Magento 2.2: It's Coming Right For You! | Colorado Magento MeetupKelly Mason
Magento 2.2 is getting ready for official release, let's take a look at some of the improvements and new features included in this platform update. Learn more at: www.customerparadigm.com/magento-2-2-release-notes-colorado-magento-meetup
The document summarizes MySQL high availability (HA) solutions used by bwin games AB. It discusses HA concepts and components, requirements for bwin's database platform, solutions considered including MySQL replication and clustering, and the obstacles with each. Bwin ultimately chose Linux HA due to its free cost and minimal required application changes. The implementation uses shared storage with DRBD and heartbeat across bonded network interfaces. While the solution provides HA, long recovery times still cause interruptions. Faster recovery and multi-master replication are recommended for true high availability.
This presentation discusses caching strategies for Magento websites. It covers using PHP accelerators like APC and Zend Optimizer+ to cache bytecode. It also discusses using Redis or Memcached for Magento cache/session handling instead of files or the database. The presentation recommends configuring a reverse proxy like Nginx or Varnish and using full page caches like Lesti::FPC or Zoom to cache entire pages. It also notes potential issues with full page caches and provides tips for optimizing caching.
Magento scalability from the trenches (Meet Magento Sweden 2016)Divante
This document discusses strategies for scaling a Magento e-commerce platform. It recommends first using vertical scaling by optimizing code and enabling caching before adding additional application and database servers through horizontal scaling. Specific optimizations discussed include using Redis for caching, Varnish for page caching, separating the database to its own server, enabling flat catalog indexing, and implementing master-slave database replication. Proper monitoring tools like New Relic and load testing are also emphasized for identifying bottlenecks during the scaling process.
Architecting for Failures in micro services: patterns and lessons learnedBhakti Mehta
This document provides an overview of architecting microservices for failures based on the presenter's experience. It discusses the path from monoliths to microservices, challenges that emerge at scale including failures, and lessons learned for making systems resilient. The presentation covers failure prevention patterns like circuit breakers, timeouts, retries, and bulkheads. It also discusses monitoring techniques like health checks, metrics, and phased rollouts for new features. The goal is to anticipate failures and design systems that can withstand transient errors and continue functioning.
The document discusses the until-successful scope in Mule applications. The until-successful scope processes messages through its processors until the process succeeds. It runs asynchronously by default. An example Mule application configuration demonstrates using the until-successful scope to retry a database query up to 5 times if it initially fails. The scope will keep retrying until the database query succeeds or the maximum number of retries is reached.
Magento performance & optimisation best practicesPhilippe Humeau
This slide deck covers some of our Magento performances and optimisation best practices as we know them. We (NBS System) host 1800+ Magento shops since 2008, we hope this will help a lot of you to get good performances and enhance your conversion rate. It's not 100% complete coverage since it was a slide deck made for a 1H conference, but if you need more insights, contact us. Happy e-Commerce everyone!
Technical details with lot of numbers. Git, Redmine, Hipchat, 10 654 working hours and more. Now, and only now, you could see background details of very sophisticated e-commerce solution.
Magento 2.2: It's Coming Right For You! | Colorado Magento MeetupKelly Mason
Magento 2.2 is getting ready for official release, let's take a look at some of the improvements and new features included in this platform update. Learn more at: www.customerparadigm.com/magento-2-2-release-notes-colorado-magento-meetup
The document summarizes MySQL high availability (HA) solutions used by bwin games AB. It discusses HA concepts and components, requirements for bwin's database platform, solutions considered including MySQL replication and clustering, and the obstacles with each. Bwin ultimately chose Linux HA due to its free cost and minimal required application changes. The implementation uses shared storage with DRBD and heartbeat across bonded network interfaces. While the solution provides HA, long recovery times still cause interruptions. Faster recovery and multi-master replication are recommended for true high availability.
This presentation discusses caching strategies for Magento websites. It covers using PHP accelerators like APC and Zend Optimizer+ to cache bytecode. It also discusses using Redis or Memcached for Magento cache/session handling instead of files or the database. The presentation recommends configuring a reverse proxy like Nginx or Varnish and using full page caches like Lesti::FPC or Zoom to cache entire pages. It also notes potential issues with full page caches and provides tips for optimizing caching.
Magento scalability from the trenches (Meet Magento Sweden 2016)Divante
This document discusses strategies for scaling a Magento e-commerce platform. It recommends first using vertical scaling by optimizing code and enabling caching before adding additional application and database servers through horizontal scaling. Specific optimizations discussed include using Redis for caching, Varnish for page caching, separating the database to its own server, enabling flat catalog indexing, and implementing master-slave database replication. Proper monitoring tools like New Relic and load testing are also emphasized for identifying bottlenecks during the scaling process.
Architecting for Failures in micro services: patterns and lessons learnedBhakti Mehta
This document provides an overview of architecting microservices for failures based on the presenter's experience. It discusses the path from monoliths to microservices, challenges that emerge at scale including failures, and lessons learned for making systems resilient. The presentation covers failure prevention patterns like circuit breakers, timeouts, retries, and bulkheads. It also discusses monitoring techniques like health checks, metrics, and phased rollouts for new features. The goal is to anticipate failures and design systems that can withstand transient errors and continue functioning.
The document discusses the until-successful scope in Mule applications. The until-successful scope processes messages through its processors until the process succeeds. It runs asynchronously by default. An example Mule application configuration demonstrates using the until-successful scope to retry a database query up to 5 times if it initially fails. The scope will keep retrying until the database query succeeds or the maximum number of retries is reached.
Magento performance & optimisation best practicesPhilippe Humeau
This slide deck covers some of our Magento performances and optimisation best practices as we know them. We (NBS System) host 1800+ Magento shops since 2008, we hope this will help a lot of you to get good performances and enhance your conversion rate. It's not 100% complete coverage since it was a slide deck made for a 1H conference, but if you need more insights, contact us. Happy e-Commerce everyone!
Technical details with lot of numbers. Git, Redmine, Hipchat, 10 654 working hours and more. Now, and only now, you could see background details of very sophisticated e-commerce solution.
Bhakti Mehta presented on architecting microservices for failures and lessons learned. Some key points include:
1) When developing microservices, techniques like circuit breakers, timeouts, retries, and rate limiting can help avoid cascading failures.
2) extensive testing including load testing and failure injection testing should be done before production deployment.
3) After deploying to production, continuous monitoring of metrics and health checks is important to quickly identify issues.
