Operations | Monitoring | ITSM | DevOps | Cloud

The latest News and Information on Databases and related technologies.

Database Partitioning: Types, Strategies, and When to Use Each

How database partitioning works in PostgreSQL and MySQL. Range, list, and hash partitioning with SQL examples and guidance on when to partition vs shard. Prathamesh works as an evangelist at Last9, runs SRE stories - where SRE and DevOps folks share their stories, and maintains o11y.wiki - a glossary of all terms related to observability.

Database Sharding: How It Works and When You Actually Need It

How database sharding works, common strategies (hash, range, directory), shard key selection, and the operational cost of running a sharded database in production. Prathamesh works as an evangelist at Last9, runs SRE stories - where SRE and DevOps folks share their stories, and maintains o11y.wiki - a glossary of all terms related to observability.

Open Source Liquibase MongoDB Native Executor by Harness | Harness Blog

Harness is strengthening the open Liquibase ecosystem by introducing a native MongoDB executor that removes long-standing limitations for Community Edition users. It enables teams to run MongoDB scripts, generate changelogs, and integrate database workflows into CI/CD without relying on paid extensions. The initiative reinforces open collaboration while making MongoDB-based database DevOps more accessible, consistent, and production-ready.

AI Query Assist for SolarWinds SQL Sentry

Rewrite inefficient SQL Server queries in seconds—not hours. In this demo, we show you how AI Query Assist in SolarWinds SQL Sentry transforms the way you tune performance. Watch how to take a problematic query from the "Top SQL" view and use generative AI to instantly generate optimized rewrites and uncover missing indexes. What you will see: Instant Optimization: How to automate query rewriting and get plain-language explanations of the logic changes.

Database Security Failures Don't Start in Security Teams

When a database security incident happens, everyone turns to the security team. We look for a simple root cause analysis, and then we add a control, tighten a policy, and maybe even buy a silver bullet tool. We feel progress! But the incident didn’t start there. It started years earlier, when the organization made a series of perfectly reasonable decisions that quietly expanded the surface area and weakened the consistency of control.