Top MongoDB Resources
As we continue to announce all the great new features in ClusterControl we have been developing for MongoDB we always want to take a moment to look back at some of the top content from...
Let the new ClusterControl Secure Your MongoDB Deployments
Today we’re happy to tell you about our release of ClusterControl for MongoDB, which completes our vision to let you fully manage MongoDB whether on premise or in the cloud. Our team has spent the...
How to Secure MongoDB From Ransomware – Ten Tips
Following the flurry of blogs, articles and social postings that have been published in recent weeks in response to the attacks on MongoDB systems and related ransomware, we thought we’d clear through the fog and...
Secure MongoDB and Protect Yourself From the Ransom Hack
In this blogpost we look at the recent concerns around MongoDB ransomware and security issues, and how to mitigate this threat to your own MongoDB instance. Recently, various security blogs raised concern that a hacker...
MySQL Database Security Upgrade Instructions for Zero-day Exploit
You must have heard about the CVE-2016-6662, the recent zero-day exploit exposed in most of MySQL and its variants. The vulnerability flaw can be exploited by a remote attacker to inject malicious settings into your...
The Basics of MongoDB Configuration
After covering the deployment of MongoDB in our previous blogpost, we now move on to configuration basics. MongoDB is configured through both the config file (/etc/mongod.conf) and runtime. In the previous blogpost, we mentioned some...
wtmp Log Rotation Settings for Sudo User in ClusterControl
Requires ClusterControl. Applies to all supported database clusters. Applies to all supported operating systems (RHEL/CentOS/Debian/Ubuntu). ClusterControl requires a super-privileged SSH user to provision database nodes. If you are running as non-root user, the corresponding user...
A Guide to MySQL User Management
Requires ClusterControl 1.2.11 or later. Applies to MySQL based clusters. In this example we will look at how you can use ClusterControl to create a user and assign privileges to the user. We will create...
Database Security – How to Fully SSL-Encrypt Your MySQL Galera Cluster
Data security is a hot topic for many companies these days. But for those who need to adhere to security standards like PCI DSS or HIPAA, security is not an option. We showed you sometime...
Integrating ClusterControl with FreeIPA and Windows Active Directory for Authentication
Integrating ClusterControl with a corporate LDAP directory is a common task for many IT organizations. In an earlier blog, we showed you how to integrate ClusterControl with OpenLDAP. In this post, we will show...
How-To and Performance Impacts of SSL-Encrypted Replication Traffic in Galera Cluster for MySQL
Deploying Galera Clusters across WAN environments might lead to concerns around data privacy and security - especially as more organisations are having to comply with national and international regulations. You would not want hackers eavesdropping...
How to Setup Centralized Authentication of ClusterControl Users with LDAP
ClusterControl 1.2.6 introduces integration with Active Directory and LDAP authentication. This allows users to log into ClusterControl by using their corporate credentials instead of a separate password. LDAP groups can be mapped onto ClusterControl user...