SlideShare a Scribd company logo
Copyright	©	2014,	Oracle	and/or	its	affiliates.	All	rights	reserved.		|	
MySQL	Security:	Best	PracGces	
	
Mark	Swarbrick	
Principle	Presales	Consultant	Uk&I
Copyright	©	2014,	Oracle	and/or	its	affiliates.	All	rights	reserved.		|	
Safe	Harbor	Statement	
The	following	is	intended	to	outline	our	general	product	direcGon.	It	is	intended	for	
informaGon	purposes	only,	and	may	not	be	incorporated	into	any	contract.	It	is	not	a	
commitment	to	deliver	any	material,	code,	or	funcGonality,	and	should	not	be	relied	upon	
in	making	purchasing	decisions.	The	development,	release,	and	Gming	of	any	features	or	
funcGonality	described	for	Oracle’s	products	remains	at	the	sole	discreGon	of	Oracle.	
ConfidenGal	–	Oracle	Internal/Restricted/Highly	Restricted	 2
Copyright	©	2014,	Oracle	and/or	its	affiliates.	All	rights	reserved.		|	
43%	
of	companies	have	experienced	a	
data	breach	in	the	past	year.	
Source:	Ponemon	InsGtute,	2014	
Oracle	ConfidenGal	–	Internal/Restricted/Highly	Restricted	 3
Copyright	©	2014,	Oracle	and/or	its	affiliates.	All	rights	reserved.		|	
Mega	Breaches	
552	Million	idenGGes	
exposed	in	2013.		493%	
increase	over	previous	year	 77%	Web	sites	with	vulnerabiliGes.	
1-in-8	of	all	websites	had	a	
criGcal	vulnerability.		
8	
Breaches	that	exposed	
more	than	10	million	
records	in	2013.	
Total	Breaches	increased	
62%	in	2013			
Oracle	ConfidenGal	–	Internal/Restricted/Highly	Restricted	 4	
Source:	Internet	Security	Threat	Report	2014,	Symantec
Copyright	©	2014,	Oracle	and/or	its	affiliates.	All	rights	reserved.		|	
•  Poor	ConfiguraGons	
– Set	controls	and	change	default	se_ng	
•  Over	Privileged	Accounts	
– Privilege	Policies	
•  Weak	Access	Control	
– Dedicated	AdministraGve	Accounts	
•  Weak	AuthenGcaGon	
– Strong	Password	Enforcement	
•  Weak	AudiGng	
– Compliance	&	Audit	Policies	
•  Lack	of	EncrypGon	
– Data,	Backup,	&	Network	EncrypGon	
•  Proper	CredenGal	&	Key	Management	
– Use	mysql_config_editor	,	Key	Vaults	
•  Unsecured	Backups	
– Encrypted	Backups	
•  No	Monitoring	
– Security	Monitoring,	Users,	Objects	
•  Poorly	Coded	ApplicaGons	
– Database	Firewall	
5	
Database	VulnerabiliGes
Copyright	©	2014,	Oracle	and/or	its	affiliates.	All	rights	reserved.		|	
Database	Aiacks		
•  SQL	InjecGon	
–  PrevenGon:	DB	Firewall,	White	List,	Input	ValidaGon	
•  Buffer	Overflow	
–  PrevenGon:	Frequently	apply	Database	Solware	updates,	DB	Firewall,	White	List,	Input	ValidaGon			
•  Brute	Force	Aiack	
–  PrevenGon:	lock	out	accounts	aler	a	defined	number	of	incorrect	aiempts.	
•  Network	Eavesdropping	
–  PrevenGon:	Require	SSL/TLS	for	all	ConnecGons	and	Transport	
•  Malware		
–  PrevenGon:	Tight	Access	Controls,	Limited	Network	IP	access,		Change	default	se_ngs,	EncrypGon	
	
6
Copyright	©	2014,	Oracle	and/or	its	affiliates.	All	rights	reserved.		|	
Database	Malicious	AcGons	
•  InformaGon	Disclosure:	Obtain	credit	card	and	other	personal	informaGon	
–  Defense:	EncrypGon	–	Data	and	Network,	Tighter	Access	Controls		
•  Denial	of	Service:	Run	resource	intensive	queries	
–  Defense:	Resource	Usage	Limits	–	Set	various	limits	–	Max	ConnecGons,	Sessions,	Timeouts,	…	
•  ElevaGon	of	Privilege:	Retrieve	and	use	administrator	credenGals	
–  Defense:	Stronger	authenGcaGon,	Access	Controls,	AudiGng	
•  Spoofing:	Retrieve	and	use	other	credenGals	
–  Defense:	Stronger	account	and	password	policies		
•  Tampering:	Change	data	in	the	database,	Delete	transacGon	records	
•  Defense:	Tighter	Access	Controls,	AudiGng,	Monitoring,	Backups	
7
Copyright	©	2014,	Oracle	and/or	its	affiliates.	All	rights	reserved.		|	
Regulatory	Compliance	
•  RegulaGons	
–  PCI	–	DSS:	Payment	Card	Data	
–  HIPAA:	Privacy	of	Health	Data	
–  Sarbanes	Oxley:	Accuracy	of	Financial	Data	
–  EU	Data	ProtecGon	DirecGve:	ProtecGon	of	Personal	Data	
–  Data	ProtecGon	Act	(UK):	ProtecGon	of	Personal	Data	
•  Requirements	
–  ConGnuous	Monitoring	(Users,	Schema,	Backups,	etc)	
–  Data	ProtecGon	(EncrypGon,	Privilege	Management,	etc.)	
–  Data	RetenGon	(Backups,	User	AcGvity,	etc.)	
–  Data	AudiGng	(User	acGvity,	etc.)	
8
Copyright	©	2014,	Oracle	and/or	its	affiliates.	All	rights	reserved.		|	
PCI-DSS	
•  Requirement	2:	Secure	ConfiguraGons,	Security	Se_ngs	&	Patching	
–  Not	Using	Vendor	Default	Passwords	and	Security	Se_ngs	
•  Requirement	3:	ProtecGng	Cardholder	Data	–	Strong	Cryptography	
–  Protect	Stored	Cardholder	Data	
–  Protect	EncrypGon	Keys	
•  Requirement	6:	Up	to	Date	Patching	and	Secure	Systems	
–  Develop	and	Maintain	Secure	Systems	and	ApplicaGons	
•  Requirement	7:	User	Access	and	AuthorizaGon	
–  Restrict	Access	to	Cardholder	Data	by	Need	to	Know	
•  Requirement	8:	IdenGty	and	Access	Management	
–  IdenGfy	and	AuthenGcate	Access	to	System	Components	
•  Requirement	10:	Monitoring,	Tracking	and	AudiGng		
–  Track	and	Monitor	Access	to	Cardholder	Data	
9	
		
