Categories
Products
Technologies
Top Rated docs

January 14, 2020

Cluster-Wide Database Maintenance and Why You Need It

Undoubtedly, there is a long list of maintenance tasks that have to be performed by system administrators, especially when it comes to critical systems. Some of the tasks have to be performed at regular intervals,...

January 10, 2020

A SOx Compliance Checklist for PostgreSQL

The United States SOx (Sarbanes-Oxley) Act, 2002, addresses a broad spectrum of fundamental information security principles for commercial enterprises, ensuring their functions are rooted and consistently applied, based on concepts of CIA (Confidentiality, Integrity, and...

January 7, 2020

Using OpenVPN to Secure Access to Your Database Cluster in the Cloud

The internet is a dangerous place, especially if you’re leaving your data unencrypted or without proper security. There are several ways to secure your data; all at different levels. You should always have a strong...

January 2, 2020

Full MariaDB Encryption At-Rest and In-Transit for Maximum Data Protection – Part Two

In the first part of this series, we have covered in-transit encryption configuration for MariaDB replication servers, where we configured client-server and replication encryptions. Taken from the first post, where we had partially configured our...

January 1, 2020

Full MariaDB Encryption At-Rest and In-Transit for Maximum Data Protection – Part One

In this blog series, we are going to give you a complete walkthrough on how to configure a fully encrypted MariaDB server for at-rest and in-transit encryption, to ensure maximum protection of the data from...

December 3, 2019

How to Backup an Encrypted Database with Percona Server for MySQL 8.0

Production interruptions are nearly guaranteed to happen at some point in time. We know it so we plan backups, create recovery standby databases, convert single instances into clusters. Admitting the need for a proper recovery...

October 11, 2019

Securing MongoDB from External Injection Attacks

MongoDB security is not fully-guaranteed by simply configuring authentication certificates or encrypting the data. Some attackers will “go the extra mile” by playing with the received parameters in HTTP requests which are used as part...

September 5, 2019

An Overview of MongoDB Atlas: Part Two

In the first part of the blog “An Overview of MongoDB Atlas,” we looked at getting started with MongoDB Atlas, the initial setup and migration of an existing MongoDB Cluster to MongoDB Atlas. In this...

August 16, 2019

An Overview of MongoDB Atlas: Part One

The cloud computing approach addresses some of the challenges associated with running data processing systems. Data-driven companies are pushing out rapid business transformation with cloud services, and many see cloud services as a substantial enhancement...

June 26, 2019

Database User Management: Managing Roles for MariaDB

It’s always a headache... you need to add a new user role or change some privileges, and you need to assign it one... by... one. This is a regular duty, especially in large organizations, or...

June 13, 2019

Exploring the Different Ways to Encrypt Your MariaDB Data

Encrypting your MariaDB database, whether it is in-transit and at-rest, is one of the most important things that an organization should consider if you value your data. Organizations that deal with financial transactions, medical records,...

May 17, 2019

How to Automate Daily DevOps Database Tasks with Chef

Chef is a popular configuration management tool designed to deploy, configure and manage servers. It may not be that easy to use, as you need to be a programmer to manage the configurations in Ruby...

Subscribe below to be notified of fresh posts