{"id":12797,"date":"2025-12-20T09:44:23","date_gmt":"2025-12-20T04:14:23","guid":{"rendered":"https:\/\/www.youstable.com\/blog\/?p=12797"},"modified":"2025-12-20T09:44:25","modified_gmt":"2025-12-20T04:14:25","slug":"how-to-configure-mariadb-on-linux","status":"publish","type":"post","link":"https:\/\/www.youstable.com\/blog\/how-to-configure-mariadb-on-linux","title":{"rendered":"How to Configure MariaDB on Linux Server &#8211; (Step-by-Step Guide 2026)"},"content":{"rendered":"\n<p><strong>To configure MariaDB on a Linux server in 2026<\/strong>, install the latest LTS build, run mysql_secure_installation, tune my.cnf for performance and security (InnoDB memory, logs, bind-address, TLS), create least-privilege users, enable backups and monitoring, and harden the firewall. The steps below include commands for Ubuntu, Debian, RHEL, AlmaLinux, and Rocky Linux.<\/p>\n\n\n\n<p>Configuring MariaDB on a Linux server is straightforward when you follow a structured plan. This step-by-step guide shows you exactly how to install, secure, optimize, and maintain MariaDB with production-grade settings. You\u2019ll learn how to tune my.cnf, harden access, create users, set up backups, and monitor performance using practical commands and proven configurations.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" class=\"wp-block-heading\" id=\"who-this-guide-is-for\"><strong>Who This Guide is For<\/strong><\/h2>\n\n\n\n<p>This tutorial is beginner-friendly but detailed enough for sysadmins. Whether you host on Ubuntu, Debian, AlmaLinux, Rocky, or RHEL, you\u2019ll find commands for your distro and configurations that match real-world workloads.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" class=\"wp-block-heading\" id=\"prerequisites-and-system-requirements\"><strong>Prerequisites and System Requirements<\/strong><\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Linux server with sudo\/root access (Ubuntu 20.04\/22.04\/24.04, Debian 12, AlmaLinux\/Rocky 8\/9, RHEL 8\/9)<\/li>\n\n\n\n<li>At least 2 GB RAM for light workloads; 4\u20138 GB+ for production databases<\/li>\n\n\n\n<li>Open ports: 22 (SSH), 3306 (MariaDB) \u2014 restrict with firewall or private network<\/li>\n\n\n\n<li>Accurate time sync (chrony or systemd-timesyncd)<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" class=\"wp-block-heading\" id=\"step-1-install-mariadb-on-linux\"><strong>Step 1 \u2014 Install MariaDB on Linux<\/strong><\/h2>\n\n\n\n<p>Use your distribution\u2019s package manager or the official MariaDB repository to install the latest stable LTS (as of 2026, MariaDB 10.6\/10.11 LTS are commonly used). Prefer the vendor repo for timely security updates.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" class=\"wp-block-heading\" id=\"ubuntu-debian\"><strong>Ubuntu\/Debian<\/strong><\/h3>\n\n\n\n<pre class=\"wp-block-code\"><code>sudo apt update\nsudo apt install -y software-properties-common gnupg\n# Optional: add official MariaDB repo for newer builds (adjust version if needed)\nsudo apt-key adv --fetch-keys 'https:\/\/mariadb.org\/mariadb_release_signing_key.asc'\nsudo add-apt-repository 'deb &#91;arch=amd64,arm64] http:\/\/mirror.mariadb.org\/repo\/10.11\/ubuntu jammy main'  # Example for Ubuntu 22.04\nsudo apt update\nsudo apt install -y mariadb-server mariadb-client\n\n# Enable and start\nsudo systemctl enable mariadb\nsudo systemctl start mariadb\n\n# Verify\nmariadb --version\nsudo systemctl status mariadb --no-pager<\/code><\/pre>\n\n\n\n<h3 