White	Paper	
	
	A	Guide	to	MySQL		
				and	PCI	Compliance
Copyright	©	2014,	Oracle	and/or	its	affiliates.	All	rights	reserved.		|	
DBA	ResponsibiliGes	
•  Ensure	only	users	who	should	get	access,	can	get	access	
•  Limit	what	users	and	applicaGons	can	do	
•  Limit	from	where	users	and	applicaGons	can	access	data	
•  Watch	what	is	happening,	and	when	it	happened	
•  Make	sure	to	back	things	up	securely	
•  Minimize	aiack	surface	
•  Ensure	encrypGon	keys	are	protected	and	managed
Copyright	©	2014,	Oracle	and/or	its	affiliates.	All	rights	reserved.		|	 Oracle	ConfidenGal	–	Internal	 11	
MySQL	Security	Overview	
AuthenGcaGon	
AuthorizaGon	
EncrypGon	
Firewall	
MySQL	Security	
AudiGng
Copyright	©	2014,	Oracle	and/or	its	affiliates.	All	rights	reserved.		|	
Block	Threats	
AudiGng	
Regulatory	Compliance	
Login	and	Query	AcGviGes	
SSL/TLS		
Public/Private	Key		
Transparent	EncrypGon	
Key	Management	
Privilege	Management	
AdministraGon	
Database	&	Objects	
Proxy	Users	
MySQL		
Linux	/	LDAP	
Windows	AD	
Custom	
	
Oracle	ConfidenGal	–	Internal	 12	
MySQL	Security	Overview	
AuthorizaGon				AuthenGcaGon		
Firewall	&		
AudiGng	
EncrypGon	
	
Security
Copyright	©	2014,	Oracle	and/or	its	affiliates.	All	rights	reserved.		|	
MySQL	AuthorizaGon	
•  AdministraGve	Privileges	
•  Database	Privileges	
•  Session	Limits	and	Object	Privileges	
•  Fine	grained	controls	over	user	privileges		
– CreaGng,	altering	and	deleGng	databases		
– CreaGng,	altering	and	deleGng	tables		
– Execute	INSERT,	SELECT,	UPDATE,	DELETE	queries		
– Create,	execute,	or	delete	stored	procedures	and	with	what	rights	
– Create	or	delete	indexes	
13	
Security	Privilege	Management	in	MySQL	Workbench
Copyright	©	2014,	Oracle	and/or	its	affiliates.	All	rights	reserved.		|	
MySQL	AuthenGcaGon	
•  Built	in	AuthenGcaGon	
–  user	table	stores	users	and	encrypted	passwords	
•  X.509	
–  Server	authenGcates	client	cerGficates	
•  MySQL	NaGve,	SHA	256	Password	plugin	
–  NaGve	uses	SHA1	or	plugin	with	SHA-256	hashing	and	per	user	salGng	for	user	account	passwords.	
•  MySQL	Enterprise	AuthenGcaGon	
–  Microsol	AcGve	Directory	
–  Linux	PAMs	(Pluggable	AuthenGcaGon	Modules)	
•  Support	LDAP	and	more	
•  Custom	AuthenGcaGon	
14
Copyright	©	2014,	Oracle	and/or	its	affiliates.	All	rights	reserved.		|	
MySQL	Password	Policies	
•  Accounts	without	Passwords	
– Assign	passwords	to	all	accounts	to	prevent	unauthorized	use	
•  Password	ValidaGon	Plugin	
– Enforce	Strong	Passwords	
•  Password	ExpiraGon/RotaGon	
– Require	users	to	reset	their	password	
•  Account	lockout	(in	v.	5.7)	
15
Copyright	©	2014,	Oracle	and/or	its	affiliates.	All	rights	reserved.		|	
MySQL	EncrypGon	
•  SSL/TLS	EncrypGon	
– Between	MySQL	clients	and	Server	
– ReplicaGon:	Between	Master	&	Slave	
•  Data	EncrypGon	
– AES	Encrypt/Decrypt	
•  MySQL	Enterprise	TDE	
– Transparent	Data	Enc	rypGon	
– Key	Management	(KMIP)	
16	
•  MySQL	Enterprise	EncrypGon	
– Asymmetric	Encrypt/Decrypt	
– Generate	Public	Key	and	Private	Keys	
– Derive	Session	Keys	
– Digital	Signatures	
•  MySQL	Enterprise	Backup	
– AES	Encrypt/Decrypt
Copyright	©	2014,	Oracle	and/or	its	affiliates.	All	rights	reserved.		|	
Database	Firewall	
•  SQL	InjecGon	Aiacks		
– #1	Web	ApplicaGon	Vulnerability	
– 77%	of	Web	Sites	had	vulnerabiliGes	
•  MySQL	Enterprise	Firewall	
– Monitor	database	statements	in	real-Gme	
– AutomaGc	White	List	“rules”	generaGon	for	any	applicaGon	
– Block	SQL	InjecGon	Aiacks	
– Intrusion	DetecGon	System	
17
Copyright	©	2014,	Oracle	and/or	its	affiliates.	All	rights	reserved.		|	
Database	AudiGng	
• AudiGng	for	Security	&	Compliance	
– FIPS,	HIPAA,	PCI-DSS,	SOX,	DISA	STIG,	…	
• MySQL	built-in	logging	infrastructure:	
– general	log,	error	log	
• MySQL	Enterprise	Audit	
– Granularity	made	for	audiGng	
– Can	be	modified	live	
– Contains	addiGonal	details	
– CompaGble	with	Oracle	Audit	Vault.
Copyright	©	2014,	Oracle	and/or	its	affiliates.	All	rights	reserved.		|	 Oracle	ConfidenGal	–	Internal	 19	
MySQL	Database	Hardening	
User	Management	
•  Remove	Extra	Accounts	
•  Grant	Minimal	Privileges		
•  Audit	users	and	privileges	
ConfiguraGon	
•  Firewall	
•  AudiGng	and	Logging	
•  Limit	Network	Access	
•  Monitor	changes	
InstallaGon	
•  Mysql_secure_installaGon	
•  Keep	MySQL	up	to	date	
•  MySQL	Installer	for	Windows	
•  Yum/Apt	Repository	
	
Backups	
•  Monitor	Backups	
•  Encrypt	Backups	
EncrypGon	
•  SSL/TLS	for	Secure	
ConnecGons	
•  Data	EncrypGon	(AES,	RSA)	
•  TDE	
Passwords	
•  Strong	Password	Policy	
•  Hashing,	ExpiraGon	
•  Password	ValidaGon	Plugin
Copyright	©	2014,	Oracle	and/or	its	affiliates.	All	rights	reserved.		|	
MySQL	5.7	Linux	Packages	-	Security	Improvements	
•  Test/Demo	database	has	been	removed	
–  Now	in	separate	packages	
•  Anonymous	account	creaGon	is	removed.	
•  CreaGon	of	single	root	account	–	local	host	only	
•  Default	installaGon	ensures	encrypted	
communicaGon	by	default		
–  AutomaGc	generaGon	of	SSL/RSA	Certs/Keys	
•  For	EE	:	At	server	startup	if	opGons	Certs/Keys	were	not	set	
•  For	CE	:	Through	new	mysql_ssl_rsa_setup	uGlity	
•  AutomaGc	detecGon	of	SSL	Certs/Keys	
20	
•  Client	aiempts	secure	TLS	connecGon	by	default	
•  Compile	Gme	restricGon	over	locaGon	used	for	
data	import/export	operaGons	
•  Ensures	locaGon	has	restricted	access		
•  Only	mysql	user	and	group	
•  Supports	disabling	data	import/export		
•  Set	secure-file-priv	to	empty	string	
	
