A few days ago also encountered a large log file problem, the actual size of the database is 600M, the actual size of the log file is 33M, but the log files occupy a space of 2.8G!!!
Try a variety of ways, Shirnk DATABASE, TRUNCATE LOG file, there
MySQL log files believe that we all have a lot of understanding, MySQL log files in general:/var/log/mysqld.log, the following teach you to modify the MySQL log file location method for your reference.
Today need to change the location of the MySQL
With regard to mysql-ha, there are many solutions, such as heartbeat, DRBD, MMM, shared storage, but each has its pros and cons. Heartbeat, DRBD configuration is more complex, need to write their own script to achieve MySQL automatic switching, for
A few years ago I wrote an article on Aix tuning, and now that Aix 7 appears, it is necessary to re-examine the basic tuning that needs to be done on AIX systems. Many technical levels (TL) and some recommendations that have been released may change.
Home can be found on the Internet are Redhat systems and so on, the Ubuntu system MySQL cluster does not introduce articles, I now write to write Ubuntu this MySQL cluster method. Novice don't scold me, hehe.
Introducing the network environment:
In Linux, often the case is the use of VBB this forum system, the emergence of slow, MySQL suspended animation state, the sleep process is too much and so is like. Led to dozens of users, the system is done.In fact, this is a MySQL configuration
MySQL uses the user name for the authentication purpose, regardless of the UNIX user name (login name) or the Windows user name. By default, most MySQL clients try to log on using the current UNIX username as the MySQL username, but this is only for
The following article mainly describes the MySQL operation log to see the actual operation steps and the actual operation steps of the specific description, if you encounter similar situation in the actual operation, but you do not know how to solve
Environment:Master server: CentOS 5.2 mysql 5.1.35 source ip:192.168.1.22From server: CentOS 5.2 mysql 5.1.35 source ip:192.168.1.33Configuration:First, the main server1.1, create a replication user, with replication slave permissions.Mysql>grant
The major server hardware vendors (IBM,HP, etc.) provide good data protection policies (hardware or software). A well known RAID disk array (redundant array of independent disks) is a good way to protect data. In the case of SQL Server , a detailed
1. View the version of the database
SELECT @ @version
2. View the machine operating system parameters of the database
EXEC master.. xp_msver
3. View Database Startup Parameters
sp_configure
4. View Database Startup time
Select CONVERT
This article is a question-and-answer form to introduce
SQL
Server2008 upgrade and deployment, hope that through this article can give you some improvement and help.
Q: Now that my company is using this version of SQL 2005, what is the best way to
Data | database | Log |mssql| compression
The database in the cumulative operation process, not only its own volume will slowly grow, its log capacity size as well as the database entity file growth and will occupy a lot of space. the size of the
The Windows2000 system provides the FTP service function, because it is simple and easy to use, and the Windows system itself combines tightly, deeply favored by the majority of users. But is it really safe to use IIS5.0 to set up an FTP server? Its
With the expansion of Linux enterprise applications, there are a large number of network servers using the Linux operating system. Linux server security can be more and more attention, here according to the depth of the attack on the Linux server in
In many network applications, FTP (File Transfer Protocol) has a very important position. A very important resource in the Internet is software resources, and most of the various software resources are placed in the FTP server. Like most Internet
With the expansion of Linux enterprise applications, there are a large number of network servers using the Linux operating system. Linux server security can be more and more attention, here according to the depth of the attack on the Linux server in
Efficient Management Server has been inseparable from effective server management skills, the author summed up work experience, refining 3 tips, and readers to share.
Deny server reboot Typically, after you install a patch on a Windows 2003
CAT/ETC/PASSWD View Linux User Cat/etc/shadow View user password requires root permission
CAT/ETC/PASSWD View Linux Users
Cat/etc/shadow View user password requires root permission
Cat/etc/sysconfig/network-scripts/ifcfg-ethn N represents the
In order to achieve the Linux environment FTP server configuration, the vast majority of Linux distribution suite is the use of Washington University FTP (WU-FTPD), which is a good performance of the server software, because it has a number of
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.
A Free Trial That Lets You Build Big!
Start building with 50+ products and up to 12 months usage for Elastic Compute Service