class=\"wp-block-heading\" class=\"wp-block-heading\" id=\"rhel-almalinux-rocky\"><strong>RHEL\/AlmaLinux\/Rocky<\/strong><\/h3>\n\n\n\n<pre class=\"wp-block-code\"><code>sudo dnf install -y dnf-plugins-core\nsudo dnf config-manager --set-enabled crb || true\n\n# Optional: official MariaDB repo (adjust version and release)\nsudo tee \/etc\/yum.repos.d\/MariaDB.repo &gt;\/dev\/null &lt;&lt;'EOF'\n# MariaDB 10.11 (example)\n&#91;mariadb]\nname = MariaDB\nbaseurl = https:\/\/mirror.mariadb.org\/yum\/10.11\/rhel\/$releasever\/$basearch\ngpgkey=https:\/\/mariadb.org\/mariadb_release_signing_key.asc\ngpgcheck=1\nenabled=1\nEOF\n\nsudo dnf -y install MariaDB-server MariaDB-client\n\n# Enable and start\nsudo systemctl enable mariadb\nsudo systemctl start mariadb\n\n# Verify\nmariadb --version\nsudo systemctl status mariadb --no-pager<\/code><\/pre>\n\n\n\n<h2 class=\"wp-block-heading\" class=\"wp-block-heading\" id=\"step-2-secure-the-installation\"><strong>Step 2 \u2014 Secure the Installation<\/strong><\/h2>\n\n\n\n<p>Run the built-in hardening script, set a strong root password, remove test databases, and disable remote root access.<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>sudo mysql_secure_installation\n\n# Recommended choices:\n# - Set root password: Yes (use a long, random passphrase)\n# - Remove anonymous users: Yes\n# - Disallow root login remotely: Yes\n# - Remove test database and access: Yes\n# - Reload privilege tables: Yes<\/code><\/pre>\n\n\n\n<p>On modern MariaDB builds, the root user may authenticate via unix_socket on localhost, which is safe. If you change to password-based auth, ensure you use strong credentials and SSH tunneling or private networking for administration.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" class=\"wp-block-heading\" id=\"step-3-know-your-mariadb-configuration-files\"><strong>Step 3 \u2014 Know Your MariaDB Configuration Files<\/strong><\/h2>\n\n\n\n<p>MariaDB reads multiple configuration files. The primary file is my.cnf, but includes let you split configs by purpose (server, client, performance, replication).<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Global: \/etc\/mysql\/my.cnf (Ubuntu\/Debian) or \/etc\/my.cnf (RHEL family)<\/li>\n\n\n\n<li>Included directories: \/etc\/mysql\/mariadb.conf.d\/, \/etc\/mysql\/conf.d\/ (Debian family) or \/etc\/my.cnf.d\/ (RHEL family)<\/li>\n\n\n\n<li>Data directory: \/var\/lib\/mysql\/<\/li>\n\n\n\n<li>Logs: \/var\/log\/mysql\/ or \/var\/log\/mariadb\/<\/li>\n<\/ul>\n\n\n\n<p>Use a dedicated file like \/etc\/mysql\/mariadb.conf.d\/50-server.cnf (Debian) or \/etc\/my.cnf.d\/server.cnf (RHEL) to keep server tuning clean.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" class=\"wp-block-heading\" id=\"step-4-tune-core-settings-performance-plus-safety\"><strong>Step 4 \u2014 Tune Core Settings (Performance + Safety)<\/strong><\/h2>\n\n\n\n<p>The most impactful tuning focuses on InnoDB memory, I\/O, and connection limits. The examples below fit typical web apps; always benchmark and adjust for your workload.