MySQL	Installer	for	Windows		includes	various	Security	Setup	and	Hardening	Steps
Copyright	©	2014,	Oracle	and/or	its	affiliates.	All	rights	reserved.		|	
MySQL	Enterprise	EdiGon	
•  MySQL	Enterprise	AuthenGcaGon	
–  External	AuthenGcaGon	Modules	
•  Microsol	AD,	Linux	PAMs	
•  MySQL	Enterprise	EncrypGon	
–  Public/Private	Key	Cryptography	
–  Asymmetric	EncrypGon	
–  Digital	Signatures,	Data	ValidaGon	
•  MySQL	Enterprise	Firewall	
–  Block	SQL	InjecGon	Aiacks	
–  Intrusion	DetecGon		
•  MySQL	Enterprise	Audit	
–  User	AcGvity	AudiGng,	Regulatory	Compliance 		
21	
•  MySQL	Enterprise	Monitor	
–  Changes	in	Database	ConfiguraGons,	Users	
Permissions,	Database	Schema,	Passwords	
•  MySQL	Enterprise	Backup		
–  Securing	Backups,	AES	256	encrypGon	
•  MySQL	Enterprise	TDE	
–  AES	256	encrypGon	
–  Key	Management
Copyright	©	2014,	Oracle	and/or	its	affiliates.	All	rights	reserved.		|	
MySQL	Enterprise	Monitor	
•  Enforce	MySQL	Security	Best	PracGces	
–  IdenGfies	VulnerabilGes	
–  Assesses	current	setup	against	security	hardening	policies	
•  Monitoring	&	AlerGng	
–  User	Monitoring	
–  Password	Monitoring	
–  Schema	Change	Monitoring	
–  Backup	Monitoring	
–  ConfiguraGon	Management	
–  ConfiguraGon	Tuning	Advice	
•  Centralized	User	Management	
22	
"I	definitely	recommend	the	MySQL	Enterprise	
Monitor	to	DBAs	who	don't	have	a	ton	of	MySQL	
experience.	It	makes	monitoring	MySQL	security,	
performance	and	availability	very	easy	to	
understand	and	to	act	on.”	
Sandi	Barr	
Sr.	Solware	Engineer	
Schneider	Electric
Copyright	©	2014,	Oracle	and/or	its	affiliates.	All	rights	reserved.		|	
MySQL	Enterprise	Firewall	
•  Block	SQL	InjecGon	Aiacks	
– Allow:	SQL	Statements	that	match	Whitelist	
– Block:	SQL	statements	that	are	not	on	Whitelist		
•  Intrusion	DetecGon	System	
– Detect:	SQL	statements	that	are	not	on	Whitelist	
•  SQL	Statements	execute	and	alert	administrators	
	
23	
Select *.* from employee where id=22
Select *.* from employee where id=22 or 1=1
Block	✖ 	
Allow	✔	
White	List	
Applica6ons	
Detect	&	Alert	
Intrusion	DetecGon
Copyright	©	2014,	Oracle	and/or	its	affiliates.	All	rights	reserved.		|	
MySQL	Enterprise	AuthenGcaGon	
24	
•  Integrate	with	Centralized	AuthenGcaGon	Infrastructure		
– Centralized	Account	Management	
– Password	Policy	Management	
– Groups	&	Roles	
•  PAM	(Pluggable	AuthenGcaGon	Modules)	
– Standard	interface	(Unix,	LDAP,	Kerberos,	others)	
– Windows		
•  Access	naGve	Windows	service	-	Use	to	AuthenGcate	users	using	Windows	
AcGve	Directory	or	to	a	naGve	host	
Integrates	MySQL	with	exisGng	
security	infrastructures
Copyright	©	2014,	Oracle	and/or	its	affiliates.	All	rights	reserved.		|	
MySQL	Enterprise	EncrypGon	
•  MySQL	encrypGon	funcGons	
– Symmetric	encrypGon	AES256	(All	EdiGons)	
– Public-key	/	asymmetric	cryptography	–	RSA	
•  Key	management		funcGons	
– Generate	public	and	private	keys	
– Key	exchange	methods:	DH	
•  Sign	and	verify	data	funcGons	
– Cryptographic	hashing	for	digital	signing,	verificaGon,	&	validaGon	–	RSA,DSA	
25
Copyright	©	2014,	Oracle	and/or	its	affiliates.	All	rights	reserved.		|	
Database	AudiGng	
•  “Trust	but	verify"	approach	to	security	
– Ensure	users	with	strong	privileges	don’t	misuse	those	privileges	
•  Business	Audit	–	Data	Validity	
– Here’s	proof	my	database	data	is	accurate/correct	
– Prove	no	tampering	to	data	has	occurred	
•  Forensic	analysis	–	as	a	component	of	any	defense-in-depth	strategy	
– ProacGve	-	Am	being	/	Was	hacked	
– ReacGve	–	How	were	we	hacked,	what	was	changed,	taken,	etc.	
26	
Maintaining	an	audit	trail	is	an	essenGal	security	best	pracGce
Copyright	©	2014,	Oracle	and/or	its	affiliates.	All	rights	reserved.		|	
MySQL	Enterprise	Audit	
•  Out-of-the-box	logging	of	connecGons,	logins,	and	query	
•  Simple	to	fine	grained	policies	for	filtering,	and	log	rotaGon	
•  Dynamically	enabled,	disabled:	no	server	restart	
•  XML-based	audit	stream	
– Send	data	to	a	remote	server	/	audit	data	vault		
•  Oracle	Audit	Vault	
•  Splunk,	etc.	
27	
Adds	“regulatory	compliance”	
to	MySQL	applicaGons		
(HIPAA,	Sarbanes-Oxley,	PCI,	etc.)
Copyright	©	2014,	Oracle	and/or	its	affiliates.	All	rights	reserved.		|	
MySQL	Enterprise	Backup	
•  Online	Backup	for	InnoDB	(scriptable	interface)	
•  Full,	Incremental,	ParGal	Backups	(with	compression)	
•  Strong	EncrypGon	(AES	256)	
•  Point	in	Time,	Full,	ParGal	Recovery	opGons	
•  Metadata	on	status,	progress,	history	
•  Scales	–	High	Performance/Unlimited	Database	Size	
•  Windows,	Linux,	Unix	
•  CerGfied	with	Oracle	Secure	Backup,	NetBackup,	Tivoli,	others	
28
Copyright	©	2014,	Oracle	and/or	its	affiliates.	All	rights	reserved.		|	
MySQL	Enterprise	Oracle	CerGficaGons	
• Oracle	Enterprise	Manager	for	
MySQL	
• Oracle	Linux	(w/DRBD	stack)	
• Oracle	VM	
• Oracle	Solaris	
•  Oracle	Solaris	Clustering	
•  Oracle	Clusterware	
• Oracle	Audit	Vault	and	Database	Firewall	
• Oracle	Secure	Backup	
• Oracle	Fusion	Middleware	
• Oracle	GoldenGate	
• My	Oracle	Support	
	