Scaling Confluence Architecture: A Sneak Peek Under the HoodBhakti Mehta
Atlassian’s Confluence is content collaboration software that changes how modern teams work. It is trusted by more than 35,000 teams and millions of users. This session presents a deep dive to provide insights into how the Confluence architecture has evolved into its current form. It discusses how Atlassian deploys, runs, and operates at scale and challenges encountered along the way. Using examples of real-life incidents, the session covers best practices and lessons learned for building resilient, stable, and predictable services. Learn how Atlassian isolated the impact of failures and blast radius by microservice sharding and proper tuning, and hear about strategies for dependency scaling, failure injection, deployment pipelines, and end-to-end testing.
Scalable Web Architectures: Common Patterns and Approaches - Web 2.0 Expo NYCCal Henderson
The document discusses common patterns and approaches for scaling web architectures. It covers topics like load balancing, caching, database scaling through replication and sharding, high availability, and storing large files across multiple servers and data centers. The overall goal is to discuss how to architect systems that can scale horizontally to handle increasing traffic and data sizes.
This is the slide deck for ProcessOne first live XMPP Academy.
Here are the questions covered:
1. ejabberd SaaS architecture questions
- What is the best way to archive user messages if we do not want to sync data from user device?
- Why does ejabberd SaaS not use async mechanisms for archiving messages to customer back-end server?
- Mobile XMPP support: Explain standby, push and detached modes.
2. XMPP / ejabberd questions
- How does ejabberd internally store messages which are not yet delivered?
- How are privacy lists managed in ejabberd?
- What is on the ejabberd roadmap ? OAuth !
MAKING MAGIC WITH ORACLE (Francisco Slide)TheGameZ
This document provides tips and tricks for database administrators (DBAs) related to making magic with Oracle databases. It discusses using the DBMS_ADVANCED_REWRITE package to transform queries and improve performance, protecting sensitive data, creating smaller copies of production databases using Data Pump, performing flashback consistent backups, and using the Data Recovery Advisor to repair failures. It also provides information about the Oracle ACE program for recognizing community contributors.
Setting up a free open source java e-commerce websiteCsaba Toth
History and lessons learned from a startup weekend. How I picked a FOSS e-commerce Java software and set-up a webshop in a weekend from ground zero. Including pushing it into the cloud.
Securing oracle e-business suite 12.1 and 12.2 technology infrastructurevasuballa
The document discusses options for securing Oracle E-Business Suite 12.1 and 12.2, including: defining whitelists of allowed JSPs and redirects; cookie domain scoping; password hashing upgrades; TLS encryption; DMZ configuration; and encrypting SQL traffic. It provides details on configuration files and profiles for hardening various aspects of the applications. The presenter is a principal consultant with experience securing Oracle E-Business Suite.
Security of Oracle EBS - How I can Protect my System (UKOUG APPS 18 edition)Andrejs Prokopjevs
Nowadays having a proper security configuration is a huge challenge, especially looking at the global hacks and personal data leak incidents that happened in IT a while back. Oracle EBS is not perfect and has lots of vulnerabilities covered by Oracle almost every quarter. A very small percent of Apps DBAs know all the features and options available, and usually, do not go over firewall/reverse proxy layer.
This presentation is going to cover an overview and recommendations of options and security features that are available and can be used out-of-the-box, and some of the non-trivial configurations that can help to keep your Oracle EBS system protected, per our experience.
MongoDB World 2019: Why NBCUniversal Migrated to MongoDB AtlasMongoDB
NBCUniversal, a worldwide mass media corporation, was looking for a more affordable and easier way to manage their database solution that hosts their extensive online digital assets. With Datavail’s assistance, NBCUniversal, made the move from MongoDB 3.6 to MongoDB Atlas on AWS.
1) The document discusses an Oracle MySQL OEM Tech Tour that took place in Lima, Peru in November 2013. It includes contact information for various MySQL team members from Oracle.
2) It then lists the top 10 reasons for using MySQL and discusses MySQL editions, trends, large data volumes, and editions of MySQL between Enterprise and Open Source.
3) Finally, it discusses how to become an ISV partner and thanks attendees. The document appears to be from a presentation promoting Oracle's MySQL database products and services.
The true value of data is found not in the quantity obtained but in the analysis that provides insight and challenges your organization to continually drive innovation.
Learn how to build and actually leverage your databases to identify, capture, and analyze data, finding valuable business insights by creating an analytics environment where users can easily share insights, collaborate, and access reports from any location. From the C-Suite to your core IT professionals and business analysts, craft a data analytics plan that scales across your entire organization.
Single Sign-On (SSO) is not an optional feature for APEX applications according to the speaker. The document discusses how SSO using Kerberos works by having APEX applications authenticate users through Active Directory without passing credentials to the database. Some caveats are mentioned such as how to handle users not in AD. Additional information resources are provided to learn more about Kerberos, mod_auth_kerb, and other SSO options.
LAMP
Cegonsoft Pvt. Ltd., is an emerging IT services and HR Consultancy firm, headquartered in the Silicon Valley of India, Bangalore and Coimbatore.
Linux, Apache, MySQL, PHP/Perl (LAMP) are the ideal platform for rapid development of small to large scale websites and web based applications.
• Linux as an operating system is most often used to run servers and it can give high performance on limited hardware resources
• Apache is open source based web server which is also the most widely server
• MySQL is also open source relational database which is well known for its reliability and free availability
• PHP is the programming language of the web, with high performance rapid development capabilities
• PERL is one of most flexible languages to develop applications faster
LAMP stacks for development parallel to Java/J2EE and Microsoft .Net architectures. And turns out to be cheaper option to get the same functionally since the complete stack is based on open source applications.
1)Capabilities
Cegonsoft has successfully developed many systems on LAMP technology stack. Partnering with Cegonsoft for your web application and website development needs enables you to harness our vast experience on LAMP technologies while avoiding associated pitfalls.
Our Cegonsoft on LAMP constantly evaluates and shares experiences on technology and frameworks to comprehend the benefits and problems.
Cegonsoft has high levels of maturity and expertise in application design, open-source frameworks, methodologies and implementation on LAMP. We offer project development, maintenance and support of LAMP-based applications. Cegonsoft brings in superior skills in modern web-based technologies, databases and programming languages and has successfully delivered technically challenging and complex LAMP assignments across multiple domains.
We have extensive experience on following hybrid systems:
• LAMP - Linux + Apache + MySQL + PHP
• LAOP - Linux + Apache + Oracle + PHP
• LAPP - Linux + Apache + Postgress + PHP
• WAMP - Windows + Apache + MySQL + PHP
2)Web Technologies used in LAMP Projects
We have extensively used the following web technologies in LAMP projects:
• Web 2.0 solutions
• Ajax
• Web services
• JSON
• XML
• Flash - Action Scripting
• Open source javascript activewidget
• javascript overlib
• CSS
Thanks & Regards:
SATHYAN P
Technical Associate,
Cegonsoft Pvt.Ltd,
Ramnagar,Coimbatore- 641009.