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" class=\"wp-block-heading\" id=\"memory-innodb\"><strong>Memory (InnoDB)<\/strong><\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>innodb_buffer_pool_size: 60\u201370% of RAM on a <a href=\"https:\/\/www.youstable.com\/blog\/secure-dedicated-server\/\">dedicated DB server<\/a><\/li>\n\n\n\n<li>innodb_buffer_pool_instances: 1\u20138 depending on buffer size (start with 1 for \u22648GB)<\/li>\n\n\n\n<li>innodb_log_file_size: 512M\u20132G for write-heavy workloads<\/li>\n<\/ul>\n\n\n\n<pre class=\"wp-block-code\"><code># \/etc\/mysql\/conf.d\/99-tuning.cnf or \/etc\/my.cnf.d\/99-tuning.cnf\n&#91;mysqld]\n# Memory\ninnodb_buffer_pool_size = 4G\ninnodb_buffer_pool_instances = 1\ninnodb_log_file_size = 1G\ninnodb_log_buffer_size = 256M\n\n# General\nmax_connections = 300\ntable_open_cache = 8000\nthread_cache_size = 100\n\n# Character set\ncharacter-set-server = utf8mb4\ncollation-server = utf8mb4_unicode_ci\n\n# Slow query log\nslow_query_log = ON\nslow_query_log_file = \/var\/log\/mysql\/slow.log\nlong_query_time = 1\n\n# Binary logging (required for PITR\/replication)\nserver_id = 1\nlog_bin = \/var\/log\/mysql\/mariadb-bin\nbinlog_format = ROW\nexpire_logs_days = 7\n\n# Networking\nbind-address = 127.0.0.1\n# If you must expose externally, bind to private IP and firewall it:\n# bind-address = 10.0.0.10<\/code><\/pre>\n\n\n\n<p>After editing, restart MariaDB:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>sudo systemctl restart mariadb\nsudo mariadb -e \"SHOW VARIABLES LIKE 'innodb_buffer_pool_size';\"<\/code><\/pre>\n\n\n\n<h3 class=\"wp-block-heading\" class=\"wp-block-heading\" id=\"logs-and-i-o\"><strong>Logs and I\/O<\/strong><\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Place logs on fast storage and monitor <a href=\"https:\/\/www.youstable.com\/blog\/check-disk-space-files-in-linux\/\">disk space<\/a><\/li>\n\n\n\n<li>Enable slow query log to surface missing indexes<\/li>\n\n\n\n<li>Use ROW binlog format for consistency; adjust expire_logs_days based on backup retention<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\" class=\"wp-block-heading\" id=\"connections-and-timeouts\"><strong>Connections and Timeouts<\/strong><\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>max_connections: Size this realistically; high values magnify RAM usage<\/li>\n\n\n\n<li>wait_timeout: Reduce for web apps (e.g., 60\u2013120) to clean idle connections<\/li>\n\n\n\n<li>thread_cache_size: Helps reuse threads under bursty traffic<\/li>\n<\/ul>\n\n\n\n<pre class=\"wp-block-code\"><code>&#91;mysqld]\nwait_timeout = 120\ninteractive_timeout = 120\nthread_cache_size = 100<\/code><\/pre>\n\n\n\n<p>Avoid relying on the legacy Query Cache; many builds keep it disabled due to contention. Focus on indexing and buffer pool sizing.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" class=\"wp-block-heading\" id=\"step-5-create-databases-users-and-least-privilege-access\"><strong>Step 5 \u2014 Create Databases, Users, and Least-Privilege Access<\/strong><\/h2>\n\n\n\n<p>Create separate users per application with only the permissions they need. Do not use root for applications.<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code># Login as root (socket auth)\nsudo mariadb\n\n# Create <a href=\"https:\/\/www.youstable.com\/blog\/change-a-database-user-password-in-directadmin\/\">database and user with strong password<\/a>\nCREATE DATABASE appdb CHARACTER SET utf8mb4 COLLATE utf8mb4_unicode_ci;\nCREATE USER 'appuser'@'localhost' IDENTIFIED BY 'REPLACE_WITH_LONG_RANDOM_PASSWORD';\nGRANT SELECT, INSERT, UPDATE, DELETE, CREATE, ALTER, INDEX ON appdb.