O'Reilly logo

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Database Reliability Engineering

Book Description

If you’re an IT professional looking to broaden your knowledge of database administration, this practical book takes you through each component of site reliability and operations within the context of database engines. IT staffers with minimal database operations experience can use this knowledge as a foundation of the architecture and operations within a specific database.

This book uses open-source engines such as MySQL, PostgreSQL, MongoDB, and Cassandra as examples throughout.

Table of Contents

  1. 1. Introducing Database Reliability Engineering 
    1. Guiding Principles of the DBRE
    2. Operations Core Overview
    3. Hierarchy of Needs
    4. Operational Core Competencies
  2. 2. Service Level Management
    1. Service Level Indicators
    2. Defining Service Objectives
    3. Monitoring and Reporting on SLOs
    4. Chapter Wrap-Up
  3. 3. Operational Visibility
    1. The New Rules of Operational Visibility
    2. An Opviz Framework
    3. Data In
      1. Telemetry/Metrics
    4. Data Out
    5. Bootstrapping your Monitoring
    6. Instrumenting the Application
    7. Instrumenting the Server or Instance
    8. Instrumenting the Datastore
    9. Datastore Connection Layer
    10. Internal Database Visibility
    11. Database Objects
    12. Database Queries
    13. Database Asserts and Events
    14. Wrapping Up
  4. 4. Infrastructure Engineering
    1. Hosts
      1. Physical Servers
      2. Virtualization
      3. Containers
    2. Database as a Service
      1. Challenges of DBaaS
      2. The DBRE and the DBaaS
    3. Wrapping Up
  5. 5. Infrastructure Management
    1. Version Control
    2. Configuration Definition
    3. Building from Configuration
    4. Maintaining Configuration
      1. Enforcement of Configuration Definitions
    5. Infrastructure Definition and Orchestration
      1. Monolithic Infrastructure Definitions
      2. Separating Vertically
      3. Separated Tiers (Horizontal Definitions)
    6. Service Catalog
    7. Bringing it All Together
    8. Development Environments
    9. Wrapping Up
  6. 6. Backup and Recovery
    1. Core Concepts
      1. Physical vs. Logical
      2. Online vs. Offline
      3. Full, Incremental and Differential
    2. Considerations for Recovery
    3. Recovery Scenarios
      1. Planned Recovery Scenarios
      2. Unplanned Scenarios
      3. Scenario scope
      4. Scenario impact
    4. Anatomy of a Recovery Strategy
      1. Building Block 1: Detection
      2. Building Block 2: Tiered Storage
      3. Building Block 3: A Varied Toolbox
      4. Building Block 4: Testing
    5. A Recovery Strategy, Defined
      1. Online, fast storage with full and incremental backups
      2. Online, Slow Storage with Full and Incremental Backups
      3. Offline Storage
      4. Object Storage
    6. Wrapping Up
  7. 7. Release Management
    1. Education and Collaboration
      1. Become a Funnel
      2. Foster Conversations
      3. Domain Specific Knowledge
      4. Collaboration
    2. Integration
      1. Prerequisites
    3. Testing
      1. Test-Friendly Development Practices
      2. Post-Commit Testing
      3. Full Dataset Testing
      4. Downstream Tests
      5. Operational Tests
    4. Deployment
      1. Migrations and Versioning
      2. Impact Analysis
      3. Migration Patterns
      4. Manual or Automated
    5. Wrapping Up
  8. 8. Security
    1. The Purpose of Security
    2. Database Security as a Function
      1. Education and Collaboration
      2. Self-Service
      3. Integration and Testing
      4. Operational Visibility
    3. Vulnerabilities and Exploits
      1. STRIDE
      2. DREAD
      3. Basic Precautions
      4. Denial of Service
      5. SQL Injection
      6. Network and Authentication Protocols
    4. Encryption of Data
      1. Data In Transit
      2. Data in the Database
      3. Data in the Filesystem
    5. Wrapping Up