If you are like me and love to keep up with the latest news in the Database, SQL and Cloud world, this is your place. Here is a short list of the blogs posts that got my attention during the past week. I hope you like them!
Best practices for working with Amazon Aurora Serverless: “Amazon Aurora Serverless is an on-demand, auto-scaling configuration for Amazon Aurora. Amazon Aurora Serverless v2, currently in preview, scales instantly from hundreds to hundreds-of-thousands of transactions in a fraction of a second. As it scales, it adjusts capacity in fine-grained increments to provide just the right amount of database resources and supports all manners of database workloads. Amazon Aurora Serverless v1 is a simple, cost-effective option for infrequent, intermittent, or unpredictable workloads. This blog post focuses on best practices for working with Aurora Serverless v1 databases.”
Unusual AWS Architectures: “AWS provides many building blocks. As architects, we have to choose the right building blocks to construct our systems. But sometimes, the proper building block is not available, and we have to make compromises. In this blog post, I show four unusual AWS architectures that deal with AWS’s limitations in creative ways.”
Ensure that SSRS is Working while Using Availability Groups: “With both SSRS databases on AG, most of the functionality is available, so the SSRS Report Portal will serve reports (records from the data sources, datasets, and catalog tables) and obey the security mechanism (users, policies, role tables), but SSRS subscriptions will suddenly stop working (despite the subscription table being in-sync). Any existing SSRS subscriptions will stop working regardless if the SSRS GUID job (unfortunately, Microsoft never got to make SSRS jobs user-friendly) is enabled or not. Trying to create a new SSRS subscription will be greeted with a very cryptic error message.”
How to Secure MySQL: Part One: “Whenever application security is mentioned, people think of securing applications against some of the most frequent attacks such as injection, broken authentication, sensitive data exposure, and the like. However, while these attacks are prevalent, knowing how to protect your application from them alone will not be sufficient – especially when you’re running MySQL. Today we are going to look at a different side of security – we are going to look into how to properly secure MySQL.”
And this is it. I hope you enjoyed reading them as much as I did. Have a nice weekend and keep yourself healthy!