MySQL binary logging is used for replication and also for point-in-time recovery of a MySQL database instance. It records any changes to database contents and may be recorded in a "statement-based" or "row-based" format. The default location to find the binary logs is...
Welcome to our blog, which is more than just a record of our experiences. It’s a resource.
Our blog is an invaluable resource for anyone struggling with the challenges of managing a database, applications, or clouds.
We understand the difficulties involved in troubleshooting, building, improving, securing, and operating these platforms,
and we’re here to share our insights and expertise with you. Browse through our collection of blog posts below,
and don’t hesitate to leave your comments and feedback.
Resolving SQL0930N Memory Errors after an RHEL 7.8 Upgrade
A colleague and I were recently working on a Db2 server with a large amount of memory (512 Gb) and were supporting the system administrators in applying operating system maintenance to bring the system from RedHat Enterprise Linux (RHEL) 7.6 to RHEL 7.8. The operating...
Archiving Methodology in Office 365 Using a Shared Mailbox
This article covers an SOP scenario that can be adopted in an online exchange environment for archiving active mailboxes for future access. The benefit of this feature is the capability to control access to the archived mailbox and a money-saving tool (as shared...
Linux OS and File System Tuning for Database Servers
The Linux OS from major vendors, including Red Hat, Ubuntu, and Debian, has defaults set out of the box that works well with minimally spec'd hardware. However, if you want the best performance for your MySQL databases, you need to make changes in how Linux handles...
Oracle Create a Wallet to Store Secure User Credentials for RMAN Connection
In this blog, I'll be giving a tutorial on an Oracle hidden gem using an Oracle tool to securely allow you to run RMAN without passing the password in cleartext. The Oracle Database Secure External Password Store feature, which does not require any additional license...
Will Migrating to PostgreSQL or MongoDB Save You Money?
One of the most common questions our clients ask us is, "can we save money migrating to an open-source database like PostgreSQL or MongoDB?" The answer is simple: yes. Before we dive into the details, it's important to note that "open source" does not mean free. While...
How to Tell If Your Computer Has a Virus and Steps to Remove
Overview This doc is a general overview of symptoms to look for in the event of a potential virus alert from your service support product, or a user calls in regarding a potential virus. We'll also cover what to do in the event of a potential virus on a PC. We are...
Converting Oracle 12c Non-CDB Database to CDB Multitenant Architecture
The steps below outline how to convert an Oracle 12c non-container database to a pluggable database in the multitenant architecture. Oracle has moved all future releases to the multitenant architecture so conversion will eventually be necessary. These steps are...
Setting up Azure Active Directory Domain Services (Azure AD DS)
Microsoft's Azure Active Directory Domain Services (Azure AD DS) provides managed domain services such as domain join, group policy, lightweight directory access protocol (LDAP), and Kerberos/NTLM authentication that's fully compatible with Windows Server Active...
Resolving the ORA-24247: network access denied by access control list (ACL) error
Before Oracle 11g access to network services was controlled by granting privileges on packages such as UTL_HTTP, UTL_TCP, UTL_SMTP, and UTL_MAIL. After 11.1 Oracle introduced Application Control Lists (ACL) as part of their Application Security and has now added...









