Operations | Monitoring | ITSM | DevOps | Cloud

Databases

The latest News and Information on Databases and related technologies.

How to Run a Time Series Database on Azure

Today we’re pleased to announce the general availability of InfluxDB Enterprise on Microsoft’s Azure Marketplace. We’ll dive into all of these below, but first, let’s take a step back in case you’re not familiar with time series databases. If you’re looking for a time series database, here are three things to look for.

Using Mnesia in an Elixir Application

In today’s post, we’ll learn about Mnesia, see when you would use such a tool, and take a look at some of the pros and cons of using it. After covering the fundamentals of Mnesia, we’ll dive right into a sample application where we’ll build an Elixir application that uses Mnesia as its database. Let’s jump right in!

Elasticsearch vs. MongoDB

Elasticsearch and MongoDb are the two most popular distributed datastores used to manage NoSQL data. Both of these technologies are highly scalable and have document-oriented design at the core. There are differences between the two technologies, however, and it’s important to understand these differences in order to choose the right one for your use case. This blog post will examine the differences between these two technologies in a number of critical areas.

Cassandra Monitoring: 6 Best Practices to Pay Attention To

Apache Cassandra is an open-source, distributed database management system specifically built for organizations needing to handle large volumes of data, including when said data is spread across many commodity servers. Cassandra development began at Facebook but later became an open-source Apache project. Now, it’s widely used by some of the biggest enterprises, like Uber, Spotify, eBay, and smaller developer teams.

SQL Server, Part 3: Adopting the principle of least privilege

In the previous blog in this series, we discussed authentication and authorization mechanisms, and how configuring them properly can help secure your databases. In this blog, we’ll talk about how data breaches can be prevented by implementing the principle of least privilege (POLP). According to Verizon’s 2019 Data Breach Investigations Report, insiders account for 76 percent of all compromised database records.

Monitor ProxySQL with Datadog

ProxySQL is a MySQL/MariaDB protocol–compliant load balancer and reverse proxy with native support for a range of popular backends including ClickHouse, Amazon Aurora, and Amazon RDS. ProxySQL efficiently distributes queries to your database servers and caches results, improving resource management and boosting database performance. You can also configure ProxySQL for high availability to reduce downtime.

Top 3 benefits of Apache Cassandra and how to use it

It’s no secret that organisations have a love-hate relationship with data. Decision making can be unguided and market insights can be lost when organisations collect too little data. On the other hand, with large and active datasets, where requests number in the hundreds of thousands, maintaining database performance is increasingly difficult. One open source application, Apache Cassandra, enables organisations to process large volumes of fast moving data in a reliable and scalable way.

Key metrics for PostgreSQL performance monitoring

PostgreSQL offers flexibility on how data is stored and compared in a relational database. This is why it’s so popular among enterprises as a solution for their database requirements. Although PostgreSQL is quite reliable, database problems are inevitable, especially in large-scale environments. Ignoring these problems could result in a plunge in the productivity of your business.

Episode 16: Using Redis for Distributed Sessions in ASP.NET Core

We need distributed session. Spoiler: We DON'T roll it ourselves. In-memory sessions stop working as soon as there is more than one server. Most production environments have more than one server so the session issue needs to be dealt with. There are two options for sessions in a web farm. First, a load balancer can be used to lock each user on a specific box. This lets us continue to use in-memory sessions. The second is switching from in-memory to distributed session storage.

SQL Server, Part 2: Authentication and authorization mechanisms in SQL Server, simplified

In the previous blog of this series, we discussed how monitoring SQL Server activities helps secure databases. The database security can further be reinforced by carefully configuring the authentication and authorization mechanisms for database accesses. In this blog, we’ll briefly explain the various authorization and authentication mechanisms of SQL Server and some best practices you can follow.