Website: www.cegonsoft.com
phone:+91 – 9600081201,9629055784.
Exploiting Active Directory Administrator InsecuritiesPriyanka Aash
"Defenders have been slowly adapting to the new reality: Any organization is a target. They bought boxes that blink and software that floods the SOC with alerts. None of this matters as much as how administration is performed: Pop an admin, own the system. Admins are being dragged into a new paradigm where they have to more securely administer the environment. What does this mean for the pentester or Red Teamer?
Admins are gradually using better methods like two-factor and more secure administrative channels. Security is improving at many organizations, often quite rapidly. If we can quickly identify the way that administration is being performed, we can better highlight the flaws in the admin process.
This talk explores some common methods Active Directory administrators (and others) use to protect their admin credentials and the flaws with these approaches. New recon methods will be provided on how to identify if the org uses an AD Red Forest (aka Admin Forest) and what that means for one hired to test the organization's defenses, as well as how to successfully avoid the Red Forest and still be successful on an engagement.
Some of the areas explored in this talk:
Current methods organizations use to administer Active Directory and the weaknesses around them.
Using RODCs in the environment in ways the organization didn't plan for (including persistence).
Exploiting access to agents typically installed on Domain Controllers and other highly privileged systems to run/install code when that's not their typical purpose.
Discovering and exploiting an AD forest that leverages an AD Admin Forest (aka Red Forest) without touching the Admin Forest.
If you are wondering how to pentest/red team against organizations that are improving their defenses, this talk is for you. If you are a blue team looking for inspiration on effective defenses, this talk is also for you to gain better insight into how you can be attacked."
Single Sign-On for APEX applications based on Kerberos (Important: latest ver...Niels de Bruijn
This document provides instructions for setting up single sign-on (SSO) for Oracle Application Express (APEX) applications using Kerberos authentication. It describes:
1) Configuring an Apache web server with mod_auth_kerb on Linux to authenticate against a Windows Active Directory server without requiring additional credentials.
2) Configuring Tomcat, ORDS, and APEX to work with the Kerberos authentication.
3) Optional additional configurations for Windows with IIS or for verifying group membership.
The document describes implementing a high availability APEX environment using Oracle RAC and ACFS. Key aspects included using RAC to secure the database across multiple nodes, running APEX within a container database to isolate environments, and leveraging ACFS for shared storage of static files to allow load balancing across web servers on different nodes. The new environment provides high availability, high performance, and is dedicated solely for APEX.
Webinar Slides: MySQL HA/DR/Geo-Scale - High Noon #2: Galera ClusterContinuent
Galera Cluster vs. Continuent Tungsten Clusters
Building a Geo-Scale, Multi-Region and Highly Available MySQL Cloud Back-End
This second installment of our High Noon series of on-demand webinars is focused on Galera Cluster (including MariaDB Cluster & Percona XtraDB Cluster). It looks at some of the key characteristics of Galera Cluster and how it fares as a MySQL HA / DR / Geo-Scale solution, especially when compared to Continuent Tungsten Clustering.
Watch this webinar to learn how to do better MySQL HA / DR / Geo-Scale.
AGENDA
- Goals for the High Noon Webinar Series
- High Noon Series: Tungsten Clustering vs Others
- Galera Cluster (aka MariaDB Cluster & Percona XtraDB Cluster)
- Key Characteristics
- Certification-based Replication
- Galera Multi-Site Requirements
- Limitations Using Galera Cluster
- How to do better MySQL HA / DR / Geo-Scale?
- Galera Cluster vs Tungsten Clustering
- About Continuent & Its Solutions
PRESENTER
Matthew Lang - Customer Success Director – Americas, Continuent - has over 25 years of experience in database administration, database programming, and system architecture, including the creation of a database replication product that is still in use today. He has designed highly available, scaleable systems that have allowed startups to quickly become enterprise organizations, utilizing a variety of technologies including open source projects, virtualization and cloud.
This document discusses MySQL Fabric, a framework from Oracle for managing high availability and sharding of MySQL servers. MySQL Fabric provides transparent failover between primary and secondary MySQL servers using asynchronous replication. It also allows optional sharding of data across multiple server groups for horizontal scaling out. The document outlines the key capabilities and architecture of MySQL Fabric.
Bhakti Mehta presented on architecting microservices for failures and lessons learned. Some key points include:
1) When developing microservices, techniques like circuit breakers, timeouts, retries, and rate limiting can help avoid cascading failures.
2) extensive testing including load testing and failure injection testing should be done before production deployment.
3) After deploying to production, continuous monitoring of metrics and health checks is important to quickly identify issues.
Scaling Confluence Architecture: A Sneak Peek Under the HoodBhakti Mehta
Atlassian’s Confluence is content collaboration software that changes how modern teams work. It is trusted by more than 35,000 teams and millions of users. This session presents a deep dive to provide insights into how the Confluence architecture has evolved into its current form. It discusses how Atlassian deploys, runs, and operates at scale and challenges encountered along the way. Using examples of real-life incidents, the session covers best practices and lessons learned for building resilient, stable, and predictable services. Learn how Atlassian isolated the impact of failures and blast radius by microservice sharding and proper tuning, and hear about strategies for dependency scaling, failure injection, deployment pipelines, and end-to-end testing.
Scalable Web Architectures: Common Patterns and Approaches - Web 2.0 Expo NYCCal Henderson
The document discusses common patterns and approaches for scaling web architectures. It covers topics like load balancing, caching, database scaling through replication and sharding, high availability, and storing large files across multiple servers and data centers. The overall goal is to discuss how to architect systems that can scale horizontally to handle increasing traffic and data sizes.
This is the slide deck for ProcessOne first live XMPP Academy.
Here are the questions covered:
1. ejabberd SaaS architecture questions
- What is the best way to archive user messages if we do not want to sync data from user device?
- Why does ejabberd SaaS not use async mechanisms for archiving messages to customer back-end server?
- Mobile XMPP support: Explain standby, push and detached modes.
2. XMPP / ejabberd questions
- How does ejabberd internally store messages which are not yet delivered?
- How are privacy lists managed in ejabberd?
- What is on the ejabberd roadmap ? OAuth !
