ProxySQL and Percona XtraDB our new HA solution

As the Data Center expand because of such many requirements we searched also to improve the High Availability of our DC.

Not a very simple task as we already run enough servers and we cannot just stop a server even for 10 minutes.

The step we made this time for HA it was one of the most sensitive part of our DC: the SQL servers.

Practically all information you put on your web site is using a database. Also on our development platforms we use very intensive DB servers.

As DB we are mostly using MySQL and MariaDB.

Why HA servers?

Maybe you think that a simple backup could solve any problem. But there are a few problems: when you make (for auto backup is the same) a backup, the tables get lock during the dump, so you cannot write new info into the tables. But this is the smallest problem. If the MySQL or MariaDB server are going off you should start the backup server asking yourself what data will be lost. Also the users will be unhappy as the will receive the ‘Cannot connect to database’ error.

For all this you need a High Availability solution.

As Percona offer HA solution which integrate also MySQL, MariaDB, even MongoDB and RocksDB it appeared very interesting for us to migrate to their solution.

Our first tests was made on 4 VM to check what’s happening with some databases.

What we discovered it was that we have to make some changes on our dumps from the old MySQL servers as we are no more running on permissive premise. Simple to tell, not so simple to make.

Some of our PHP and HACK code also has to be changed (we checked one of our SAS solution for our customers which runs under PHP and HHVM).

But at the end we just loved the solution as we was able to close any node and everything worked just fine, even it remain a single workig node

Now let’s take a look of our production solution implemented on our DC

On the right side you can see two nodes on Data Center A and two nodes on Data Center B as we want to simplify the schematics to easily understand the situation.

This are the nodes of Percona XtraDB.

When you run for the first time this nodes you should start the first node as boostrap service because it will give the cluster name. Now it is the right moment to populate the server with data.

Just as an example, we took one of the busiest wordpress based web site of a client of us and moved in realtime to the new cluster. First we prepared all using the old server, we transformed all MyISAM tables to InnoDB and transfered the data between the servers.

Once the bootstraped server is provisioned with all the data we start to join the cluster with the new node. As it is very new and empty SQL we have to wait till SST/IST is ends displaying on log that the server is SYNCED . After we pass to another node until we start the last node.

Now we have a HA solution working.

Why Data Center A and Data Center B. To have a real HA solution it is just better that your data resides on two locations. If one location become unavailable for different reasons you have the other location working

All this it is possible because of another piece of server named ProxySQL. Yes, it is just awesome, free Open Source server.

With ProxySQL you have HA and also load balancing but this is not all. You have a lot of security. The Application Servers will not connect directly to your DB Servers, it will pass through the ProxySQL which will act also as a firewall.

The ProxySQL server should run on a separate server as it should be independent from any node. You provision the server with the nodes. When a request is made the server will check for available nodes and also it will check

Some of the most important features of this solution are:

  • Query caching
  • Query Routing
  • Supports failover
  • Cross platform
  • Advanced configuration with almost 0 downtime
  • Application layer proxy A
  • dvanced topology support
  • Firewall
  • Dynamically route traffic on demand.
  • Built-in monitoring.
  • Runtime reconfigurable.
  • Load Balancing.
  • Read/Write split and sharing.


Stay tuned on our web page and on our FB to know the latest development news from us !




Report: Brute Force Attacks on our servers April 2016

Report: Brute Force Attacks on our servers April 2016

As we already wrote, one of the attack target on any WordPress web hosting data center it is the Brute Force Attack, when the intruder try to check even 1000 password per minute in order to hack a web site.

brute_force_attacks_may_2016As our policy it is not only to stop, but also to ban completely the IPs where from come the attacks, we reduce the risks that your website hosted in Custom Cloud Servers to be hacked. Read more

May 2016 come with a more user friendly LOCKY ransomware

May 2016 come with a more user friendly LOCKY ransomware

On 6th of may our mailbox received a very nice email apparently from a Gmail account with an invoice zip file.  The single text found it was ‘Sent from my Samsung device’

But as we are searching for new viruses we just stopped on the sender IP ( which doesn’t belong to Gmail servers.

Anyway who is looking at email sources after all.

To view the video please just switch in full screen.

Read more

Last 10 days Brute Force Attacks in our Data Center Report

Last 10 days Brute Force Attacks in our Data Center Report

We already explained the Brute Force Attack in a previous article

Our Data Center it is also the target of such attacks, as it is normal. We counter only new attacks each day as the old one are already banned, so we are not interested on that ones.

Last 10 days new Brute Force Attacks statisticsSeries1 represent the total number of new attacks in our data center. (click the pic to enlarge it) Read more

Inside the brain of a Black Hat hacker: the making of ransomware distribution

Inside the brain of a Black Hat hacker: the making of ransomware distribution

If you think that you will find here how to create a ransomware it is better to search another source than us.

For the users protection we didn’t show even the whole source of the Office Macro. Moreover after we decrypted the password of the macro (in order to view it) we unprotected the macro in order to not know the numbers of the characters of the original virus macro.

Now let’s start to view first the 4 minutes video made by us. Please DO NOT TRY ON YOUR PERSONAL computer to ‘play’ with viruses because it exist a very big possibility to get your computer harmed by the virus. Read more

DNS Windows hosts file hijack

DNS Windows hosts file hijack

Today we present you another way for hackers to hijack your data.

Using a malware from an email or from an infected webpage, the intruders simply modify your hosts file (from /windows/system32/drivers/etc)

By making some changes here the intruder will have a few choices on what to do next. Now all depends on what did he need.

The most common intrusion on the hosts file it is combined with another changes made in your registry and your browsers. But simply modifying this small file could divert your request to another web sites.

Read more

WordPress Brute Force Attack

WordPress Brute Force Attack

Unlike other method of hacking which means more elaborate methods, when we think about WordPress web sites our minds of security stuff go directly to Brute Force Attacks.

loginFrom the early years of WP there it is a wp-login.php file on the root directory and a folder /wp-admin.

Also there are thousand of user which are using as administrator user name ‘admin’ with very simple passwords like admin123 or other simple to guess passwords. Read more

What about antivirus on ransomware war?

What about antivirus on ransomware war?

First of all please do not try in any way this on your computer!

One of the best methods to keep far from your computer any malware and viruses it is to use an anti virus program.

There are a few very good, some of them free or free to test.

Some of the best include (alphabetical order) Avira, ESSET or Malwarebytes

But you have to pay a lot of attention on the updates. Read more