* TO 'appuser'@'localhost';\nFLUSH PRIVILEGES;\n\n# Test login\nmariadb -u appuser -p -e \"SHOW GRANTS FOR 'appuser'@'localhost';\"<\/code><\/pre>\n\n\n\n<h2 class=\"wp-block-heading\" class=\"wp-block-heading\" id=\"step-6-harden-network-and-access-security\"><strong>Step 6 \u2014 Harden Network and Access Security<\/strong><\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Bind to localhost or private IP only (bind-address)<\/li>\n\n\n\n<li>Use a firewall (UFW, firewalld) to restrict 3306 to trusted hosts<\/li>\n\n\n\n<li>Prefer SSH tunnels or VPN for remote administration<\/li>\n\n\n\n<li>Enable TLS for client connections if exposed to untrusted networks<\/li>\n<\/ul>\n\n\n\n<pre class=\"wp-block-code\"><code># UFW (Ubuntu\/Debian)\nsudo ufw allow OpenSSH\nsudo ufw allow from 10.0.0.0\/24 to any port 3306 proto tcp\nsudo ufw enable\nsudo ufw status\n\n# firewalld (RHEL\/AlmaLinux\/Rocky)\nsudo firewall-cmd --permanent --add-rich-rule='rule family=\"ipv4\" source address=\"10.0.0.0\/24\" port protocol=\"tcp\" port=\"3306\" accept'\nsudo firewall-cmd --reload<\/code><\/pre>\n\n\n\n<p>For TLS, generate server certificates and point to them in my.cnf (ssl_cert, ssl_key). Then require SSL per user or globally.<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>&#91;mysqld]\nssl_cert = \/etc\/mysql\/ssl\/server-cert.pem\nssl_key  = \/etc\/mysql\/ssl\/server-key.pem\nssl_ca   = \/etc\/mysql\/ssl\/ca.pem\n\n# Example: require SSL for a user\nGRANT SELECT ON appdb.* TO 'appuser'@'10.%' REQUIRE SSL;<\/code><\/pre>\n\n\n\n<h2 class=\"wp-block-heading\" class=\"wp-block-heading\" id=\"step-7-backups-and-point-in-time-recovery-pitr\"><strong>Step 7 \u2014 Backups and Point-in-Time Recovery (PITR)<\/strong><\/h2>\n\n\n\n<p>Use mariabackup for hot physical backups and mysqldump for logical, schema-level backups. Retain binary logs to roll forward changes.<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code># Install backup tool (if not included)\nsudo apt install -y mariadb-backup || sudo dnf install -y MariaDB-backup\n\n# Full hot backup\nsudo mariabackup --backup --target-dir=\/backups\/full-$(date +%F) --user=root\n\n# Prepare (apply redo logs) and restore test\nsudo mariabackup --prepare --target-dir=\/backups\/full-2026-01-01\n\n# Logical backup (for migrations)\nmysqldump --single-transaction --routines --triggers --events appdb | gzip &gt; \/backups\/appdb-$(date +%F).sql.gz<\/code><\/pre>\n\n\n\n<p>Automate backups with cron\/systemd timers and verify restores regularly. Store copies offsite to protect against server loss or ransomware.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" class=\"wp-block-heading\" id=\"step-8-monitoring-and-troubleshooting\"><strong>Step 8 \u2014 Monitoring and Troubleshooting<\/strong><\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Enable <a href=\"https:\/\/www.youstable.com\/blog\/fix-slow-wordpress-site\/\">slow query log and fix<\/a> high-latency queries with indexes<\/li>\n\n\n\n<li>Use mysqltuner or mdb_stat_tools for quick heuristics (review suggestions carefully)<\/li>\n\n\n\n<li>Check performance schema, SHOW ENGINE INNODB STATUS\\G for locks and I\/O<\/li>\n\n\n\n<li>Export metrics to Prometheus\/Grafana via exporters for long-term trending<\/li>\n<\/ul>\n\n\n\n<pre class=\"wp-block-code\"><code># Quick health\nsudo mariadb -e \"SHOW GLOBAL STATUS LIKE 'Threads_connected';\"\nsudo mariadb -e \"SHOW VARIABLES LIKE 'innodb_buffer_pool_size';\"\n\n# Install MySQLTuner (heuristic tool)\nsudo apt install -y mysqltuner || sudo dnf install -y mysqltuner\nsudo mysqltuner<\/code><\/pre>\n\n\n\n<h2 class=\"wp-block-heading\" class=\"wp-block-heading\" id=\"step-9-optional-basic-replication-setup\"><strong>Step 9 \u2014 Optional: Basic Replication Setup<\/strong><\/h2>\n\n\n\n<p>Replication improves read scalability and availability. Use Row-Based Logging and GTID (if supported in your chosen MariaDB LTS) to simplify failover.