Configuring Mutual SSL Authentication in ClusterControl
Establishing trusted communications between systems is essential in enhancing system’s security. The use of Public Key Infrastructure (PKI) is one of the common ways to achieve trusted communication in distributed systems. In particular, Mutual SSL...
Understanding Lock Granularity in MySQL
If you’ve been working with MySQL for some time, you have probably heard the terms “table-level locking” and “row-level locking”. These terms refer to the lock granularity in MySQL - in this blog we will...
Announcing ClusterControl 1.8.2: Enhanced Security, Resource Utilization and Administration
We are pleased to announce the release of version 1.8.2 of Severalnines ClusterControl - the only management system you’ll ever need to deploy, monitor, and manage your open source databases. ClusterControl version 1.8.2 features new...
How to Get Started With Database Automation
Database automation helps make complex and time consuming tasks simple and fast. The tasks most commonly and easily identified for automation are those that are time-consuming yet repetitive. These often consume productivity, and can affect...
Automating Security Audits for PostgreSQL
Security audits are a must in all companies to protect data and avoid any possible security breaches, but it is also a time-consuming task as you need to check a lot of things periodically. The...
A Guide to Database Automation with Severalnines ClusterControl
Nowadays, database automation is a very hot topic. Database automation, simply speaking, refers to leveraging processes and tools to make administrative tasks for database developers and database administrators simpler. Why Database Automation? Database automation refers...
Enforcing Role-Based Access Controls with ClusterControl
Since the release of ClusterControl version 1.8.2, we’ve introduced several advanced features and enhancements, particularly in the User Management System. These updates include improvements to New User Management and LDAP Integration. A key existing capability...
Audit Logging for MongoDB
One of the security aspects of managing a database is to understand who accessed the database, when, and what did they do. Although we have already secured the MongoDB service, we still want to know...
Audit Logging for PostgreSQL
Auditing is a requirement for many security regulations or standards, like PCI - Payment Card Industry, and even a good way to keep your data as safe as possible knowing what is happening in your...
Architecting for Security : A Guide for MongoDB
The prevalence of data breaches is no longer surprising. Based on the just released FBI cybercrime report, victims of cybercrime have cumulatively lost a whopping $4.2 billion in 2020 which is $700 million more than...
Architecting for Security: A Guide for MySQL
Security is paramount today across the whole of IT. From time to time we hear about ransomware attacks or data leaks that have their origin in not secured databases or IT infrastructure. You may wonder:...
Press Release:ClusterControl Manages Hybrid Cloud Private DBaaS at Major Bank with Over 2,000 Heterogeneous Database Instances
ClusterControl proves instrumental to ABSA's open source digital transformation. STOCKHOLM, March 10, 2021 (Newswire.com)- ABSA Group, one of Africa’s largest diversified financial services groups, puts its trust in ClusterControl by Severalnines, the pioneer in providing...