Remove Best Practices Remove Document Remove Servers Remove Systems
article thumbnail

Don’t Start Using Your MySQL Server Until You’ve Configured Your OS

Percona

Whenever you install your favorite MySQL server on a freshly created Ubuntu instance, you start by updating the configuration for MySQL, such as configuring buffer pool, changing the default datadir director, and disabling one of the most outstanding features – query cache. It’s a nice thing to do, but first things first.

Servers 116
article thumbnail

Setting Up MongoDB SSL Encryption

Scalegrid

Each section is crafted to elevate your database’s security protocol, from acquiring the necessary SSL certificates to configuring server and client connections. Preparing SSL Certificates for MongoDB The SSL certificates are necessary for our MongoDB server to establish secure SSL/TLS communications.

Servers 130
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Easily monitor your SAP ABAP platform and user experience with Dynatrace (GA)

Dynatrace

SAP estimates that 80% of all worldwide business transactions touch SAP systems in some form. As of today, the SAP ABAP application server remains the central component of the SAP ERP solution. The Dynatrace ActiveGate extension queries SAP servers for key performance counters. Why SAP ABAP platform monitoring in Dynatrace?

article thumbnail

Introducing the Dynatrace SAP ABAP platform monitoring extension (EAP)

Dynatrace

SAP estimates that 80% of all worldwide business transactions touch SAP systems in some form. As of today, the SAP ABAP application server remains the central component of the SAP ERP solution. The Dynatrace ActiveGate extension queries SAP servers for key performance counters. Why SAP ABAP platform monitoring in Dynatrace?

article thumbnail

How Dynatrace protects its software development and delivery life cycle against supply chain attacks

Dynatrace

Source code management systems are only accessible from within the Dynatrace corporate network. The full list of secure development controls, along with many more details, are documented at Dynatrace secure development controls. Only authorized users are able to access code repositories and make changes to source code.

Software 236
article thumbnail

PostgreSQL® Hostname Configuration

Scalegrid

Configure the PostgreSQL hostname by editing configuration files and restarting the server, with secure storage of connection details to enhance security. It represents either an IP address or domain name of the server, where one can find those databases located. Do check your configuration accordingly, however.

Database 130
article thumbnail

Explore the New Feature of MySQL To Restrict Users From Creating a Table Without a Primary Key

Percona

Primary keys play an indispensable role in sound database design by uniquely identifying individual rows and significantly enhancing data retrieval, manipulation, and overall system performance. When a delete or update operation is executed on the primary database, affecting multiple rows, it may execute swiftly on the primary server.

Database 104