docs

July 2, 2021

Installing Redis Master-Slave with Manual Failover

The use of in memory databases as a data structure layer for storing frequently accessed data is on the rise.  Infrastructure built for high concurrent traffic typically use an in memory database layer to implement...

May 12, 2021

Best Practices in Scaling Databases: Part 1

All of you have heard about scaling - your architecture should be scalable, you should be able to scale up to meet the demand, so on and so forth. What does it mean when we...

May 11, 2021

Understanding MySQL’s New Heatwave

Data Analytics is important in any company as you can see what happened in the past to be able to make smart decisions or even predict future actions using the existing data. Analyze a huge...

May 7, 2021

Full Ops Automation of your Hybrid Cloud Database

In a previous blog, we wrote about about the architecture of  hybrid cloud databases. Having database instances in different datacenters sounds all good, but how do you manage all that? How do you know if...

May 6, 2021

Automate Database Health Check

Ensuring the database is healthy is one of the critical and important things that a database administrator must do. If we neglect the maintenance of the database, there is a higher probability that we run...

May 3, 2021

MongoDB Database Deployment Automation

Organizations are making use of infrastructure in the cloud because it offers speed, flexibility, and scalability. You can imagine if we can spin up a new database instance with just a click, and it takes...

April 26, 2021

Announcing CCX Database as a Service from Severalnines

  We at Severalnines are thrilled to announce the release of CCX, our brand new database as a service (DBaaS) offering!  It’s a fully managed service built atop the powerful ClusterControl automated operational database management...

April 16, 2021

How to use Encryption to Protect MongoDB data

With many kinds of data stored in the database, sometimes we may be dealing with confidential data, which might include credit card data, financial record, personal information. Those PII (Personal Identifiable Information) data is subject...

April 9, 2021

How to Get Started With Database Automation

Database automation helps make complex and time consuming tasks simple and fast. The tasks most commonly and easily identified for automation are those that are time-consuming yet repetitive. These often consume productivity, and can affect...

April 1, 2021

Audit Logging for MongoDB

One of the security aspects of managing a database is to understand who accessed the database, when, and what did they do. Although we have already secured the MongoDB service,  we still want to know...

March 26, 2021

Leveraging Zero Trust Technologies

What is Zero Trust? Today's cloud environments are generally predicated on the use of public, or rather, untrusted networks. In such untrusted networks, the application of security models that have been used in traditional perimeter...

March 25, 2021

Architecting for Security : A Guide for MongoDB

The prevalence of data breaches is no longer surprising. Based on the just released FBI cybercrime report, victims of cybercrime have cumulatively lost a whopping $4.2 billion in 2020 which is $700 million more than...

Subscribe below to be notified of fresh posts