MAKING MAGIC WITH ORACLE (Francisco Slide)TheGameZ
This document provides tips and tricks for database administrators (DBAs) related to making magic with Oracle databases. It discusses using the DBMS_ADVANCED_REWRITE package to transform queries and improve performance, protecting sensitive data, creating smaller copies of production databases using Data Pump, performing flashback consistent backups, and using the Data Recovery Advisor to repair failures. It also provides information about the Oracle ACE program for recognizing community contributors.
Setting up a free open source java e-commerce websiteCsaba Toth
History and lessons learned from a startup weekend. How I picked a FOSS e-commerce Java software and set-up a webshop in a weekend from ground zero. Including pushing it into the cloud.
Securing oracle e-business suite 12.1 and 12.2 technology infrastructurevasuballa
The document discusses options for securing Oracle E-Business Suite 12.1 and 12.2, including: defining whitelists of allowed JSPs and redirects; cookie domain scoping; password hashing upgrades; TLS encryption; DMZ configuration; and encrypting SQL traffic. It provides details on configuration files and profiles for hardening various aspects of the applications. The presenter is a principal consultant with experience securing Oracle E-Business Suite.
Security of Oracle EBS - How I can Protect my System (UKOUG APPS 18 edition)Andrejs Prokopjevs
Nowadays having a proper security configuration is a huge challenge, especially looking at the global hacks and personal data leak incidents that happened in IT a while back. Oracle EBS is not perfect and has lots of vulnerabilities covered by Oracle almost every quarter. A very small percent of Apps DBAs know all the features and options available, and usually, do not go over firewall/reverse proxy layer.
This presentation is going to cover an overview and recommendations of options and security features that are available and can be used out-of-the-box, and some of the non-trivial configurations that can help to keep your Oracle EBS system protected, per our experience.
MongoDB World 2019: Why NBCUniversal Migrated to MongoDB AtlasMongoDB
NBCUniversal, a worldwide mass media corporation, was looking for a more affordable and easier way to manage their database solution that hosts their extensive online digital assets. With Datavail’s assistance, NBCUniversal, made the move from MongoDB 3.6 to MongoDB Atlas on AWS.
1) The document discusses an Oracle MySQL OEM Tech Tour that took place in Lima, Peru in November 2013. It includes contact information for various MySQL team members from Oracle.
2) It then lists the top 10 reasons for using MySQL and discusses MySQL editions, trends, large data volumes, and editions of MySQL between Enterprise and Open Source.
3) Finally, it discusses how to become an ISV partner and thanks attendees. The document appears to be from a presentation promoting Oracle's MySQL database products and services.
The true value of data is found not in the quantity obtained but in the analysis that provides insight and challenges your organization to continually drive innovation.
Learn how to build and actually leverage your databases to identify, capture, and analyze data, finding valuable business insights by creating an analytics environment where users can easily share insights, collaborate, and access reports from any location. From the C-Suite to your core IT professionals and business analysts, craft a data analytics plan that scales across your entire organization.
Single Sign-On (SSO) is not an optional feature for APEX applications according to the speaker. The document discusses how SSO using Kerberos works by having APEX applications authenticate users through Active Directory without passing credentials to the database. Some caveats are mentioned such as how to handle users not in AD. Additional information resources are provided to learn more about Kerberos, mod_auth_kerb, and other SSO options.
LAMP
Cegonsoft Pvt. Ltd., is an emerging IT services and HR Consultancy firm, headquartered in the Silicon Valley of India, Bangalore and Coimbatore.
Linux, Apache, MySQL, PHP/Perl (LAMP) are the ideal platform for rapid development of small to large scale websites and web based applications.
• Linux as an operating system is most often used to run servers and it can give high performance on limited hardware resources
• Apache is open source based web server which is also the most widely server
• MySQL is also open source relational database which is well known for its reliability and free availability
• PHP is the programming language of the web, with high performance rapid development capabilities
• PERL is one of most flexible languages to develop applications faster
LAMP stacks for development parallel to Java/J2EE and Microsoft .Net architectures. And turns out to be cheaper option to get the same functionally since the complete stack is based on open source applications.
1)Capabilities
Cegonsoft has successfully developed many systems on LAMP technology stack. Partnering with Cegonsoft for your web application and website development needs enables you to harness our vast experience on LAMP technologies while avoiding associated pitfalls.
Our Cegonsoft on LAMP constantly evaluates and shares experiences on technology and frameworks to comprehend the benefits and problems.
Cegonsoft has high levels of maturity and expertise in application design, open-source frameworks, methodologies and implementation on LAMP. We offer project development, maintenance and support of LAMP-based applications. Cegonsoft brings in superior skills in modern web-based technologies, databases and programming languages and has successfully delivered technically challenging and complex LAMP assignments across multiple domains.
We have extensive experience on following hybrid systems:
• LAMP - Linux + Apache + MySQL + PHP
• LAOP - Linux + Apache + Oracle + PHP
• LAPP - Linux + Apache + Postgress + PHP
• WAMP - Windows + Apache + MySQL + PHP
2)Web Technologies used in LAMP Projects
We have extensively used the following web technologies in LAMP projects:
• Web 2.0 solutions
• Ajax
• Web services
• JSON
• XML
• Flash - Action Scripting
• Open source javascript activewidget
• javascript overlib
• CSS
Thanks & Regards:
SATHYAN P
Technical Associate,
Cegonsoft Pvt.Ltd,
Ramnagar,Coimbatore- 641009.
Website: www.cegonsoft.com
phone:+91 – 9600081201,9629055784.
Exploiting Active Directory Administrator InsecuritiesPriyanka Aash
"Defenders have been slowly adapting to the new reality: Any organization is a target. They bought boxes that blink and software that floods the SOC with alerts. None of this matters as much as how administration is performed: Pop an admin, own the system. Admins are being dragged into a new paradigm where they have to more securely administer the environment. What does this mean for the pentester or Red Teamer?
Admins are gradually using better methods like two-factor and more secure administrative channels. Security is improving at many organizations, often quite rapidly. If we can quickly identify the way that administration is being performed, we can better highlight the flaws in the admin process.
This talk explores some common methods Active Directory administrators (and others) use to protect their admin credentials and the flaws with these approaches. New recon methods will be provided on how to identify if the org uses an AD Red Forest (aka Admin Forest) and what that means for one hired to test the organization's defenses, as well as how to successfully avoid the Red Forest and still be successful on an engagement.
Some of the areas explored in this talk:
Current methods organizations use to administer Active Directory and the weaknesses around them.
Using RODCs in the environment in ways the organization didn't plan for (including persistence).
Exploiting access to agents typically installed on Domain Controllers and other highly privileged systems to run/install code when that's not their typical purpose.
Discovering and exploiting an AD forest that leverages an AD Admin Forest (aka Red Forest) without touching the Admin Forest.