MySQL	integrates	into	your	Oracle	environment	
29
Copyright	©	2014,	Oracle	and/or	its	affiliates.	All	rights	reserved.		|	
Oracle	Audit	Vault	and	Database	Firewall	
•  Oracle	DB	Firewall	
– Oracle,	MySQL,	SQL	Server,	IBM	DB2,	Sybase	
– AcGvity	Monitoring	&	Logging	
– White	List,	Black	List,	ExcepGon	List	
•  Audit	Vault	
– Built-in	Compliance	Reports	
– External	storage	for	audit	archive	
30
Copyright	©	2014,	Oracle	and/or	its	affiliates.	All	rights	reserved.		|	
Hardware
Schema Changes
Data Growth
Indexes
SQL
90%	of		
Performance	Problems		
	
Source	of	Database	Performance	Problems	
31
Copyright	©	2014,	Oracle	and/or	its	affiliates.	All	rights	reserved.		|	
Hardware:	The	Perfect	MySQL	Server	
•  The	more	cores	the	beier	(especially	for	5.5	and	later)	
•  x86_64	-	64	bit	for	more	memory	is	important	
–  The	more	the	beier	
•  Fast	HD	(10-15k	RPM	SATA)	or	NAS/SAN……	
–  RAID	10	for	most,	RAID	5	OK	if	very	read	intensive	
–  Hardware	RAID	baiery	backed	up	cache	criGcal!	
–  More	disks	are	always	beier!	-	4+	recommended,	8-16	can	increase	IO	
•  …Or	SSD	(for	higher	throughput)	
–  Intel,	Fusion-IO	good	choices;	good	opGon	for	Slaves	
•  At	least	2	x	NICs	for	redundancy	
•  Slaves	should	be	as	powerful	as	the	Master
Copyright	©	2014,	Oracle	and/or	its	affiliates.	All	rights	reserved.		|	The World s Most Popular Open Source DatabaseCopyright 2010 Oracle
Schemas

	
•  Size	=	performance,	smaller	is	beier	
–  Size	right!	Do	not	automaGcally	use	255	for	VARCHAR	
•  Temp	tables,	most	caches,	expand	to	full	size	
•  Use	 procedure	analyse 	to	determine	the	opGmal	types	given	the	values	in	your	table	
–  hip://dev.mysql.com/doc/refman/5.1/en/procedure-analyse.html	
–  mysql>	select	*	from	tab	procedure	analyse	(64,2000)	G	
•  Consider	the	types:	
–  enum	:	hip://dev.mysql.com/doc/refman/5.1/en/enum.html		
–  set	:	hip://dev.mysql.com/doc/refman/5.1/en/set.html		
•  Compress	large	strings	
–  Use	the	MySQL	COMPRESS	and	UNCOMPRESS	funcGons
Copyright	©	2014,	Oracle	and/or	its	affiliates.	All	rights	reserved.		|	The World s Most Popular Open Source DatabaseCopyright 2010 Oracle
Innodb	tuning

	
InnoDB Buffer Size	
	
InnoDB Log size	
	
Query Cache	
	
Tmpdir / datadir	
	
MyISAM
Copyright	©	2014,	Oracle	and/or	its	affiliates.	All	rights	reserved.		|	
MySQL	Performance	Schema	
•  IdenGfy	performance	boilenecks	
•  IdenGfy	problemaGc	queries		
•  Get	real	Gme	insight	into	locks	
•  See	exactly	what	is	happening	
within	MySQL		
•  Get	real	Gme	insight	into	MySQL	
internals		
•  Get	real	Gme	insight	into	query	
execuGons	
35	
mysql>	select	*	from	host_summary_by_stages;	
+------+--------------------------------+-------+-----------+-----------+	
|	host	|	event_name																					|	total	|	wait_sum		|	wait_avg		|		
+------+--------------------------------+-------+-----------+-----------+	
|	hal		|	stage/sql/Opening	tables							|			889	|	1.97	ms			|	2.22	us			|		
|	hal		|	stage/sql/Creating	sort	index		|					4	|	1.79	ms			|	446.30	us	|		
|	hal		|	stage/sql/init																	|				10	|	312.27	us	|	31.23	us		|		
|	hal		|	stage/sql/checking	permissions	|				10	|	300.62	us	|	30.06	us		|		
|	hal		|	stage/sql/freeing	items								|					5	|	85.89	us		|	17.18	us		|		
|	hal		|	stage/sql/statistics											|					5	|	79.15	us		|	15.83	us		|		
|	hal		|	stage/sql/preparing												|					5	|	69.12	us		|	13.82	us		|		
|	hal		|	stage/sql/optimizing											|					5	|	53.11	us		|	10.62	us		|		
|	hal		|	stage/sql/Sending	data									|					5	|	44.66	us		|	8.93	us			|		
|	hal		|	stage/sql/closing	tables							|					5	|	37.54	us		|	7.51	us			|		
|	hal		|	stage/sql/System	lock										|					5	|	34.28	us		|	6.86	us			|		
|	hal		|	stage/sql/query	end												|					5	|	24.37	us		|	4.87	us			|		
|	hal		|	stage/sql/end																		|					5	|	8.60	us			|	1.72	us			|		
|	hal		|	stage/sql/Sorting	result							|					5	|	8.33	us			|	1.67	us			|		
|	hal		|	stage/sql/executing												|					5	|	5.37	us			|	1.07	us			|		
|	hal		|	stage/sql/cleaning	up										|					5	|	4.60	us			|	919.00	ns	|		
+------+--------------------------------+-------+-----------+-----------+
Copyright	©	2014,	Oracle	and/or	its	affiliates.	All	rights	reserved.		|	
Performance	Tes6ng	–	How	to	measure	success	
Monitoring	–	Make	sure	you	are	monitoring	the	correct	metrics	
	
Availability	
Use	a	decent	query	
	
Logs	
Logs	filling	up	disk	space	
Slow	query	log	filling	space	
	
Disk	Space	
Disks	ge_ng	full	is	the	most	common	problem	
Ideally	alarm	on	how	soon	disk	space	changes	rather	than	absolute	disk	space	
36
Copyright	©	2014,	Oracle	and/or	its	affiliates.	All	rights	reserved.		|	
Performance	Tes6ng	–	How	to	measure	success	
Monitoring	–	Make	sure	you	are	monitoring	the	correct	metrics	
	
Stalls	/	Spikes	
Table	Locks	
CPU	Spikes	
Memory	Paging	
	
Connec6ons	
Are	you	reaching	max_connecGons	limit?	
Can	the	applicaGon	connect?	
	
