Hybrid Cloud vs Full Public Cloud - Pros & Cons
Technology consumers and users have embraced cloud computing ever since its boom. It implicates a very beneficial part nowadays to the technology on how humans use and interact with technology,...
View ArticleDatabase Security 101: Understanding Database Access Privileges
Data is the new gold for big companies and organizations It's considered as the lifeblood of most modern businesses and there's a bonanza of opportunities to sell or to market to the large audience of...
View ArticleThe DevOps Open-Source Database Audit Manual - Everything You Should Know
Auditing is the monitoring and recording of selected user database actions. It is typically used to investigate suspicious activity or monitor and gather data about specific database activities. For...
View ArticleTips and Tricks for Implementing Database Role-Based Access Controls for MariaDB
In a database management system (DBMS), role-based access controls (RBAC), is a restriction on database resources based on a set of pre-defined groups of privileges and has become one of the main...
View ArticleArchitecting for Security : A Guide for MongoDB
The prevalence of data breaches is no longer surprising. Based on the just released FBI cybercrime report, victims of cybercrime have cumulatively lost a whopping $4.2 billion in 2020 which is $700...
View ArticleAudit Logging for MongoDB
One of the security aspects of managing a database is to understand who accessed the database, when, and what did they do. Although we have already secured the MongoDB service, we still want to know...
View ArticleEnforcing Role-Based Access Controls with ClusterControl
In Severalnines’ recent release of ClusterControl version 1.8.2 we have introduced a lot of sophisticated features and changes. One of the important features is the newly improved User Management...
View ArticleHow to Get Started With Database Automation
Database automation helps make complex and time consuming tasks simple and fast. The tasks most commonly and easily identified for automation are those that are time-consuming yet repetitive. These...
View ArticleHow to use Encryption to Protect MongoDB data
With many kinds of data stored in the database, sometimes we may be dealing with confidential data, which might include credit card data, financial record, personal information. Those PII (Personal...
View ArticleAutomate Database Configuration Check
Many system administrators commonly overlook the importance of ongoing database configuration tuning. Configuration options are often being configured or tuned once, during the installation stage, and...
View ArticleMongoDB Database Deployment Automation
Organizations are making use of infrastructure in the cloud because it offers speed, flexibility, and scalability. You can imagine if we can spin up a new database instance with just a click, and it...
View ArticleAutomate Database Health Check
Ensuring the database is healthy is one of the critical and important things that a database administrator must do. If we neglect the maintenance of the database, there is a higher probability that we...
View ArticleMongoDB Insecurity Levels and How to Avoid Them
Most database management systems have several techniques of securing their data from an outsider or an unauthorized person or application. The techniques prevent your data from being read or copied...
View ArticleHow to Manage Large Databases Effectively
One of the biggest concerns when dealing with and managing databases is its data and size complexity. Often, organizations get concerned about how to deal with growth and manage growth impact because...
View ArticleIntegrating ClusterControl with SNMP - A Proof of Concept : Part One
ClusterControl comes with a number of distinctive alerts (or alarms) which you won't find in other monitoring systems. ClusterControl understands a database cluster topology as a whole - all database...
View ArticleIntegrating ClusterControl with SNMP : Part Two
This blog post is a continuation of the previous part 1, where we have covered the basics of SNMP integration with ClusterControl.In this blog post, we are going to focus on SNMP traps and alerting....
View ArticleSix Critical Components of Successful Data Governance
What is Data Governance?For large organizations or companies that are into data management, data governance possesses the key to success in managing, controlling, or governing the data that has been...
View ArticleManaging Multiple Database Technologies with ClusterControl
Managing multiple open source database technologies in any environment can be a daunting task, especially if you have fewer resources. The scenario could be worse if deployment, monitoring and other...
View ArticleHow to configure SELinux for MongoDB Replica Sets
By 2025, the world will store approximately 200 zettabytes of data. That data will be stored either in public, private, on-premises or cloud storage, PCs, laptops, smartphones and also...
View ArticleHow to Configure AppArmor for MongoDB Replica Sets?
There are many sections and layers of security if we are talking about the hardening of databases. It starts from the encryption of the underlying storage disk, database access privileges,...
View Article