Rotten mud: mysql5.5 database cmake source code compilation and installation, mysql5.5cmake
This article was sponsored by Xiuyi linfeng and first launched in the dark world.
I have also written an article on mysql5.0 source code compilation, which is "Dirty: mysql5.0 database source code compilation and installation". However, since MySQL 5.5, the cmake compilation tool has been used.
Therefore, this article mainly explains how to compile and instal
Rotten mud: Learn mysql binlog configuration, mysqlbinlog
This article was sponsored by Xiuyi linfeng and first launched in the dark world.
1Basic knowledge
Logs record every change in the database to a dedicated file, which is called a log file. By default, only error logs are enabled for mysql, because too many logs will affect the processing performance of the system.
Logs in text and binary formats are supported in versions earlier than MySQL,
Rotten mud: Restore the mysql database through binlog, binlogmysql
This article was sponsored by Xiuyi linfeng and first launched in the dark world.
In the previous article, we explained the basic knowledge about mysql binlog. In this article, we will explain how to restore the database through mysql binlog.
Before using binlog to restore the database, we need to make some preparations. The procedure is as follows:
1. Create a new database, ailanni
1.CentOS for Yum installation vsftpd2.vi/etc/vsftpd/vsftpd.conf for configuration3. Create an FTP user# Useradd–d/var/www-g ftp–s/sbin/nologin myftp-s/sbin/-D is the specified user directory/var/4. Several items that need to be configured:Annoymous_enable =no//whether to allow anonymous logonsconnect_from_port_20=no//Active mode requires a connection item (turn it off)pasv_enable=yes//supports passive mode flowPasv_min_port=1024x768 //Passive mode uses port rangePasv_max_port=65536
reload command to reload the configuration file. As follows:
Since this machine has already set up a DHCP server, we can modify the DNS address obtained by the client through The Dhcp Service as follows:
10.5.5.1 is the IP address of the local machine.
Now let's take a look at the IP address obtained by the client, as shown below:
Run the NSLookup command to test the function:
Run the host command to test the IP addresses of www.ilanni.com and ftp.ilanni.com, as shown below:
Host
interface. The advantage of the above command is that it does not need to care about the IP address of the interface, and the conversion will automatically proceed.
Or run the following command:
Iptables -- table Nat -- append postrouting -- Out-interface eth0-J Masquerade
Iptables -- append forward -- In-interface eth1-J accept
Now let's take a look at whether the client can connect to the Internet normally. As follows:
The above operations on the firewall are temporary. The next time y
This article was sponsored by Xiuyi linfeng and first launched in the dark world.
The company's voice call system uses small calls because of work needs. You need to migrate the server to the system. That is, the current Windows Server 2003 Enterprise Edition is upgraded to Windows Server 2008 64bit.
Several steps are required for server migration:
1. Database Backup
2. Call for backup
3. Install Windows Server 2008 r2
4. database recovery
5. Install Tom
6. Xiao Linghu coverage
7. Start
This article is first published in the dark world.
The company's voice call system uses small calls because of work needs. You need to migrate the server to the system. That is, the current Windows Server 2003 Enterprise Edition is upgraded to Windows Server 2008 64bit.
Several steps are required for server migration:
1. Database Backup
2. Call for backup
3. Install Windows Server 2008 r2
4. database recovery
5. Install Tom
6. Xiao Linghu coverage
7. Start a call
Because the current database use
, we will start to configure how to use image files in centos. First, we will download or upload the image files to the centos system. As follows:
650) This. width = 650; "Title =" clip_image009 "style =" border-right-width: 0px; Background-image: none; border-bottom-width: 0px; padding-top: 0px; padding-left: 0px; margin: 0px; padding-Right: 0px; border-top-width: 0px; "Border =" 0 "alt =" clip_image009 "src =" http://img1.51cto.com/attachment/201409/17/526870_1410934045l3ZM.png "width =" 720 "
enter the password of the root user of the 192.168.1.102 server.
Log on to the 192.168.1.102 server and check whether the replication was successful. As follows:
You can see that the ilanni.tar.gz file has been successfully copied to the/KS directory of the 192.168.1.102 server.