Processes	
Long	running	Processes	
37
Copyright	©	2014,	Oracle	and/or	its	affiliates.	All	rights	reserved.		|	
Performance	Tes6ng	–	How	to	measure	success	
Monitoring	–	Make	sure	you	are	monitoring	the	correct	metrics	
	
Transac6ons	
Long	running	or	long	idle	transacGons	
Queued	transacGons	(size	of	trans	queue)	(show	innodb	status)	
	
Replica6on	
Is	ReplicaGon	running	
Whats	the	replicaGon	lag	
	
	
38
Copyright	©	2014,	Oracle	and/or	its	affiliates.	All	rights	reserved.		|	
Performance	Tes6ng	–	How	to	measure	success	
Monitoring	–	Make	sure	you	are	monitoring	the	correct	metrics	
	
Query	Performance	
Top	Queries	to	opGmise	–	(interacGve	monitor	not	generate	alerts	on)	
Response	Gme	outliers		
Queries	not	using	index	
Queries	using	full/	parGal	scans	/	table	scans	
Queries	that	return	errors	/	warning	
	
Opera6onal	Aspects	
Server	restarts	
Server	config	change	events	
Messages	in	the	error	Log	
39
Copyright	©	2014,	Oracle	and/or	its	affiliates.	All	rights	reserved.		|	
Thank	You

More Related Content

What's hot

MySQL Cluster Whats New
MySQL Cluster Whats NewMySQL Cluster Whats New
MySQL Cluster Whats New
Mark Swarbrick
 
MySQL Enterprise Monitor 3
MySQL Enterprise Monitor 3MySQL Enterprise Monitor 3
MySQL Enterprise Monitor 3
Mark Swarbrick
 
MySQL as a Document Store
MySQL as a Document StoreMySQL as a Document Store
MySQL as a Document Store
Mark Swarbrick
 
No sql from the web’s favourite relational database MySQL
No sql from the web’s favourite relational database MySQLNo sql from the web’s favourite relational database MySQL
No sql from the web’s favourite relational database MySQL
Mark Swarbrick
 
Developing MySQL applications in the Cloud
Developing MySQL applications in the CloudDeveloping MySQL applications in the Cloud
Developing MySQL applications in the Cloud
Mark Swarbrick
 
TLV - Whats new in MySQL 8
TLV - Whats new in MySQL 8TLV - Whats new in MySQL 8
TLV - Whats new in MySQL 8
Mark Swarbrick
 
Oracle MySQL Cloud Service
Oracle MySQL Cloud ServiceOracle MySQL Cloud Service
Oracle MySQL Cloud Service
Mark Swarbrick
 
TLV - MySQL Security overview
TLV - MySQL Security overviewTLV - MySQL Security overview
TLV - MySQL Security overview
Mark Swarbrick
 
2016 MySQL State of the Dolphin
2016 MySQL State of the Dolphin2016 MySQL State of the Dolphin
2016 MySQL State of the Dolphin
Mark Swarbrick
 
MySQL Security + GDPR - 2018 MySQL Days
MySQL Security + GDPR - 2018 MySQL DaysMySQL Security + GDPR - 2018 MySQL Days
MySQL Security + GDPR - 2018 MySQL Days
Mark Swarbrick
 
Java EE Next - BeJUG JavaOne Afterglow 2016
Java EE Next - BeJUG JavaOne Afterglow 2016Java EE Next - BeJUG JavaOne Afterglow 2016
Java EE Next - BeJUG JavaOne Afterglow 2016
David Delabassee
 
Next Generation Data Center Strategies
Next Generation Data Center StrategiesNext Generation Data Center Strategies
Next Generation Data Center StrategiesVenkat Nambiyur
 
Java EE 8 - February 2017 update
Java EE 8 - February 2017 updateJava EE 8 - February 2017 update
Java EE 8 - February 2017 update
David Delabassee
 
Application Development with Oracle Database
Application Development with Oracle DatabaseApplication Development with Oracle Database
Application Development with Oracle Database
gvenzl
 
OOW16 - Leverage Oracle Integration Cloud Service for Oracle E-Business Suite...
OOW16 - Leverage Oracle Integration Cloud Service for Oracle E-Business Suite...OOW16 - Leverage Oracle Integration Cloud Service for Oracle E-Business Suite...
OOW16 - Leverage Oracle Integration Cloud Service for Oracle E-Business Suite...
vasuballa
 
Migrating your infrastructure to OpenStack - Avi Miller, Oracle
Migrating your infrastructure to OpenStack - Avi Miller, OracleMigrating your infrastructure to OpenStack - Avi Miller, Oracle
Migrating your infrastructure to OpenStack - Avi Miller, Oracle
OpenStack
 
Related OSS Projects - Peter Rowe, Flexera Software
Related OSS Projects - Peter Rowe, Flexera SoftwareRelated OSS Projects - Peter Rowe, Flexera Software
Related OSS Projects - Peter Rowe, Flexera Software
OpenStack
 
OOW16 - Faster and Better: Oracle E-Business Suite Desktop Integration Enhanc...
OOW16 - Faster and Better: Oracle E-Business Suite Desktop Integration Enhanc...OOW16 - Faster and Better: Oracle E-Business Suite Desktop Integration Enhanc...
OOW16 - Faster and Better: Oracle E-Business Suite Desktop Integration Enhanc...
vasuballa
 
Secure Multitenancy on Oracle SuperCluster
Secure Multitenancy on Oracle SuperClusterSecure Multitenancy on Oracle SuperCluster
Secure Multitenancy on Oracle SuperCluster
Ramesh Nagappan
 
Secure Multi-tenancy on Private Cloud Environment (Oracle SuperCluster)
Secure Multi-tenancy on Private Cloud Environment (Oracle SuperCluster)Secure Multi-tenancy on Private Cloud Environment (Oracle SuperCluster)
Secure Multi-tenancy on Private Cloud Environment (Oracle SuperCluster)
Ramesh Nagappan
 

What's hot (20)

MySQL Cluster Whats New
MySQL Cluster Whats NewMySQL Cluster Whats New
MySQL Cluster Whats New
 
MySQL Enterprise Monitor 3
MySQL Enterprise Monitor 3MySQL Enterprise Monitor 3
MySQL Enterprise Monitor 3
 