<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code># On primary (ensure binary logging enabled)\n&#91;mysqld]\nserver_id = 1\nlog_bin = \/var\/log\/mysql\/mariadb-bin\nbinlog_format = ROW\n\n# Create a replication user\nCREATE USER 'repl'@'10.%' IDENTIFIED BY 'REPLACE_STRONG_PASSWORD';\nGRANT REPLICATION SLAVE ON *.* TO 'repl'@'10.%';\nFLUSH PRIVILEGES;\n\n# Get a consistent snapshot\nFLUSH TABLES WITH READ LOCK;\nSHOW MASTER STATUS;\n# Take a backup now; then UNLOCK TABLES;<\/code><\/pre>\n\n\n\n<pre class=\"wp-block-code\"><code># On replica\n&#91;mysqld]\nserver_id = 2\nrelay_log = \/var\/log\/mysql\/relay-bin\n\n# Initialize from primary backup, then:\nCHANGE MASTER TO\n  MASTER_HOST='10.0.0.10',\n  MASTER_USER='repl',\n  MASTER_PASSWORD='REPLACE_STRONG_PASSWORD',\n  MASTER_LOG_FILE='mariadb-bin.000123',\n  MASTER_LOG_POS=456789;\n\nSTART SLAVE;\nSHOW SLAVE STATUS\\G<\/code><\/pre>\n\n\n\n<h2 class=\"wp-block-heading\" class=\"wp-block-heading\" id=\"common-pitfalls-and-best-practices\"><strong>Common Pitfalls and Best Practices<\/strong><\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Do not expose 3306 to the internet; use private networking and firewalls<\/li>\n\n\n\n<li>Size innodb_buffer_pool_size based on RAM and monitor free memory<\/li>\n\n\n\n<li>Avoid overcommitting max_connections; use pooling at the application level<\/li>\n\n\n\n<li>Keep packages updated; schedule maintenance windows for major version upgrades<\/li>\n\n\n\n<li>Test backups and restores quarterly; practice PITR with binlogs<\/li>\n\n\n\n<li>Document changes in version-controlled config files and use staging to validate<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" class=\"wp-block-heading\" id=\"faqs-how-to-configure-mariadb-on-linux-server\"><strong>FAQs: How to Configure MariaDB on Linux Server<\/strong><\/h2>\n\n\n<div id=\"rank-math-faq\" class=\"rank-math-block\">\n<div class=\"rank-math-list \">\n<div id=\"faq-question-1765603952111\" class=\"rank-math-list-item\">\n<h3 class=\"rank-math-question \" class=\"rank-math-question \" id=\"which-mariadb-version-should-i-use-in-2026\"><strong>Which MariaDB version should I use in 2026?<\/strong><\/h3>\n<div class=\"rank-math-answer \">\n\n<p>Choose a current LTS release (e.g., 10.6 or 10.11 LTS) for long-term stability and security patches. Use the official MariaDB repository to stay current if your distro lags behind.<\/p>\n\n<\/div>\n<\/div>\n<div id=\"faq-question-1765603959846\" class=\"rank-math-list-item\">\n<h3 class=\"rank-math-question \" class=\"rank-math-question \" id=\"where-is-my-my-cnf-on-linux\"><strong>Where is my my.cnf on Linux?<\/strong><\/h3>\n<div class=\"rank-math-answer \">\n\n<p>On Ubuntu\/Debian: \/etc\/mysql\/my.cnf plus includes in \/etc\/mysql\/mariadb.conf.d\/ and \/etc\/mysql\/conf.d\/. On RHEL\/AlmaLinux\/Rocky: \/etc\/my.cnf plus \/etc\/my.cnf.d\/. Use include files like 99-tuning.cnf to keep changes organized.<\/p>\n\n<\/div>\n<\/div>\n<div id=\"faq-question-1765603968178\" class=\"rank-math-list-item\">\n<h3 class=\"rank-math-question \" class=\"rank-math-question \" id=\"what-is-the-best-innodb_buffer_pool_size\"><strong>What is the best innodb_buffer_pool_size?<\/strong><\/h3>\n<div class=\"rank-math-answer \">\n\n<p>For a dedicated MariaDB server, start with 60\u201370% of total RAM. For example, on 8 GB RAM, use 5\u20136 GB. Monitor OS swap and MariaDB <a href=\"https:\/\/www.youstable.com\/blog\/fix-high-physical-memory-usage-in-cpanel\/\">memory usage<\/a>, then refine based on workload and cache hit ratios.