If you are wondering how to pentest/red team against organizations that are improving their defenses, this talk is for you. If you are a blue team looking for inspiration on effective defenses, this talk is also for you to gain better insight into how you can be attacked."
Single Sign-On for APEX applications based on Kerberos (Important: latest ver...Niels de Bruijn
This document provides instructions for setting up single sign-on (SSO) for Oracle Application Express (APEX) applications using Kerberos authentication. It describes:
1) Configuring an Apache web server with mod_auth_kerb on Linux to authenticate against a Windows Active Directory server without requiring additional credentials.
2) Configuring Tomcat, ORDS, and APEX to work with the Kerberos authentication.
3) Optional additional configurations for Windows with IIS or for verifying group membership.
The document describes implementing a high availability APEX environment using Oracle RAC and ACFS. Key aspects included using RAC to secure the database across multiple nodes, running APEX within a container database to isolate environments, and leveraging ACFS for shared storage of static files to allow load balancing across web servers on different nodes. The new environment provides high availability, high performance, and is dedicated solely for APEX.
Webinar Slides: MySQL HA/DR/Geo-Scale - High Noon #2: Galera ClusterContinuent
Galera Cluster vs. Continuent Tungsten Clusters
Building a Geo-Scale, Multi-Region and Highly Available MySQL Cloud Back-End
This second installment of our High Noon series of on-demand webinars is focused on Galera Cluster (including MariaDB Cluster & Percona XtraDB Cluster). It looks at some of the key characteristics of Galera Cluster and how it fares as a MySQL HA / DR / Geo-Scale solution, especially when compared to Continuent Tungsten Clustering.
Watch this webinar to learn how to do better MySQL HA / DR / Geo-Scale.
AGENDA
- Goals for the High Noon Webinar Series
- High Noon Series: Tungsten Clustering vs Others
- Galera Cluster (aka MariaDB Cluster & Percona XtraDB Cluster)
- Key Characteristics
- Certification-based Replication
- Galera Multi-Site Requirements
- Limitations Using Galera Cluster
- How to do better MySQL HA / DR / Geo-Scale?
- Galera Cluster vs Tungsten Clustering
- About Continuent & Its Solutions
PRESENTER
Matthew Lang - Customer Success Director – Americas, Continuent - has over 25 years of experience in database administration, database programming, and system architecture, including the creation of a database replication product that is still in use today. He has designed highly available, scaleable systems that have allowed startups to quickly become enterprise organizations, utilizing a variety of technologies including open source projects, virtualization and cloud.
This document discusses MySQL Fabric, a framework from Oracle for managing high availability and sharding of MySQL servers. MySQL Fabric provides transparent failover between primary and secondary MySQL servers using asynchronous replication. It also allows optional sharding of data across multiple server groups for horizontal scaling out. The document outlines the key capabilities and architecture of MySQL Fabric.
This document discusses different approaches to achieving high availability with MariaDB databases, including replication, Galera clusters, and MaxScale load balancing. It describes asynchronous and semi-synchronous replication topologies that provide redundancy and enable failover. Synchronous replication with Galera clusters is discussed as another option that ensures all nodes remain in sync with no data loss. MaxScale is presented as a tool that can monitor MariaDB topologies and perform load balancing and failover across nodes.
Cloud-Native Patterns and the Benefits of MySQL as a Platform Managed ServiceVMware Tanzu
You can’t have cloud-native applications without a modern approach to databases and backing services. Data professionals are looking for ways to transform how databases are provisioned and managed.
In this webinar, we’ll cover practical strategies you can employ to deliver improved business agility at the data layer. We’ll discuss the impact that microservices are having in the enterprise, and what this means for MySQL and other popular databases. Join us and learn the answers to these common questions:
● How can you meet the operational challenge of scaling the number of MySQL database instances and managing the fleet?
● Adding to this scale challenge, how can your MySQL instances maintain availability in a world where the underlying IT infrastructure is ephemeral?
● How can you secure data in motion?
● How can you enable self-service while maintaining control and governance?
We’ll cover these topics and share how enterprises like yours are delivering greater outcomes with our Pivotal Platform managed MySQL.
Now you can scale without fear of failure.
Presenters:
Judy Wang, Product Management
Jagdish Mirani, Product Marketing
PoC: Using a Group Communication System to improve MySQL Replication HAUlf Wendel
High Availability solutions for MySQL Replication are either simple to use but introduce a single point of failure or free of pitfalls but complex and hard to use. The Proof-of-Concept sketches a way in the middle. For monitoring a group communication system is embedded into MySQL usng a MySQL plugin which eliminates the monitoring SPOF and is easy to use. Much emphasis is put of the often neglected client side. The PoC shows an architecture in which clients reconfigure themselves dynamically. No client deployment is required.
A nova versão do MySQL traz muitas melhorias, principalmente nos recursos de alta-disponibilidade. Nesta palestra abordamos:
- opções para implementar alta disponibilidade no MySQL 5.7;
- topologias e arquiteturas de referência;
- boas práticas de gerenciamento.
MySQL Scalability and Reliability for Replicated EnvironmentJean-François Gagné
This summary provides an overview of the key points from the document:
1. The document is a presentation on MySQL replication scalability and reliability given at dataops.barcelona in June 2019. It covers topics like introduction to replication, use cases for replication like read scaling and high availability, and best practices.
2. The presentation provides an overview of MySQL replication including what it is, why you would use it, and how it works at a high level. It also discusses tools for monitoring and visualizing replication topology.
3. Challenges like replication lag are discussed along with techniques to prevent and address lag, such as transaction design practices and throttling. Advanced topics like parallel replication are also mentioned.
MySQL High Availability Solutions - Feb 2015 webinarAndrew Morgan
How important is your data? Can you afford to lose it? What about just some of it? What would be the impact if you couldn’t access it for a minute, an hour, a day or a week?
Different applications can have very different requirements for High Availability. Some need 100% data reliability with 24x7x365 read & write access while many others are better served by a simpler approach with more modest HA ambitions.
MySQL has an array of High Availability solutions ranging from simple backups, through replication and shared storage clustering – all the way up to 99.999% available shared nothing, geographically replicated clusters. These solutions also have different ‘bonus’ features such as full InnoDB compatibility, in-memory real-time performance, linear scalability and SQL & NoSQL APIs.
The purpose of this presentation is to help you decide where your application sits in terms of HA requirements and discover which of the MySQL solutions best fit the bill. It will also cover what you need outside of the database to ensure High Availability – state of the art monitoring being a prime example.