MySQL as a Document Store
MySQL as a Document StoreMySQL as a Document Store
MySQL as a Document Store
 
No sql from the web’s favourite relational database MySQL
No sql from the web’s favourite relational database MySQLNo sql from the web’s favourite relational database MySQL
No sql from the web’s favourite relational database MySQL
 
Developing MySQL applications in the Cloud
Developing MySQL applications in the CloudDeveloping MySQL applications in the Cloud
Developing MySQL applications in the Cloud
 
TLV - Whats new in MySQL 8
TLV - Whats new in MySQL 8TLV - Whats new in MySQL 8
TLV - Whats new in MySQL 8
 
Oracle MySQL Cloud Service
Oracle MySQL Cloud ServiceOracle MySQL Cloud Service
Oracle MySQL Cloud Service
 
TLV - MySQL Security overview
TLV - MySQL Security overviewTLV - MySQL Security overview
TLV - MySQL Security overview
 
2016 MySQL State of the Dolphin
2016 MySQL State of the Dolphin2016 MySQL State of the Dolphin
2016 MySQL State of the Dolphin
 
MySQL Security + GDPR - 2018 MySQL Days
MySQL Security + GDPR - 2018 MySQL DaysMySQL Security + GDPR - 2018 MySQL Days
MySQL Security + GDPR - 2018 MySQL Days
 
Java EE Next - BeJUG JavaOne Afterglow 2016
Java EE Next - BeJUG JavaOne Afterglow 2016Java EE Next - BeJUG JavaOne Afterglow 2016
Java EE Next - BeJUG JavaOne Afterglow 2016
 
Next Generation Data Center Strategies
Next Generation Data Center StrategiesNext Generation Data Center Strategies
Next Generation Data Center Strategies
 
Java EE 8 - February 2017 update
Java EE 8 - February 2017 updateJava EE 8 - February 2017 update
Java EE 8 - February 2017 update
 
Application Development with Oracle Database
Application Development with Oracle DatabaseApplication Development with Oracle Database
Application Development with Oracle Database
 
OOW16 - Leverage Oracle Integration Cloud Service for Oracle E-Business Suite...
OOW16 - Leverage Oracle Integration Cloud Service for Oracle E-Business Suite...OOW16 - Leverage Oracle Integration Cloud Service for Oracle E-Business Suite...
OOW16 - Leverage Oracle Integration Cloud Service for Oracle E-Business Suite...
 
Migrating your infrastructure to OpenStack - Avi Miller, Oracle
Migrating your infrastructure to OpenStack - Avi Miller, OracleMigrating your infrastructure to OpenStack - Avi Miller, Oracle
Migrating your infrastructure to OpenStack - Avi Miller, Oracle
 
Related OSS Projects - Peter Rowe, Flexera Software
Related OSS Projects - Peter Rowe, Flexera SoftwareRelated OSS Projects - Peter Rowe, Flexera Software
Related OSS Projects - Peter Rowe, Flexera Software
 
OOW16 - Faster and Better: Oracle E-Business Suite Desktop Integration Enhanc...
OOW16 - Faster and Better: Oracle E-Business Suite Desktop Integration Enhanc...OOW16 - Faster and Better: Oracle E-Business Suite Desktop Integration Enhanc...
OOW16 - Faster and Better: Oracle E-Business Suite Desktop Integration Enhanc...
 
Secure Multitenancy on Oracle SuperCluster
Secure Multitenancy on Oracle SuperClusterSecure Multitenancy on Oracle SuperCluster
Secure Multitenancy on Oracle SuperCluster
 
Secure Multi-tenancy on Private Cloud Environment (Oracle SuperCluster)
Secure Multi-tenancy on Private Cloud Environment (Oracle SuperCluster)Secure Multi-tenancy on Private Cloud Environment (Oracle SuperCluster)
Secure Multi-tenancy on Private Cloud Environment (Oracle SuperCluster)
 

Similar to Percona Live - Dublin 02 security + tuning

Overview Oracle Identity Management tijdens AMIS Simplified Security seminar
Overview Oracle Identity Management tijdens AMIS Simplified Security seminarOverview Oracle Identity Management tijdens AMIS Simplified Security seminar
Overview Oracle Identity Management tijdens AMIS Simplified Security seminar
Getting value from IoT, Integration and Data Analytics
 
Data Management in a Microservices World
Data Management in a Microservices WorldData Management in a Microservices World
Data Management in a Microservices World
gvenzl
 
Securing Mobile Device Access
Securing Mobile Device AccessSecuring Mobile Device Access
Securing Mobile Device Access
Artur Alves
 
Chicago EPM Day-Excellence in Consolidations with HFM
Chicago EPM Day-Excellence in Consolidations with HFMChicago EPM Day-Excellence in Consolidations with HFM
Chicago EPM Day-Excellence in Consolidations with HFM
Alithya
 
The Rise of Adaptive Marketing
The Rise of Adaptive MarketingThe Rise of Adaptive Marketing
The Rise of Adaptive Marketing
Demandbase
 
Manual oracle
Manual oracleManual oracle
Manual oracle
Milan Mergildo Rivera
 
Oracle cmg15
Oracle cmg15Oracle cmg15
Oracle cmg15
Kellyn Pot'Vin-Gorman
 
MySQL Group Replication
MySQL Group ReplicationMySQL Group Replication
MySQL Group Replication
Mark Swarbrick
 
Coherence 12.1.3 hidden gems
Coherence 12.1.3 hidden gemsCoherence 12.1.3 hidden gems
Coherence 12.1.3 hidden gems
harvraja
 
Time-series Analytics using Matrix Profile and SAX
Time-series Analytics using Matrix Profile and SAXTime-series Analytics using Matrix Profile and SAX
Time-series Analytics using Matrix Profile and SAX
SUPREET OBEROI
 
Oracle’s Strategy for Cloud User Experiences
Oracle’s Strategy for Cloud User ExperiencesOracle’s Strategy for Cloud User Experiences
Oracle’s Strategy for Cloud User Experiences
Getting value from IoT, Integration and Data Analytics
 
Enterprise Mobility: Secure Containerization
Enterprise Mobility: Secure ContainerizationEnterprise Mobility: Secure Containerization
Enterprise Mobility: Secure Containerization
Domenico Catalano
 
[2015 Oracle Cloud Summit] 9. SCM Cloud -SCM 클라우드를 통한 Value Chain 최적화
[2015 Oracle Cloud Summit] 9. SCM Cloud -SCM 클라우드를 통한 Value Chain 최적화[2015 Oracle Cloud Summit] 9. SCM Cloud -SCM 클라우드를 통한 Value Chain 최적화
[2015 Oracle Cloud Summit] 9. SCM Cloud -SCM 클라우드를 통한 Value Chain 최적화
Oracle Korea
 
Securing Corporate Applications and Data on Personal Devices
Securing Corporate Applications and Data on Personal DevicesSecuring Corporate Applications and Data on Personal Devices
Securing Corporate Applications and Data on Personal Devices
Artur Alves
 
