(Francisco Tirado) In this tutorial, we are going to guide you through the process of preparing and configuring an Ubuntu mini host for InnoDB cluster usage.
Tag: Open Source
Dropping the Foreign Key Constraint Using pt-online-schema-change
(Siddhant Sawant) In this blog post, we’ll look at how to get rid of the unused Foreign Key (FK) constraint and/or related columns/keys with the help of pt-online-schema-change and the power of its plugins.
MySQL InnoDB Cluster – Setting up a Real-World Cluster
(Francisco Tirado) Nowadays, it’s very important to have a high availability solution that gives you serenity and security for your data. The task of ensuring your data will always be available is a challenging one, that not everyone wants to do because it demands a lot of knowledge about tools, con
MySQL InnoDB Cluster: Automated Installation with Puppet
(Frederic Descamps) We saw yesterday that the new MySQL Shell was out and how we could create a MySQL InnoDB Cluster manually using the Shell.
Network attacks on MySQL, Part 1: Unencrypted connections
(Daniel van Eeden) In a set of blog posts I will explain to you how different attacks on the network traffic of MySQL look like and what you can do to secure your systems againt these kinds of attacks.
MySQL, –i-am-a-dummy!
(Manjot Singh) In this blog post, we’ll look at how “operator error” can cause serious problems (like the one we saw last week with AWS), and how to avoid them in MySQL using –i-am-a-dummy.
Improved Redo Log Copying During Backup
(Rahul Sisondia) MySQL Enterprise Backup Team is pleased to announce redo log performance improvements during the backup operation starting with release 4.1.
Open Source Databases on Big Machines: Disk Speed and innodb_io_capacity
(Sveta Smirnova) In this blog post, I’ll look for the bottleneck that prevented the performance in my previous post from achieving better results.
Improving MySQL out of disk space behaviour
(Daniel van Eeden) Running out of disk space is something which, of course, should never happen as we all setup monitoring and alerting and only run well behaved applications. But when it does happen we want things to fail gracefully.
MySQL Ransomware: Open Source Database Security Part 3
(David Busby and Kenny Gryp) This blog post examines the recent MySQL ransomware attacks, and what open source database security best practices could have prevented them.
