The most popular and widely-used database in the world, MySQL is a proven relational database technology. Our MySQL technology blog takes a look at the entire MySQL world, be in standalone, replicated, or clustered.
Severalnines’ ClusterControl supports SQL Server 2019 with its latest release, 1.9.1. Check out this post to find out more, including how to get it and what else is available.
CCX from Severalnines is a fully managed database as a service (DBaas) built atop the powerful ClusterControl automated database management platform. CCX enables you to simply click to deploy and access managed, secured MySQL, MariaDB and PostgreSQL database clusters on AWS.
Organizations around the world were unprepared for COVID-19's impact. Severalnines helps companies stay prepared when crisis strikes with their end-to-end disaster recovery solutions.
Encryption and security have been accompanied as part of your success for managing your data, especially for MySQL databases nowadays. It's imperative that security is always a priority and that something is not to be overlooked. This blog demonstrates how to determine if your MySQL server connections are encrypted and how to enforce them.
In this blog post, we will discuss one of the common errors in MySQL, the reason why it happens as well as some tips on troubleshooting this.
Benchmarking sounds quite easy to do but there are several things you have to keep in mind while doing that. In this blog we are going to cover some of the traps you may run into while performing benchmarking
In ClusterControl 1.9.0 a new query monitor has been introduced. We will go through what are some of the features that have been offered as well as look at some of the comparisons between an older version 1.8.2.
ClusterControl Advisors can be the most underrated feature of ClusterControl that has to be appreciated and leverage especially for your daily routine in DBA or part of your Ops tasks. It has a simple yet powerful capability that can do the tasks that ClusterControl cannot do. It has the ability to extend the power of ClusterControl and provide you more proactivity and efficiency from managing your database clusters.
This is a third and a final part of the blog series in which we will take a look at the options to create partial backups that are available for MariaBackup in ClusterControl
A second part in the series, we are taking a look at the parallel gzip and network throttling for MariaBackup
When you install ClusterControl, it has a default configuration that maybe doesn’t fit your requirements, so probably you will need to customize this installation. In this blog, we will show you where you can modify the configuration and the available options.
ClusterControl can, among others, act as a great tool to help you design and execute the backup schedule. Numerous features are available including backup verification, transparent backup encryption and many others. What is quite commonly missing is the ability of ClusterControl to tune backup tools that we use to create the backup. In this blog we would like to go over some of the settings that can be applied to MariaBackup.
This blog describes how clusters deployed by ClusterControl can be imported into Vitess while ClusterControl will still provide monitoring, management and automated failover
In this blog post, we are going to walk you through the deployment of a cluster of two MariaDB shards using ClusterControl. We are going to deploy a handful of MariaDB servers (for redundancy and availability) to host a partitioned table based on a range of a selected shard key.
In this blog post, we are going to show how to generate test data for a sharded or partitioned table in MySQL using Sysbench. This can be used as a playground for us to dive further into the cause-effect of table partitioning, data distribution and query routing.
We will discuss the benefits of using SELinux, provide some examples on how to use it with ClusterControl and tell you how you should go about configuring it for MySQL-based systems.
Security is key for harnessing your important data, especially those corporations that are dealing with health insurance, e-commerce, financial institutions, or any related enterprise that has terms for tight privacy. This blog will guide you on how to manage security with your database to the kernel level using AppArmor on Ubuntu or Debian based Linux infrastructure.
Advanced failover is very important - it might even be necessary when you have a very complex database setup. When dealing with disasters that can happen in unanticipated events, pre/post scripts can be very helpful to determine how feasible and how true is the alarm that was triggered. Proceeding on a failover after a false positive is a waste of money, resources, and waste of time. ClusterControl has these features and this blog demonstrates how you can take advantage of them dedicated for advanced failover.
MySQL replication is easy to set up, but also easy to break! What do you do when replication stops, and will not restart? In cases where replication cannot be restarted, how do you failover to a new master? This blog post discusses some of the common replication issues in MySQL setups, and how to fix them with ClusterControl.
MySQL Replication is commonly used to run large production environments. This blog covers best practices for avoiding downtime and issues with improper setups.
ClusterControl offers you a different approach of managing databases which can not be observed and experienced in other platforms. It can be deployed on-prem, on the cloud, or on a containerized type of environment. It can be deployed flexibly and has a massive feature that offers rich and powerful operations that makes it easier to manage your database and without requiring you to create your automated scripts. ClusterControl will handle this for you as shown by this blog. This blog showcases how it is feasible to manage multiple database technologies with ClusterControl.
Data governance defines a set of principles to ensure data quality in a company. It describes the processes, roles, policies or responsibilities, and metrics to ensure accountability and ownership of data assets across the enterprise. This blog discusses the six critical components to successful data governance for better data quality.
In this blog post, we are going to focus on SNMP traps and alerting. SNMP Traps are the most frequently used alert messages sent from a remote SNMP-enabled device (an agent) to a central collector, the “SNMP manager.” In the case of ClusterControl, a trap could be an alert after the critical alarm for a cluster is not 0, indicating something bad is happening.
In this blog series, we are going to showcase a proof-of-concept (PoC) on how to integrate ClusterControl with SNMP protocol. At the end of the blog series, we would ultimately be able to send an SNMP trap to an SNMP manager (Nagios, Zabbix, etc). In this first part, we are going to cover the MIB and SNMP agent.