<\/p>\n\n<\/div>\n<\/div>\n<div id=\"faq-question-1765603974796\" class=\"rank-math-list-item\">\n<h3 class=\"rank-math-question \" class=\"rank-math-question \" id=\"how-do-i-secure-remote-access-to-mariadb\"><strong>How do I secure remote access to MariaDB?<\/strong><\/h3>\n<div class=\"rank-math-answer \">\n\n<p>Bind MariaDB to a private IP, restrict port 3306 using a firewall, and connect over VPN or SSH tunnels. If you must expose it, enforce TLS and IP allowlists, and create least-privilege users.<\/p>\n\n<\/div>\n<\/div>\n<div id=\"faq-question-1765603984812\" class=\"rank-math-list-item\">\n<h3 class=\"rank-math-question \" class=\"rank-math-question \" id=\"should-i-use-mariabackup-or-mysqldump\"><strong>Should I use mariabackup or mysqldump?<\/strong><\/h3>\n<div class=\"rank-math-answer \">\n\n<p>Use mariabackup for hot, consistent physical backups and fast restores; use mysqldump for logical migrations, smaller databases, or schema-level versioning. Many teams use both: nightly mariabackup plus periodic mysqldumps for portability.<\/p>\n\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n<h2 class=\"wp-block-heading\" class=\"wp-block-heading\" id=\"conclusion\"><strong>Conclusion<\/strong><\/h2>\n\n\n\n<p>Now you know how to configure MariaDB on a <a href=\"https:\/\/www.youstable.com\/blog\/install-iptables-on-linux\/\">Linux server<\/a> from zero to production: install, secure, tune my.cnf, manage users, lock down access, back up, and monitor. Start conservatively, measure, then iterate. With a solid baseline and disciplined maintenance, your MariaDB will stay fast, stable, and secure in 2026 and beyond.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>To configure MariaDB on a Linux server in 2026, install the latest LTS build, run mysql_secure_installation, tune my.cnf for performance [&hellip;]<\/p>\n","protected":false},"author":13,"featured_media":15416,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[350],"tags":[],"class_list":["post-12797","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-knowledgebase"],"acf":[],"featured_image_src":"https:\/\/www.youstable.com\/blog\/wp-content\/uploads\/2025\/12\/How-to-Configure-MariaDB-on-Linux-Server.jpg","author_info":{"display_name":"Prahlad Prajapati","author_link":"https:\/\/www.youstable.com\/blog\/author\/prahladblog"},"_links":{"self":[{"href":"https:\/\/www.youstable.com\/blog\/wp-json\/wp\/v2\/posts\/12797","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.youstable.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.youstable.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.youstable.com\/blog\/wp-json\/wp\/v2\/users\/13"}],"replies":[{"embeddable":true,"href":"https:\/\/www.youstable.com\/blog\/wp-json\/wp\/v2\/comments?post=12797"}],"version-history":[{"count":5,"href":"https:\/\/www.youstable.com\/blog\/wp-json\/wp\/v2\/posts\/12797\/revisions"}],"predecessor-version":[{"id":15417,"href":"https:\/\/www.youstable.com\/blog\/wp-json\/wp\/v2\/posts\/12797\/revisions\/15417"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.youstable.com\/blog\/wp-json\/wp\/v2\/media\/15416"}],"wp:attachment":[{"href":"https:\/\/www.youstable.com\/blog\/wp-json\/wp\/v2\/media?parent=12797"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.youstable.com\/blog\/wp-json\/wp\/v2\/categories?post=12797"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.youstable.com\/blog\/wp-json\/wp\/v2\/tags?post=12797"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}