M|18 Choosing the Right High Availability Strategy for YouMariaDB plc
This document discusses MariaDB high availability strategies including replication, failover, and clustering. It defines key HA terminology and describes different replication topologies like asynchronous, semi-synchronous, and synchronous replication using Galera cluster. Use cases provided show how geographically distributed and production control systems benefit from MariaDB HA features.
Continuent Tungsten - Scalable Saa S Data Managementguest2e11e8
The key needs of SaaS vendors include:
i) managing multi-tenant architectures with shared DBMS, ii) maintaining customer SLAs for uptime and performance and iii) optimized, efficient operations.
The key benefits Continuent Tungsten offers SaaS vendors are:
i) high availability and protection from data loss, ii) simple, efficient cluster management and iii) enable complex database topologies.
Tungsten offers high-availability, database cluster management and management of complex topologies for multi-tenant architectures.
Tungsten high availability and data protection features include maintaining live copies with data consistency checking and tightly coupled backup/restore integration with cluster management tools.
Tungsten cluster management allows SaaS vendors to migrate customers and perform system upgrades without downtime, thus enabling these maintenance operations during normal business hours.
Tungsten also enables complex replication topologies, including data filtering and data archiving strategies, maintaining extra data copies for data-marts, routing different customers to different DBMS copies, and providing cross-site multi-master replication.
Database failover from client perspectivePriit Piipuu
In this presentation we will look deep into high availability technologies Oracle RAC provides for database clients, what actually happens during database instance failover or planned maintenance and how to configure database services so that Java applications experience no or minimal disruption during planned maintenance or unplanned downtime. This presentation will mainly focus on JDBC and UCP clients.
1- Introduction about Database Mirroring Concept
2- Reference (8 Blogs )
3- Note
4- Database mirroring operation mode
5- Database Mirroring Requirement
6- Advantage of Database Mirroring
7- Disadvantage of Database Mirroring
8- Database Mirroring Enhancement in SQL Server 2008
9- Database Mirroring Installation Step by Step
10- High Availability Mode [Automatic Failover]
11- High Availability Mode [Manual Failover]
12- High Safety Mode Without witness server [Manual Failover]
13- Stander listener port in database mirroring
14- Check SQL server mirroring availability
15- Add or replace witness server to an existing mirroring database
16- How to monitor Database Mirroring
17- Mirroring in workshop not in DC (Domain Controller)
Webinar slides: Replication Topology Changes for MySQL and MariaDBSeveralnines
This document discusses replication topology changes for MySQL and MariaDB databases. It covers making changes using GTID or regular replication, the failover process, and tools like MaxScale and ProxySQL that can help automate query rerouting during a failover. Specific topics covered include reslaving nodes, setting up master-master replication, and performing both offline and online failovers.
200 million qps on commodity hardware : Getting started with MySQL Cluster 7.4Frazer Clement
MySQL Cluster 7.4 has been benchmarked executing over 200 million queries per second on commodity hardware. This presentation from Oracle OpenWorld 2015 describes MySQL Cluster's architecture and gives some detail on how this benchmark was achieved, as well as some tips on getting started with MySQL Cluster 7.4.
Marketing Automation at Scale: How Marketo Solved Key Data Management Challen...Continuent
Marketo uses Continuent Tungsten to solve key data management challenges at scale. Tungsten provides high availability, online maintenance, and parallel replication to allow Marketo to process over 600 million MySQL transactions per day across more than 7TB of data without downtime. Tungsten's innovative caching and sharding techniques help replicas keep up with Marketo's high transaction volumes and uneven tenant sizes. The solution has enabled fast failover, rolling maintenance, and scaling to thousands of customers.
Pacemaker is a high availability cluster resource manager that can be used to provide high availability for MySQL databases. It monitors MySQL instances and replicates data between nodes using replication. If the primary MySQL node fails, Pacemaker detects the failure and fails over to the secondary node, bringing the MySQL service back online without downtime. Pacemaker manages shared storage and virtual IP failover to ensure connections are direct to the active MySQL node. It is important to monitor replication state and lag to ensure data consistency between nodes.
Become a MySQL DBA - webinar series - slides: Which High Availability solution?Severalnines
There are many many approaches to MySQL high availability - from traditional, loosely-coupled database setups based on asynchronous replication to more modern, tightly-coupled architectures based on synchronous replication. These offer varying degrees of protection, and DBAs almost always have to choose a trade-off between high-availability and cost.
In this webinar, we looked at some of the most widely used HA alternatives in the MySQL world and discuss their pros and cons.
AGENDA
- HA - what is it?
- Caching layer
- HA solutions
• MySQL Replication
• MySQL Cluster
• Galera Cluster
• Hybrid Replication
- Proxy layer
• HAProxy
• MaxScale
• Elastic Load Balancer (AWS)
- Common issues
• Split brain scenarios
• GTID-based failover and Errant Transactions
Comparing the TCO of HP NonStop with Oracle RACThomas Burg
HP NonStop is often (wrongly!) perceived as "expensive", specifically compared with the combination of "vanilla X86 hardware" and the Oracle RAC DB offering.
This presentation talks about an in-depth analysis HP did to compare the two offerings fair and square. You might be surprised at the results ...
Choosing the right high availability strategyMariaDB plc
- MariaDB provides several high availability options including asynchronous replication, semi-synchronous replication, Galera synchronous replication, and MaxScale for load balancing and failover.
- Asynchronous replication allows for read scaling but carries a risk of data loss during failover. Semi-synchronous replication reduces this risk by ensuring data is written to at least one slave before confirming to the client.
- Galera synchronous multi-master replication ensures all nodes remain in sync with no data loss but can impact performance. MaxScale helps manage replication topology and perform automated failovers.
Similar to EXPERIENCE WITH MYSQL HA SOLUTION AND GROUP REPLICATION (20)
This document provides a summary of JSON improvements in MySQL 8.0. It discusses MySQL's support for the JSON data type and functions for formatting, manipulating, searching and collecting statistics on JSON documents. Key changes and improvements in MySQL 8.0 include faster JSON updates and replication using partial JSON updates, new functions for transforming JSON to relational data and removing ambiguity, and performance optimizations. The document also provides examples of common JSON functions for formatting, manipulating, searching and collecting stats on JSON documents.
The document discusses MySQL Document Store, which allows users to work with both SQL relational tables and schema-less JSON collections using CRUD operations. It provides the flexibility of NoSQL with the consistency of a relational database management system (RDBMS). Key components include the MySQL Shell, X DevAPI, X Protocol, and X Plugin. The X Plugin enables communication using the X Protocol for both relational and document operations, mapping CRUD operations to tables.
