Achieving PCI compliance can be a difficult and expensive process. This session will begin by clarifying which requirements affect MySQL and then step through each requirement, providing common solutions to satisfy them.
Learn everything there is to know about being a MySQL DBA in 1 day. this full day tutorial will teach you all the most important topics of being a MySQL DBA. At the same time it will prepare you for the MySQL DBA certification. Topics included in the tutorial are: Storage Engines, Backups, Server Architecture, Resource Usage, Optimisation, Security, Replication, Monitoring & Troubleshooting etc.
This tutorial focuses on the diagnostic tools you can turn to when confronted with an unexplained performance problem. Tools explained include iostat, vmstat, and mk-query-digest. The emphasis is on practical usage under pressure, and less on performance theory.
openark-kit is a tool set of scripts which fills in some gaps in daily MySQL maintenance work. Some scripts make for automation of routine work; others introduce new functionality to the MySQL server. This session introduces concepts and usage of the openark-kit.
Site failures can blow your business out of the water unless you have a disaster recovery site already setup, tested, and ready to go. This talk presents a cookbook approach for setting up and managing MySQL DR. Standard architectures, failover procedures, and failback are covered. Finally, we talk about how to test it all so you know it works.
Security is often considered a waste of time given its tedious, painful and underestimated. This is where securich comes to the rescue helping you control users, privileges and enforce good passwords. User cloning, renaming, password complexity and much much more.
Security is becoming more important than ever, and as such, it should be a high concern for MySQL users. In this session we will cover important MySQL security practices, with a focus on configuring and using SSL with MySQL. Although sometimes overlooked, data in transit is vulnerable and should be secured. The use of SSL/TLS provides us with a tool to help protect peace of mind and data security.
This talk explores the ways attackers with no authorized database access
can steal Postgres passwords, see database queries and results, and even
intercept database sessions and return false data. Postgres supports
features to eliminate all of these threats, but administrators must
understand the attack vulnerabilities to protect against them.