The above copy is the file. Now let's test the copy directory. As follows:
SCP-R./ilanni [email protected]:/KS
Log on to the 192.168.1.102 server and check the copied directory. As follows:
Through the above
-- Bridge = br0-M 00: 16: 3E: 12: D7: 5D -- VNC -- vnclisten = 0.0.0.0 -- vncport = 5999-- Description "192.168.1.201 _ win7_20140926"-X "-- device = eth0 IP = 192.168.1.220 netmask = 255.255.255.0 gateway = 192.168.1.1"
Note that the preceding command is also quite interesting. For example, I only have one server on the network, and this server currently only has one web application, the system's image files are stored on this server. I now require that no other software or other configuratio
decompress the compressed package to the same directory. Next we will test and unzip the compressed package to another directory. As follows:
Tar-XF ilanni.tar.gz-C/testtar/
This command is used to extract ilanni.tar.gz from the current directory to the/testtar/directory.
We can see that ilanni.tar.gz has been successfully decompressed to the/testtar/directory.
We decompress the entire directory. If the compressed package is a folder and there are many files in it, we just want to extract
-width: 0px; padding-top: 0px; padding-left: 0px; padding-Right: 0px; border-top-width: 0px; "Border =" 0 "alt =" clip_image022 "src =" http://img1.51cto.com/attachment/201409/25/526870_1411609494yt08.png "width =" 662 "Height =" 423 "/>
After modifying the/etc/grub. conf file, restart and start again.
Now the system can be started properly, and the renaming of the LVM volume group has ended.
This article from the "muddy world" blog, please be sure to keep this source http://ilanni.blog.51cto.c
Rotten mud: yum usage and configuration, and yum Configuration
This article was sponsored by Xiuyi linfeng and first launched in the dark world.
Recently, due to server requirements, you need to build an intranet yum source in the company's intranet.
To build an intranet yum source, perform the following steps:
1. What is yum?
2. What is a repo file?
3. Detailed repo File Content
4. yum Server Configuration
5. yum client Configuration
6. Save
Rotten mud: nagios Learning (4): pnp4nagios graphical drawing of nagios data, pnp4nagiosnagios
This document consistsXiuyi Lin FengProviding friendship sponsorship, first launchedThe world
After nagios is installed, we also add some monitoring objects, but you will find that nagios is just a simple method to list those monitoring objects, instead of integrating the data of these monitoring objects. As follows:
In fact, nagios has provided us with
Rotten mud: Learning Nagios (3): NRPE installation and configuration, nagiosnrip
This document consistsXiuyi Lin FengProviding friendship sponsorship, first launchedThe world
In the first two articles, we introduced the installation and configuration of nagios. The articles are "mud: Learning Nagios (1): Nagios installation" and "mud: Learning Nagios (2 ): nagios configuration, this article introduces the knowledge about NRPE.
The introduction of NR
Rotten mud: centos6 yum kernel upgrade, centos6yum
This document consistsIlanniwebProviding friendship sponsorship, first launchedThe world
For more articles, follow my ilanniweb
I haven't written any articles for a long time recently. Today, because I need to install docker to learn about virtual containers, I need to upgrade the OS kernel. Currently, I am using centos 2.6 and the kernel version, as shown below:
Cat/etc/issue
Uname-r
Because d
Rotten mud: Use snmpwalk to collect device OID information, snmpwalkoid
This article was sponsored by Xiuyi linfeng and first launched in the dark world.
I plan to start learning about monitoring, but now many monitoring systems are based on SNMP. Many performance indicators of SNMP monitoring are obtained by collecting device OID information through snmpwalk. So today we will introduce how to collect device OID information through snmpwalk.
To use
Rotten mud: keyword introduction of high load balancing learning haproxy, load balancing haproxy
This document consistsIlanniwebProviding friendship sponsorship, first launched in the dark world
In the previous article, we briefly explained the installation and Setup of haproxy. In this article, we will introduce the keywords used in the haproxy configuration file one by one.
Follow me ilanniweb
1Keyword balance
Balance is used to define the load
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.