1. Description of the environment.Host: 103.241.49.137 (A)Host: 103.240.182.191 (B)MYSQL version is 5.1.112, authorized users. (I am lazy, directly with the root skip this step)A:Mysql> Grant Replication Slave,file on * * to ' backup_251 ' @ ' 103.240.182.191 ' identifiedBy ' 123456 ';Query OK, 0 rows Affected (0.00 sec)mysql> flush Privileges;Query OK, 0 rows Affected (0.00 sec)B:Mysql> Grant Replication S
Label:MySQL Master sync configuration Step reprint: http://www.jb51.net/article/33624.htm Create a sync user, modify the/ETC/MY.CNF profile, add the following to it, restart the server odd even MySQL service respectivelyMySQL Master Master sync configuration
Server name
Ip
System
Mysql
Odd.example.com
192.168.1.116
rhel-5.8
5.5.16
Even.example.com
192.168.1.115
rhel-5.8
5.5.16
Suppose the librar
Label:Original: SQL Server Automation Operations series-Monitoring Performance metrics script (Power Shell)Requirements DescriptionGenerally in the production environment, sometimes need to automatically detect the status of the indicator value, if there is an exception, need early warning, such as e-mail notification, this article is introduced if the power shell to achieve status value monitoringRange of monitoring valuesBased on experience, as a DBA it is generally necessary to monitor the fo
statement.Mysql> Show variables like "event_%"; --Check if the scheduler is enabled+-----------------+-------+| variable_name | Value |+-----------------+-------+| Event_scheduler | On |+-----------------+-------+1 row in Set (0.00 sec)Mysql>? Create event; --View the syntax for creating eventsName: ' CREATE EVENT 'Description:Syntax:CREATE[definer = {User | Current_User}]EVENT[IF not EXISTS]Event_NameOn SCHEDULE SCHEDULE[on completion [NOT] PRESERVE
-splitting.lua #指定lua脚本, here, The rw-splitting script is used for read-write separationWhen there are multiple read-only servers, you can write more than one of the following parameters:When there are multiple read-only servers, you can write more than one of the following parameters:--proxy-read-only-backend-addresses=192.168.1.64:3306 # Defining back-end read-only servers--proxy-read-only-backend-addresses=192.168.1.65:3306 # Defining back-end read-only servers#--proxy-address=192.168.1.62:3
together, this is the cluster, when the user created a normal index (index, unique, etc.), this is the second index.When the primary key is used to search for data, the data is fetched directly when using secondary key to search for data, because secondary key index storage mode with MyISAM engineLike the index store, Key-value,value is a pointer to primary key, so this procedure finds the primary key pointer and finds the data through the clustered index.Count Performance Analysis:A lot of peo
network information to check box, and then type the name of the computer that you want to receive the alert information for.
Click to select the Start Performance data log check box to start the log file.
If you want to start the program when the alert condition is reached, click "Execute this program." You can either type the path of the program directly or click Browse to manually select the program you want to use.
Click the Schedule tab, and then configure the appropriate settings to sta
Tags: names user name create user str backup restore Linux system create users emptyMySQL User managementCreate an authorized user and password? Grant all on the User1 ' identified by ' [email protected] ';The user who creates the connection management database in MySQL creates a user who can assign the appropriate permissions for the user to access the specified libraryCreate a user and authorize a user to access a library, have permission to access all the libraries locally, and view the perm
Tags: direct catsign apps signed Space exceeding pressure medium 1. Tinyint: Only 128 to 127 of the size of the number, do not care about the following definition, such as tinyint (9). Requires 1 bytes of storage space.
When unsigned is added, the number can be increased from 0 to 255 size.
[emailprotected]: Test 22:36:25> CREATE TABLE Ti (ID tinyint (9), no tinyint (1));
Query OK, 0 rows affected (0.03 sec) [emailprotected]: Test 22:36:44> insert
performance indicators after reaching the performance boundary. If the performance baseline is close to the performance boundary, consider changing the server or adding the server. This is a use of performance baselines.
To get a server, I will first make a performance baseline, website space, and performance baseline, that is, the performance indicators of the database when the server is running normally. I will capture 24-hour performance indicators as a performance baseline (see my related
in the production database. During the hot standby period, it is unrealistic for others to operate, because you cannot terminate user access to Web programs. To solve this problem, you can use the specified backup policy, such as the time range for backup and the data to be backed up. In short, to ensure data integrity and consistency, remember that backup is more important than everything else !!!
Hot backup can be used to back up multiple databases. you can back up a single table or several t
I/O scores are low. Through Raid0, the performance has improved by 50%!
The dual-CPU does not bring about a higher score, but the lower score, it should be that unix cannot bring out smp performance.
====================
Vimdisk-vt *** Test
Single DiskSeek times:Full stroke: 250 iter in 2.284611 sec = 9.138 msecHalf stroke: 250 iter in 1.708564 sec = 6.834 msecQuarter stroke: 500 iter in 2.904974
() function to get the length of a string:Select Length (' ABCDEFG '), Length (' 0123456789 ');/*+-------------------+----------------------+| Length (' ABCDEFG ') | Length (' 0123456789 ') |+-------------------+----------------------+| 7 | 10 |+-------------------+----------------------+1 row in Set (0.00 sec)* * Use the Rpad () or Lpad () function to fill a string from the right or left side:In general, strings are often filled with blanks (so-calle
(32) | NO | | NULL | |+----------+-------------+------+-----+---------+----------------+3 Rows in Set (0.00 sec)mysql> desc user_his;+----------+-------------+------+-----+---------+----------------+| Field | Type | Null | Key | Default | Extra |+----------+-------------+------+-----+---------+----------------+| his_id | Int (10) | NO | PRI | NULL | auto_increment || ID | Int (10) | NO | | NULL | || Username | varchar (30) | NO | | NULL | || password
The length () function can get the lengths of a string:
Select Length (' ABCDEFG '), Length (' 0123456789 ');/*+-------------------+----------------------+| Length (' ABCDEFG ') | Length (' 0123456789 ') |+-------------------+----------------------+| 7 | 10 |+-------------------+----------------------+1 row in Set (0.00 sec)*/
You can use the Rpad () or Lpad () function to fill strings from the right or left side, respectively:
In general, strings
requirements and improve scalability in the statistics class.
Process
Working rules
aspnet_wp or w3wp, dependent on the version of IIS
Asp. NET the amount of memory used when activating. Although application developers can best control the amount of memory required for the application, managers can significantly affect the amount of memory usage by adjusting the session time-out period.
Process
Private bytes
aspnet_wp or w3wp, dependent on the version o
Tags: mysql user management MySQL common statements13.4 MySQL User management1 Creating User1 UsersMysql> Grant All on * * to ' user1 ' @ ' 127.0.0.1 ' identified by ' 123456a ';Query OK, 0 rows affected (0.01 sec)Explain:Grant all permissions** XX library xx table, if it is MySQL library table can be represented as mysql.*The @ ' 127.0.0.1 ' authorization specifies the source IP connection. All IP wildcard representations are @ '% ',% means all IP2
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.