DevOps

1107, 2025

How to Manage PostgreSQL Clusters with GitOps using CloudNativePG and ArgoCD

11-07-2025|Database, DevOps|

  At PGConf.de in Berlin this year, I had the pleasure of presenting on the powerful combination of CloudNativePG and GitOps. For those who couldn't attend — or anyone looking to streamline their PostgreSQL cluster management — this blog post shows how to apply GitOps principles with CloudNativePG for a more efficient and reliable [...]

1004, 2025

Tutorial: Database load testing using HammerDB

10-04-2025|Database, DevOps|

HammerDB is an open source database benchmarking software that supports PostgreSQL, Microsoft SQL Server, IBM Db2, Oracle, MariaDB, and MySQL, as well as CLI, local GUI, and a web browser GUI. The benchmarks used by HammerDB, TPROC-C and TPROC-H, are based on the widely used TPC-C- and  TPC-H benchmarks. Test results are reported in [...]

2709, 2024

Get Notified: Setting Up Alerts in Grafana

27-09-2024|DevOps|

If you are using Grafana to monitor your systems, you are already ahead of the game. But did you know that you can also use Grafana to set up alerts? This is a great way to get notified when something goes wrong with your systems. In this blog post, we will show you how to [...]

1709, 2024

Coordinating OS Update on Multiple Fedora CoreOS Machines

17-09-2024|DevOps|

Fedora CoreOS is a lightweight, container-focused operating system. It is designed to be updated automatically and frequently with atomic updates. This means that the entire operating system is updated as a whole. This is a great feature for keeping your system up to date and secure, but it can be a challenge to coordinate [...]

1804, 2024

SELinux: A Mandatory Part of Running a Secure PostgreSQL Database

18-04-2024|Database, DevOps|

Data is the most critical asset of any company today. There are many recommendations to secure a PostgreSQL database, e.g. CIS Benchmark for PostgreSQL, but Linux provides already one which you should not avoid: Security-Enhanced Linux (SELinux). SELinux provides access control for files, processes and applications to grant access or deny it. This security architecture [...]

Go to Top