The document discusses setting up MySQL InnoDB Cluster using MySQL Shell. It describes deploying MySQL server instances, creating an InnoDB Cluster, adding more instances to the cluster, and bootstrapping MySQL Router. This provides an integrated high availability and scaling solution using Group Replication for data replication within the cluster.
The document discusses new features in MySQL 8.0 including a document store for JSON documents, common table expressions and window functions, improved performance, replication enhancements, and role-based access control. It provides examples of how MySQL 8.0 offers both SQL and NoSQL capabilities through the addition of a document store and improved JSON functions and performance.
This document discusses using Docker to deploy MySQL servers. It begins with explaining what Docker is and key terminology like images, containers and commands. It then discusses the MySQL Docker images, contents and how to pull them. It demonstrates how to start a MySQL server container with options, connect to it, view logs and stop/remove the container. Finally, it discusses environment variables that can be used and provides an overview of upgrading MySQL within Docker.
The document discusses new improvements to the parser and optimizer in MySQL 5.7. Key points include:
1) The parser and optimizer were refactored for improved maintainability and stability. Parsing was separated from optimization and execution.
2) The cost model was improved with better record estimation for joins, configurable cost constants, and additional explain output.
3) A new query rewrite plugin allows rewriting queries without changing application code.
Venkatesh Duggirala from the MySQL Replication Team gave a presentation on Multi Source Replication. The presentation covered the background on why replication is used, an introduction to multi-source replication including how a slave can have multiple masters, use cases like data aggregation, and technical details on how channels and slave appliers work in multi-source replication. Monitoring of multi-source replication was also discussed.
Mysql User Camp : 20-June-14 : Mysql New features and NoSQL SupportMysql User Camp
This slide was presented at Mysql User Camp Event on 20-June-14 at Oracle bangalore. This presentation gives a good insight about New Features in Mysql 5.7 DMR 4 and Nosql Support in Mysql.
This document provides an overview and agenda for a presentation on database sharding. It discusses how sharding can help with scaling databases to handle increasing load. It describes the key components of a sharded database solution like shards, switches, and state stores. It also covers important aspects of implementing sharding like transaction handling, mapping sharding keys, and handling queries across sharded tables.
Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...PriyankaKilaniya
Energy efficiency has been important since the latter part of the last century. The main object of this survey is to determine the energy efficiency knowledge among consumers. Two separate districts in Bangladesh are selected to conduct the survey on households and showrooms about the energy and seller also. The survey uses the data to find some regression equations from which it is easy to predict energy efficiency knowledge. The data is analyzed and calculated based on five important criteria. The initial target was to find some factors that help predict a person's energy efficiency knowledge. From the survey, it is found that the energy efficiency awareness among the people of our country is very low. Relationships between household energy use behaviors are estimated using a unique dataset of about 40 households and 20 showrooms in Bangladesh's Chapainawabganj and Bagerhat districts. Knowledge of energy consumption and energy efficiency technology options is found to be associated with household use of energy conservation practices. Household characteristics also influence household energy use behavior. Younger household cohorts are more likely to adopt energy-efficient technologies and energy conservation practices and place primary importance on energy saving for environmental reasons. Education also influences attitudes toward energy conservation in Bangladesh. Low-education households indicate they primarily save electricity for the environment while high-education households indicate they are motivated by environmental concerns.
This study Examines the Effectiveness of Talent Procurement through the Imple...DharmaBanothu
In the world with high technology and fast
forward mindset recruiters are walking/showing interest
towards E-Recruitment. Present most of the HRs of
many companies are choosing E-Recruitment as the best
choice for recruitment. E-Recruitment is being done
through many online platforms like Linkedin, Naukri,
Instagram , Facebook etc. Now with high technology E-
Recruitment has gone through next level by using
Artificial Intelligence too.
Key Words : Talent Management, Talent Acquisition , E-
Recruitment , Artificial Intelligence Introduction
Effectiveness of Talent Acquisition through E-
Recruitment in this topic we will discuss about 4important
and interlinked topics which are
Generative AI Use cases applications solutions and implementation.pdfmahaffeycheryld
Generative AI solutions encompass a range of capabilities from content creation to complex problem-solving across industries. Implementing generative AI involves identifying specific business needs, developing tailored AI models using techniques like GANs and VAEs, and integrating these models into existing workflows. Data quality and continuous model refinement are crucial for effective implementation. Businesses must also consider ethical implications and ensure transparency in AI decision-making. Generative AI's implementation aims to enhance efficiency, creativity, and innovation by leveraging autonomous generation and sophisticated learning algorithms to meet diverse business challenges.
https://www.leewayhertz.com/generative-ai-use-cases-and-applications/
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELijaia
As digital technology becomes more deeply embedded in power systems, protecting the communication
networks of Smart Grids (SG) has emerged as a critical concern. Distributed Network Protocol 3 (DNP3)
represents a multi-tiered application layer protocol extensively utilized in Supervisory Control and Data
Acquisition (SCADA)-based smart grids to facilitate real-time data gathering and control functionalities.
Robust Intrusion Detection Systems (IDS) are necessary for early threat detection and mitigation because
of the interconnection of these networks, which makes them vulnerable to a variety of cyberattacks. To
solve this issue, this paper develops a hybrid Deep Learning (DL) model specifically designed for intrusion
detection in smart grids. The proposed approach is a combination of the Convolutional Neural Network
(CNN) and the Long-Short-Term Memory algorithms (LSTM). We employed a recent intrusion detection
dataset (DNP3), which focuses on unauthorized commands and Denial of Service (DoS) cyberattacks, to
train and test our model. The results of our experiments show that our CNN-LSTM method is much better
at finding smart grid intrusions than other deep learning algorithms used for classification. In addition,
our proposed approach improves accuracy, precision, recall, and F1 score, achieving a high detection
accuracy rate of 99.50%.
Determination of Equivalent Circuit parameters and performance characteristic...pvpriya2
Includes the testing of induction motor to draw the circle diagram of induction motor with step wise procedure and calculation for the same. Also explains the working and application of Induction generator
Open Channel Flow: fluid flow with a free surfaceIndrajeet sahu
Open Channel Flow: This topic focuses on fluid flow with a free surface, such as in rivers, canals, and drainage ditches. Key concepts include the classification of flow types (steady vs. unsteady, uniform vs. non-uniform), hydraulic radius, flow resistance, Manning's equation, critical flow conditions, and energy and momentum principles. It also covers flow measurement techniques, gradually varied flow analysis, and the design of open channels. Understanding these principles is vital for effective water resource management and engineering applications.
