How to test if CVE-2015-0204 FREAK SSL security flaw affects you
The CVE-2015-0204 FREAK SSL vulnerability abuses intentionally weak “EXPORT” ciphers which could be used to perform a transparent Man In The Middle attack. (We seem to be continually bombarded with not...
View Article5 free handy tools for monitoring and managing MySQL replication
MySQL Replication is very simple to set up. In this post I’ll discuss its importance and five handy tools for monitoring and managing MySQL replication.What is MySQL Replication? It’s the process of...
View ArticleUsing Cgroups to Limit MySQL and MongoDB memory usage
Quite often, especially for benchmarks, I am trying to limit available memory for a database server (usually for MySQL, but recently for MongoDB also). This is usually needed to test database...
View ArticleMulti-source replication in MySQL 5.7 vs Tungsten Replicator
MySQL 5.7 comes with a new set of features and multi-source replication is one of them. In few words this means that one slave can replicate from different masters simultaneously.During the last couple...
View ArticleIncreasing Cloud Database Efficiency – Like Crows in a Closet
In Mo’ Data, Mo’ Problems, we explored the paradox that “Big Data” projects pose to organizations and how Tokutek is taking an innovative approach to solving those problems. In this post, we’re going...
View ArticlePercona Toolkit and systemd
After some recent work with systemd I’ve realized it’s power and I can come clean that I am a fan. I realize that there are multitudes of posts out there with arguments both for and against systemd but...
View ArticlePercona Server audit log plugin best practices
Auditing your database means tracking access and changes to your data and db objects. The Audit Log Plugin has been shipped with Percona Server since 5.5.37/5.6.17, for a little over 12 months. Prior...
View Article