Lock It Down and Tighten It Up: THL Encryption and Compression Comes With Tungsten Replicator v7
Performance tuning any system provides more speed for the same hardware spend, gives the end-user a better, faster experience and typically reduces the stress on staff all around. Security tuning locks down critical data to prevent unauthorized access. Today we will explore both the security and performance enhancements available for the Tungsten Replicator THL sub-system as of version 7.x.
Inspect In-Flight MySQL Queries: Tungsten Connector Audit Logging to the Rescue
Sometimes you really, really want to know what a MySQL client is asking of the MySQL server. As of Tungsten Clustering v7.0.0, you may now enable Connector Audit Logging, which captures data transferred between client applications and MySQL servers to a file, database or socket. This blog post will walk you through the feature and how to enable, configure and disable Tungsten Connector Audit Logging.
Securing Your Cluster: View Your Security Stance Using tpm report
In this post we will explore a new command in v7.0.1, tpm report. The purpose of tpm report is to provide easy access to all of the settings that pertain to a specific topic. Since Security is a high priority at Continuent, the current default (and only) topic is the Security stance. The tpm report command will evolve and grow over time. This first version is Continuent’s way of providing as much transparency about Tungsten Cluster Security as possible.
Now Available: Tungsten v6.1.17 Release
We are pleased to announce that Tungsten Clustering and Tungsten Replicator GA version 6.1.17 are now available. Tungsten allows enterprises running business-critical MySQL database applications to cost-effectively achieve continuous global operations with commercial-grade high availability (HA), geographically redundant disaster recovery (DR) and geographically distributed active/active.
What You Must Know about Data Security
It goes without saying that database security is top priority at Continuent; Tungsten Clustering customers in financial and healthcare organizations among others implement the strictest standards of data security, and so we have always kept it a mandate to not only support HIPPA and PII compliance, and maintain strict boundaries and protocols in design of our software solution and when providing support.