Disaster Recovery

Redundancy of Key Services

Redundancy of Key Services

Using a storm to think about system redundancy

Valerie Parham-Thompson

I’m writing this the night before we’re going to get some very bad weather. In North Carolina this time of year, that could mean an ice storm. Ice coats all the big and little branches on all the trees, and then they start to shatter onto roofs and overhead cables. I’ve lived all over the lower 48 and in Alaska, and ice storms are by far the worst, especially in a state that doesn’t bury the electrical lines.

YugabyteDB Snapshots

YugabyteDB Snapshots

Taking snapshots and backups in YugabyteDB

Valerie Parham-Thompson

A distributed database is designed to withstand outages to a good degree. However, you should also maintain backups in case of “oops” scenarios like a dropped table.

The yb-admin tool can be used to manage snapshots. Here’s a brief walkthrough.

Some caveats about using snapshots… They are stored on the same server, so this method doesn’t protect against file system corruption. Also, this doesn’t snapshot the schema, just data.

If you don’t already have a test environment, check out a quick test setup here https://github.com/dataindataout/xtest_ansible.

Audit Logging

Audit Logging

YugabyteDB Friday Tech Talk on fuzzy matching for string searches

Valerie Parham-Thompson

Gearing up for my next YFTT presentation next month. It will be on fuzzy matching, a chance to show out some neat string search features.

Meanwhile, here’s the deck for my last YFTT. The topic was audit logging.

https://info.yugabyte.com/hubfs/YFTT%20Slide%20Decks/2022_12_02_YFTT_Valerie%20Parham-Thompson_Audit%20Logging%20in%20YugabyteDB.pdf

Audit logging is just one of the security features available in YugabyteDB. You can use it to tell you the “who, what, when, where” of actions on your systems. The logs can be then sent to a log analysis system for archiving and correlation with other logs.

PostgreSQL Backups

PostgreSQL Backups

Explore PostgreSQL backup options including pg_dump, pg_dumpall, and pg_basebackup for comprehensive disaster recovery

Valerie Parham-Thompson

PostgreSQL offers multiple backup options, including logical backups with pg_dump and pg_dumpall, and physical backups with pg_basebackup. Regular backups and testing restore procedures are essential for disaster recovery. Continuous archiving and point-in-time recovery provide additional protection and flexibility for critical database environments.

Read more!

Cassandra Backups Using Nodetool

Cassandra Backups Using Nodetool

Learn how to create and manage Cassandra backups using nodetool snapshots for effective disaster recovery planning

Valerie Parham-Thompson

The nodetool utility in Cassandra enables snapshot creation and restoration for backups. Best practices include scheduling regular snapshots, testing restore procedures, and ensuring data consistency. This approach is essential for disaster recovery planning and data protection.

Read more!

Data Encryption at Rest in Oracle MySQL 5.7

Data Encryption at Rest in Oracle MySQL 5.7

Protect sensitive data using key management and encryption algorithms in MySQL 5.7 to secure against unauthorized access

Valerie Parham-Thompson

Data encryption at rest in Oracle MySQL 5.7 protects sensitive information using key management and encryption algorithms. Configuring and managing encryption settings helps secure databases against unauthorized access and meets compliance requirements.

Read more!

New MySQL File System Vulnerabilities

New MySQL File System Vulnerabilities

Learn about recent MySQL file system vulnerabilities and how to protect your data through patches and configuration

Valerie Parham-Thompson

Recent vulnerabilities in MySQL related to file system access pose risks to data security. Understanding affected versions and applying recommended patches or configuration changes helps mitigate these threats and protect sensitive information.

Read more!

Data Encryption at Rest in MariaDB

Data Encryption at Rest in MariaDB

Configure encryption options and manage keys to protect sensitive data and maintain compliance in MariaDB environments

Valerie Parham-Thompson

Implementing data encryption at rest in MariaDB involves configuring encryption options and managing keys. Best practices ensure that sensitive data remains protected, supporting security and compliance in database environments.

Read more!