Remove Best Practices Remove Open Source Remove Servers Remove Traffic
article thumbnail

From Proprietary to Open Source: The Complete Guide to Database Migration

Percona

Migrating a proprietary database to open source is a major decision that can significantly affect your organization. Advantages of migrating to open source For many reasons mentioned earlier, organizations are increasingly shifting towards open source databases for their data management needs.

article thumbnail

MongoDB Security: Top Security Concerns and Best Practices

Percona

If you are using the open-source Percona Distribution for MongoDB , you also have extra features such as LDAP authentication support, which is present in the Enterprise and Atlas MongoDB versions. However, it is available in other open-source versions of MongoDB, such as Percona Server for MongoDB.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

MongoDB Database Backup: Best Practices & Expert Tips

Percona

That’s why it’s essential to implement the best practices and strategies for MongoDB database backups. Also, we will take a look at our open-source backup utility custom-built to help avoid costs and proprietary software – Percona Backup for MongoDB or PBM. Why are MongoDB database backups important?

article thumbnail

MongoDB Best Practices: Security, Data Modeling, & Schema Design

Percona

In this blog post, we will discuss the best practices on the MongoDB ecosystem applied at the Operating System (OS) and MongoDB levels. We’ll also go over some best practices for MongoDB security as well as MongoDB data modeling. A setting of 100 determines it to swap aggressively to disk.

article thumbnail

What is web application security? Everything you need to know.

Dynatrace

A web application is any application that runs on a web server and is accessed by a user through a web browser. Their “ State of Open Source Security Report, 2020 ” found that the most common vulnerabilities are cross-site scripting vulnerabilities (18%), followed by malicious packages (13%). What is web application security?

article thumbnail

The Ultimate Guide to Database High Availability

Percona

Load balancing : Requests are evenly distributed across multiple database servers, ensuring the system remains operational even if one server fails. Automated failover : To keep the database operational and minimize downtime, it automatically switches to a backup server if the primary server fails.

article thumbnail

Understanding What Kubernetes Is Used For: The Key to Cloud-Native Efficiency

Percona

At its core, Kubernetes (often abbreviated as K8s) is an open source tool that automates the deployment, scaling, and management of containerized applications. Applications can be horizontally scaled with Kubernetes by adding or deleting containers based on resource allocation and incoming traffic demands.