CACTI: Use a template to monitor mysql on a local server or another server
Mysql templates, online are using this address http://mysql-cacti-templates.googlecode.com has not been accessed
File currently downloaded: percona-cacti-templates-1.1.4-1.noarch.rpm
Local server monitoring local mysql:
Go to the cacti directory
cd /var/www/htmlMove the compressed file to the current directory (put it there ):
mv percona-cacti-templates-1.1.4-1.noarch.rpm .Decompress the file:
rpm2cpio percona-cacti-templ
CACTI: Use templates to monitor mysql and cactimysql on local or other servers
Mysql templates, online are using this address http://mysql-cacti-templates.googlecode.com has not been accessed
Google found this URL:
Introduction: http://www.percona.com/doc/percona-monitoring-plugins/1.0/cacti/mysql-templates.html
Download Page: http://www.percona.com/downloads/percona-monitoring-plugins/
To facilitate the download, upload to csdn for download: http://download.csdn.net/detail/kk185800961/865127
focuses on project management, engineering management, and R D management, rich experience in consulting and training services in engineering, manufacturing, IT and communication industries. The Project Management Alliance has hosted and co-organized national project management academic and application Summit forums and conferences for many times, starting from 2003, project management training courses, enterprise internal training courses, PMP and
launched a Global Survey and Research Plan (RDS) for project set managers in 2011. In fact, 72 management tasks provide specific guidance for the project set manager's management work.
The "project management standards" (Third edition, Chinese version, spm3) signature sales book is open to business managers, project management enthusiasts, and project management researchers who are interested in project set management. The quota is 100. Participate in the signing and sales of books, and get
The cacti template of percona is still very handsome, but for multiple instances such as redis and memercache, only the default 6379 or one other port can be monitored (in short, all instances cannot be monitored ), this is a pity. To achieve monitoring of all objects that can be monitored, you must customize the template. After half a day of exploration, we finally achieved it. Let's take a look at the handsome one:
Steps:
1. Download The percona template and decompress it. Because the previo
development and management, as well as an active catalyst and practitioner of Chinese software engineering thinking.Wang Yong, the national Senior programmer, System architect, System architect, information System Project Manager, PMP, System Integration Senior project manager, Electronic industry publishing house technical consultant, the national many university professors, the national Soft test Guidance designated tutorial series of Vice-editor,
save the results.
2. pt-pmp
Function introduction:
Execute the aggregated GDB stack trace for the query program. The advanced stack trace is used to summarize the tracing information.
Usage:
Pt-pmp [OPTIONS] [FILES]
Example:
Pt-pmp-p 21933
Pt-pmp-B/usr/local/mysql/bin/mysqld_safe
3. pt-visual-explain
Function introduc
*PKF); //the point is not inside this keyframe BOOLIsinkeyframe (keyframe*PKF); //this point is not good, we want to delete that point in all keyframes. This point in the map also needs to be deleted. voidSetbadflag (); BOOLIsbad (); //the map point inside the replacement keyframe is PMP; voidReplace (mappoint*PMP); MapPoint*getreplaced (); voidIncreasevisible (intn=1); voidIncreasefound (intn=1);
"));
Set1.add (New certificate ("MBA"));
Set1.add (New certificate ("PMP"));
/* ADD employee records in the database */Integer empID1 = Me.addemployee ("Manoj", "Kumar", 4000, Set1); /* Another set of certificates for the second employee * * ARRAYlist Set2 = new ArrayList ();
Set2.add (New certificate ("BCA"));
Set2.add (New certificate ("BA"));
/* ADD Another employee record in the database */Integer empID2 = Me.addemployee (
Install licence manager, select "I Have ed the license by fax", click "CREATE" -- "edit", and then
Open the licence. dat in the cracked file, replace "hostname" with your own computer name, save, and
Copy the content to the input area of "licence Editor" and click "OK! (3) crack
Arcgis.exe license. dat (this file has been edited just now) is copied to the
On July 15, December 15, Canonical announced that it would remove all Java Development kits (JDK) from the Ubuntu release. For details, see "CanonicalWillRemoveJavaFromUbuntu. On June 19, August 30 this year, Oracle announced the abolition of the license to bind the Java Development Kit (JDK) to the Linux operating system release version (Oracle probably wants to make a fortune by using JDK ). Ubuntu had to say goodbye to Java. See "Oracleretires
On July 15, December 15, Canonical announced that
make it open-source, or close the source for commercial release. However, if B contains a part of A or a (not included at all), then in the copyright statement of product B, it must be mentioned that you have used a and come with the Open Source protocol of. In addition, B cannot be named as the original open-source author to promote commercial promotion.BSD Code encourages code sharing, but it must respect the copyright of the Code author. BSD is a friendly protocol for business integration be
. The BSD code encourages code sharing, but requires respect for the copyright of the author of the Code. BSD is a friendly agreement for business integration because it allows the user to modify and republish the code, and also allows the use or development of commercial software to be published and marketed on BSD code. And a lot of companies in the selection of open source products are preferred BSD protocol, because they can completely control these third-party code, when necessary can be
modify and republish the code, and also allows the use or development of commercial software releases and sales on BSD code, and therefore is commercially integratedvery friendly agreement.。 And a lot of companies in the selection of open source products are preferred BSD protocol, because they can completely control these third-party code, when necessary can be modified or two times development.Apache Licence 2.0 (Apache License, version 2.0, Apache
OR in CONNECTION with the software or the use or other dealings in
* The software.
*
* @author Paul Annesley
* @link http://paul.annesley.cc/
* @copyright Paul Annesley, 2008
* @comment by Myz (Http://blog.csdn.net/mayongzhan)
*/
/**
* A simple consistent hashing implementation with pluggable hash algorithms.
*
* @author Paul Annesley
* @package Flexihash
* @licence http://www.opensource.org/licenses/mit-license.php
*/
Class Flexihash
{
/**
* The num
claim, DAMAGES OR OTHER
* LIABILITY, whether in an action of contract, tort or otherwise, arising from,
* OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
* The software.
*
* @ Author Paul Annesley
* @ Link http://paul.annesley.cc/
* @ Copyright, Paul Annesley, 2008
* @ Comment by MyZ (http://blog.csdn.net/mayongzhan)
*/
/**
* A simple consistent hashing implementation with pluggable hash algorithms.
*
* @ Author Paul Annesley
* @ Package Flexihash
* @
notice.The author/organization name of the open source code and the name of the original product may not be used for marketing.BSD code encourages code sharing, but requires respect for the copyright of the author of the Code. BSD is a friendly agreement for business integration because it allows the user to modify and republish the code, and also allows the use or development of commercial software to be published and marketed on BSD code. And a lot of companies in the selection of open source
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.