Road construction is not as easy as it seems to be, it includes various steps and it starts with its designing and
structure including the traffic volume consideration. Then base layer is done by bulldozers and levelers and after
base surface coating has to be done. For giving road a smooth surface with flexibility, Asphalt concrete is used.
Asphalt requires an aggregate sub base material layer, and then a base layer to be put into first place. Asphalt road
construction is formulated to support the heavy traffic load and climatic conditions. It is 100% recyclable and
saving non renewable natural resources.
With the advancement of technology, Asphalt technology gives assurance about the good drainage system and with
skid resistance it can be used where safety is necessary such as outsidethe schools.
The largest use of Asphalt is for making asphalt concrete for road surfaces. It is widely used in airports around the
world due to the sturdiness and ability to be repaired quickly, it is widely used for runways dedicated to aircraft
landing and taking off. Asphalt is normally stored and transported at 150’C or 300’F temperature
2. Who am I ?
o Santhinesh Kumar Nagendran
o Currently working as Senior Database
Administrator @ Tesla Inc. Over 12 years
Industry experience in supporting
environments like healthcare, social
networking applications like AOL, IBIBO,
Sify etc. I primarily focus on Database
High availability and DB automations at
large scale.
3. Agenda
1. Why HA ?
2. HA Objectives
3. MySQL HA Solutions
4. Why MySQL GR ?
5. Implementation
6. Conclusion
4. Why HA ?
u Continuation of Services with minimal or no interruptions
u Improve Operations Standards by
u Hardware Upgrades ( Memory/CPU Upgrades )
u OS Security patches
u To meet application/Business/Customer SLAs
5. HA Objectives
v How much reliable is your HA solution ?
v Can we afford the complexity to fix issues caused by improper failover ?
v Cost associated with no/manual failover vs fixing unexpected improper failover ?
v Do we have the skill set to support the HA solution implemented
6. MySQL HA
Solutions
ü Master - Master Replication with HA proxy
ü MySQL MHA with Keepalived
ü MySQL MHA
ü InnodB Cluster
8. M - M Replication with HA proxy
Good Bad
Seamlessly failover happened when
primary became inaccessible
Connections goes back to old primary if it
comes back online in read-write mode
New connections went to new master
without any user interruptions
Need to keep both the Master-Master
servers in read-write mode all the time
Read Write split using respective TCP
port
Very high probability to have accidental
writes on both the servers
Repointing of Replication to new master
Fixing data is a big mess
9. Ø Too Many HA proxy Servers to handle when deployed in large scale
Ø Not a cost effective as it needed 2 HA proxy servers for each 3 node clusters
Ø HA proxy is not technically designed for MySQL/Database alone
Ø Need to remove old server from the config file immediately after a failover
happens to avoid failback when the failed server comes back online.
Ø NON-DB components for customer to go through to reach the database
F5
HA
proxy
DB
Server
Existing Drawbacks and future Requirements
10. MySQL MHA with Keepalived
S1
S2 S3
S1
S2 S3
crashed
Alias to MHA VIP Alias to MHA VIP
Master / RW
Slave1 / RO Slave2 / RO Master / RW Slave2 / RO
Keepalived VIP
Keepalived Service should be running in Master and Candidate Masters
Keepalived VIP
MHA does failover by stopping
keepalived in old master
Users/App
Users/App
11. MySQL MHA with Keepalived
Good Bad
Seamlessly failover happened when primary
became inaccessible
MHA manager demon stops working to
avoid another failover so DBA is asked to
verify each failovers
New connections went to new master without
any user interruptions
Not a fully automatic solution it requires
necessary manual interventions
Corrupt server goes out of cluster by itself If the server goes unreachable due to
firewall issue
Keeps only one server in [ read—write mode ]
rest all the servers will be or should be in
read-only mode
Keepalived also fails over independently
Manual Failover is possible keeping existing
master alive or dead
12. Existing Drawbacks and future Requirements
Ø Non-Standard / Custom Monitoring required to monitor components and
failures
Ø Needed proper inventory and automations to support MHA clusters in large
scale
Ø Too many false failovers due to keepalived due to network glitches
Ø Too many components for customer to deal with in a HA setup
F5
Keepalived
MHA
DB
Server
13. MySQL MHA with F5
S1
S2 S3
S1
S2 S3
crashed
F5 BigIP
F5 BigIP
Master / RW
Slave1 / RO Slave2 / RO
Master / RW Slave2 / RO
F5 checks for read_only parameter
to be off to send traffic to prod F5 checks for read_only parameter
to be off to send traffic to prod
MHA does failover without any
other VIP involved
Users/App
Users/App
14. MySQL MHA with F5
Good Bad
Seamlessly failover happened when
primary became inaccessible
MHA manager demon stops working to avoid
another failover so its DBA JOB to verify each
failovers completely
F5 checks for server in read-write mode
New connections went to new master
without any user interruptions
Not a fully automatic solution it requires
necessary manual interventions
Corrupt server goes out of cluster by itself non standard / custom monitoring
components like mha_manager etc.
Keeps only one server in [ read—write
mode ] rest all the servers will be in read-
only mode.
Complicated Setup to support in large scale
Manual Failover is possible keeping
existing master alive or dead
15. Existing Drawbacks and future Requirements
Ø Non-Standard / Custom Monitoring required to alter failures
Ø Needed proper inventory and automations to support MHA clusters in large
scale
Ø Too many false failovers due to keepalived due to network glitches
Ø Too many components for customer to deal with in a HA setup
F5 MHA
DB
Server
17. InnodB Cluster
Good NOTES
• Powered by mysql shell.
• mysqlsh makes setting innodb cluster
is extremely easy
Deafult user authentication plugin
change from mysql_native_password
(5.7) to caching_sha2_password (8.0)
Mysqlrouter servers can support multiple
innodb clusters which is a great relief
Replication between multi zonal clusters
can be challenging when a failover
happens
util.checkForServerUpgrade() makes DBAs
life so easy and saves hell lots of time
Can have replication between multiple
innodb clusters
Filtered multi-master replication
18. o Have lots of ways to monitoring
o Can get cluster status using mysql shell
o Can fetch the cluster status from performance_schema.
replication_group_members
o If we store the clusters is a proper inventory we can monitor respective clusters
and setup alerts for events like
o If a node gets out in a 3 node cluster then cluster status goes to OK_NO_TOLERANCE
o Can setup alerts when number of active group members are not equal to the number of
servers involved in that cluster as per inventory
How do you Monitor ?
19. Conclusion
o Group Replication has always been one of the best inhouse product for MySQL
o Empowered by Mysqlrouter and MySQL shell utilities
o One of the best and stable HA’s I have worked on till now.