Innovations dbsec-12c-pub
Innovations dbsec-12c-pubInnovations dbsec-12c-pub
Innovations dbsec-12c-pubOracleIDM
 
Wearable Banking (2015)
Wearable Banking (2015)Wearable Banking (2015)
Wearable Banking (2015)
Isabel Fernández Peñuelas
 
3° Sessione Oracle - CRUI: Mobile&Conversational Interface
3° Sessione Oracle - CRUI: Mobile&Conversational Interface3° Sessione Oracle - CRUI: Mobile&Conversational Interface
3° Sessione Oracle - CRUI: Mobile&Conversational Interface
Jürgen Ambrosi
 
AIOUG-GroundBreakers-2018 -Using Oracle Autonomous Health Framework to Preser...
AIOUG-GroundBreakers-2018 -Using Oracle Autonomous Health Framework to Preser...AIOUG-GroundBreakers-2018 -Using Oracle Autonomous Health Framework to Preser...
AIOUG-GroundBreakers-2018 -Using Oracle Autonomous Health Framework to Preser...
Sandesh Rao
 
NZOUG - GroundBreakers-2018 -Using Oracle Autonomous Health Framework to Pres...
NZOUG - GroundBreakers-2018 -Using Oracle Autonomous Health Framework to Pres...NZOUG - GroundBreakers-2018 -Using Oracle Autonomous Health Framework to Pres...
NZOUG - GroundBreakers-2018 -Using Oracle Autonomous Health Framework to Pres...
Sandesh Rao
 
Developers vs DBAs - How to win the war
Developers vs DBAs - How to win the warDevelopers vs DBAs - How to win the war
Developers vs DBAs - How to win the war
gvenzl
 

Similar to Percona Live - Dublin 02 security + tuning (20)

Overview Oracle Identity Management tijdens AMIS Simplified Security seminar
Overview Oracle Identity Management tijdens AMIS Simplified Security seminarOverview Oracle Identity Management tijdens AMIS Simplified Security seminar
Overview Oracle Identity Management tijdens AMIS Simplified Security seminar
 
Data Management in a Microservices World
Data Management in a Microservices WorldData Management in a Microservices World
Data Management in a Microservices World
 
Securing Mobile Device Access
Securing Mobile Device AccessSecuring Mobile Device Access
Securing Mobile Device Access
 
Chicago EPM Day-Excellence in Consolidations with HFM
Chicago EPM Day-Excellence in Consolidations with HFMChicago EPM Day-Excellence in Consolidations with HFM
Chicago EPM Day-Excellence in Consolidations with HFM
 
The Rise of Adaptive Marketing
The Rise of Adaptive MarketingThe Rise of Adaptive Marketing
The Rise of Adaptive Marketing
 
Manual oracle
Manual oracleManual oracle
Manual oracle
 
Oracle cmg15
Oracle cmg15Oracle cmg15
Oracle cmg15
 
MySQL Group Replication
MySQL Group ReplicationMySQL Group Replication
MySQL Group Replication
 
Coherence 12.1.3 hidden gems
Coherence 12.1.3 hidden gemsCoherence 12.1.3 hidden gems
Coherence 12.1.3 hidden gems
 
Time-series Analytics using Matrix Profile and SAX
Time-series Analytics using Matrix Profile and SAXTime-series Analytics using Matrix Profile and SAX
Time-series Analytics using Matrix Profile and SAX
 
Oracle’s Strategy for Cloud User Experiences
Oracle’s Strategy for Cloud User ExperiencesOracle’s Strategy for Cloud User Experiences
Oracle’s Strategy for Cloud User Experiences
 
Enterprise Mobility: Secure Containerization
Enterprise Mobility: Secure ContainerizationEnterprise Mobility: Secure Containerization
Enterprise Mobility: Secure Containerization
 
[2015 Oracle Cloud Summit] 9. SCM Cloud -SCM 클라우드를 통한 Value Chain 최적화
[2015 Oracle Cloud Summit] 9. SCM Cloud -SCM 클라우드를 통한 Value Chain 최적화[2015 Oracle Cloud Summit] 9. SCM Cloud -SCM 클라우드를 통한 Value Chain 최적화
[2015 Oracle Cloud Summit] 9. SCM Cloud -SCM 클라우드를 통한 Value Chain 최적화
 
Securing Corporate Applications and Data on Personal Devices
Securing Corporate Applications and Data on Personal DevicesSecuring Corporate Applications and Data on Personal Devices
Securing Corporate Applications and Data on Personal Devices
 
Innovations dbsec-12c-pub
Innovations dbsec-12c-pubInnovations dbsec-12c-pub
Innovations dbsec-12c-pub
 
Wearable Banking (2015)
Wearable Banking (2015)Wearable Banking (2015)
Wearable Banking (2015)
 
3° Sessione Oracle - CRUI: Mobile&Conversational Interface
3° Sessione Oracle - CRUI: Mobile&Conversational Interface3° Sessione Oracle - CRUI: Mobile&Conversational Interface
3° Sessione Oracle - CRUI: Mobile&Conversational Interface
 
AIOUG-GroundBreakers-2018 -Using Oracle Autonomous Health Framework to Preser...
AIOUG-GroundBreakers-2018 -Using Oracle Autonomous Health Framework to Preser...AIOUG-GroundBreakers-2018 -Using Oracle Autonomous Health Framework to Preser...
AIOUG-GroundBreakers-2018 -Using Oracle Autonomous Health Framework to Preser...
 
NZOUG - GroundBreakers-2018 -Using Oracle Autonomous Health Framework to Pres...
NZOUG - GroundBreakers-2018 -Using Oracle Autonomous Health Framework to Pres...NZOUG - GroundBreakers-2018 -Using Oracle Autonomous Health Framework to Pres...
NZOUG - GroundBreakers-2018 -Using Oracle Autonomous Health Framework to Pres...
 
Developers vs DBAs - How to win the war
Developers vs DBAs - How to win the warDevelopers vs DBAs - How to win the war
Developers vs DBAs - How to win the war
 

More from Mark Swarbrick

MySQL NoSQL Document Store
MySQL NoSQL Document StoreMySQL NoSQL Document Store
MySQL NoSQL Document Store
Mark Swarbrick
 
MySQL @ the University Of Nottingham
MySQL @ the University Of NottinghamMySQL @ the University Of Nottingham
MySQL @ the University Of Nottingham
Mark Swarbrick
 
InnoDb Vs NDB Cluster
InnoDb Vs NDB ClusterInnoDb Vs NDB Cluster
InnoDb Vs NDB Cluster
Mark Swarbrick
 
MySQL Security & GDPR
MySQL Security & GDPRMySQL Security & GDPR
MySQL Security & GDPR
Mark Swarbrick
 
Intro To MySQL 2019
Intro To MySQL 2019Intro To MySQL 2019
Intro To MySQL 2019
Mark Swarbrick
 
MySQL 8
MySQL 8MySQL 8
MySQL Dublin Event Nov 2018 - MySQL 8
MySQL Dublin Event Nov 2018 - MySQL 8MySQL Dublin Event Nov 2018 - MySQL 8
MySQL Dublin Event Nov 2018 - MySQL 8
Mark Swarbrick
 
MySQL Dublin Event Nov 2018 - State of the Dolphin
MySQL Dublin Event Nov 2018 - State of the DolphinMySQL Dublin Event Nov 2018 - State of the Dolphin
MySQL Dublin Event Nov 2018 - State of the Dolphin
Mark Swarbrick
 
Oracle Code Event - MySQL JSON Document Store
Oracle Code Event - MySQL JSON Document StoreOracle Code Event - MySQL JSON Document Store
Oracle Code Event - MySQL JSON Document Store
Mark Swarbrick
 
TLV - MySQL Enterprise Edition + Cloud
TLV - MySQL Enterprise Edition + CloudTLV - MySQL Enterprise Edition + Cloud
TLV - MySQL Enterprise Edition + Cloud
Mark Swarbrick
 
MySQL At University Of Nottingham - 2018 MySQL Days
MySQL At University Of Nottingham - 2018 MySQL DaysMySQL At University Of Nottingham - 2018 MySQL Days
MySQL At University Of Nottingham - 2018 MySQL Days
Mark Swarbrick
 
MySQL At Mastercard - 2018 MySQL Days
MySQL At Mastercard - 2018 MySQL DaysMySQL At Mastercard - 2018 MySQL Days
MySQL At Mastercard - 2018 MySQL Days
Mark Swarbrick
 
MySQL 8 - 2018 MySQL Days
MySQL 8 - 2018 MySQL DaysMySQL 8 - 2018 MySQL Days
MySQL 8 - 2018 MySQL Days
Mark Swarbrick
 
MySQL InnoDB + NDB Cluster - 2018 MySQL Days
MySQL InnoDB + NDB Cluster - 2018 MySQL DaysMySQL InnoDB + NDB Cluster - 2018 MySQL Days
MySQL InnoDB + NDB Cluster - 2018 MySQL Days
Mark Swarbrick
 
MySQL Cloud - 2018 MySQL Days
MySQL Cloud - 2018 MySQL DaysMySQL Cloud - 2018 MySQL Days
MySQL Cloud - 2018 MySQL Days
Mark Swarbrick
 
MySQL 2018 Intro - 2018 MySQL Days
MySQL 2018 Intro - 2018 MySQL DaysMySQL 2018 Intro - 2018 MySQL Days
MySQL 2018 Intro - 2018 MySQL Days
Mark Swarbrick
 
MySQL + GDPR
MySQL + GDPRMySQL + GDPR
MySQL + GDPR
Mark Swarbrick
 
MySQL Enterprise Cloud
MySQL Enterprise Cloud MySQL Enterprise Cloud
MySQL Enterprise Cloud
Mark Swarbrick
 
MySQL Enterprise Cloud
MySQL Enterprise CloudMySQL Enterprise Cloud
MySQL Enterprise Cloud
Mark Swarbrick
 

More from Mark Swarbrick (19)

MySQL NoSQL Document Store
MySQL NoSQL Document StoreMySQL NoSQL Document Store
MySQL NoSQL Document Store
 
MySQL @ the University Of Nottingham
MySQL @ the University Of NottinghamMySQL @ the University Of Nottingham
MySQL @ the University Of Nottingham
 
InnoDb Vs NDB Cluster
InnoDb Vs NDB ClusterInnoDb Vs NDB Cluster
InnoDb Vs NDB Cluster
 
MySQL Security & GDPR
MySQL Security & GDPRMySQL Security & GDPR
MySQL Security & GDPR
 
Intro To MySQL 2019
Intro To MySQL 2019Intro To MySQL 2019
Intro To MySQL 2019
 
MySQL 8
MySQL 8MySQL 8
MySQL 8
 
MySQL Dublin Event Nov 2018 - MySQL 8
MySQL Dublin Event Nov 2018 - MySQL 8MySQL Dublin Event Nov 2018 - MySQL 8
MySQL Dublin Event Nov 2018 - MySQL 8
 
MySQL Dublin Event Nov 2018 - State of the Dolphin
MySQL Dublin Event Nov 2018 - State of the DolphinMySQL Dublin Event Nov 2018 - State of the Dolphin
MySQL Dublin Event Nov 2018 - State of the Dolphin
 
Oracle Code Event - MySQL JSON Document Store
Oracle Code Event - MySQL JSON Document StoreOracle Code Event - MySQL JSON Document Store
Oracle Code Event - MySQL JSON Document Store
 
TLV - MySQL Enterprise Edition + Cloud
TLV - MySQL Enterprise Edition + CloudTLV - MySQL Enterprise Edition + Cloud
TLV - MySQL Enterprise Edition + Cloud
 
MySQL At University Of Nottingham - 2018 MySQL Days
MySQL At University Of Nottingham - 2018 MySQL DaysMySQL At University Of Nottingham - 2018 MySQL Days
MySQL At University Of Nottingham - 2018 MySQL Days
 
MySQL At Mastercard - 2018 MySQL Days
MySQL At Mastercard - 2018 MySQL DaysMySQL At Mastercard - 2018 MySQL Days
MySQL At Mastercard - 2018 MySQL Days
 
MySQL 8 - 2018 MySQL Days
MySQL 8 - 2018 MySQL DaysMySQL 8 - 2018 MySQL Days
MySQL 8 - 2018 MySQL Days
 
MySQL InnoDB + NDB Cluster - 2018 MySQL Days
MySQL InnoDB + NDB Cluster - 2018 MySQL DaysMySQL InnoDB + NDB Cluster - 2018 MySQL Days
MySQL InnoDB + NDB Cluster - 2018 MySQL Days
 
MySQL Cloud - 2018 MySQL Days
MySQL Cloud - 2018 MySQL DaysMySQL Cloud - 2018 MySQL Days
MySQL Cloud - 2018 MySQL Days
 
MySQL 2018 Intro - 2018 MySQL Days
MySQL 2018 Intro - 2018 MySQL DaysMySQL 2018 Intro - 2018 MySQL Days
MySQL 2018 Intro - 2018 MySQL Days
 
MySQL + GDPR
MySQL + GDPRMySQL + GDPR
MySQL + GDPR
 
MySQL Enterprise Cloud
MySQL Enterprise Cloud MySQL Enterprise Cloud
MySQL Enterprise Cloud
 
MySQL Enterprise Cloud
MySQL Enterprise CloudMySQL Enterprise Cloud
MySQL Enterprise Cloud
 

Recently uploaded

Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 

Recently uploaded (20)

Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 

Percona Live - Dublin 02 security + tuning