A: each person may have different ideas and different starting points. My starting point is to find the source and what causes lock and latch. Then explain the nature of lock & latch from different perspectives.
Lock:
1. Because the business
A production DB2 database needs to back up all its data and then restore and import it to a test database. Some problems have been encountered and finally solved successfully, the steps are recorded for easy learning and analysis.
System Environment:
Note: This article is from the linux O & M training of Old Boys-MySQL database training course series1) video tutorial directory1. MySQL service operation .................................... ........................................ 31.1 start and
Note: This article is from the linux O & M training of Old Boys-MySQL database training course series1) video tutorial directory1. MySQL service operation .................................... ........................................ 31.1 start and
The DB servers of the companies that recently maintained the service are always faulty. I feel like I have to optimize it. I log on and find that the slow query logs are not opened, therefore, the slow query log is decisively added. After analyzing
Deploy two-node cassandra ClusterEnsure that jdk is installed in the system. do not configure JAVA environment variables.Cassandra version: apache-cassandra-1.1.5jdk version: jdk1.6.0 _ 381. cassandra log Path # vim
MySQL 5.6 brings us the memcached fof innodb api. The main advantage is that we can read and write the MEMCACHED plug-in through the most familiar SQL statements.I will not introduce installation and configuration. If necessary, visit the official
I recently studied MySQL 5.6 and found that I cannot log on to MySQL with a blank password after installation.
The installation process includes the following sentence:
A random password has been set for the MySQL root USER!
You will find that
Mysql high-performance backup solution supports uninterrupted Data Access and LVM snapshot backup)
Www.rsyslog.org
Features of mysql LVM Snapshot Backup:
1. In most cases, this method is almost considered hot standby. It does not need to close the
With the GA of MySQL 5.6, MySQL becomes more and more beautiful in some details. Today, we are going to experience two security verification improvements.
1. mysql_config_edit tool. It can be used to encrypt users' passwords and enhance database
I mainly tried several REPLICATION tools. For other information, see the manual.
Let's talk about my environment:
MASTER: 192.168.1.131
SLAVE: 192.168.1.132, 192.168.1.133
ALL three databases have ALL external users.
The configuration files are as
I. Scenario Description
Database Version: 11.2.0.1 64bit active partition uard
Operating system version: centos 5.8 64bit
In the morning, the database routinely checks and finds that the undo tablespace data file is too large. After querying the
One afternoon, the development report said that when the DML operation was executed, the database reported an error where the transaction log was full. The details are as follows:
$ Db2 delete from tzsdb01DB21034E this command is processed as an SQL
1) Environment Topology
650) this. width = 650; "src =" http://www.bkjia.com/uploads/allimg/131228/2232221632-0.png "title =" QQ20130614135543.png "/>
Today we are talking about the mysql cluster. The resources are as follows:
650) this. width = 650;
When using a stored procedure, we usually only need to grant the corresponding permissions to the account that calls the stored procedure. However, in fact, the stored procedure defines whether the user can directly execute the stored procedure, if
One time when switching to archiving logs
SQL> alter system switch logfile; it does not respond after it is stopped for a long time;
Check whether it is in archive mode:
SQL> archive log list;Database log mode Archive ModeAutomatic archival
External table: The data in the table is stored as an operating system file. Currently, the data in the table is not stored inDatabaseBut on the operating system,OracleProvides a mechanism for Directly Reading external data.
Benefits of External
Oracle Database 12c Release 1 (12.1.0.1.0) for Linux x86-64
OS: Redhat Linux 5 Update 8 64bit
1. Follow the official manual to enable varchar2 32 k support
2. If the rman recover table function is used, the following error occurs:
RMAN-03015:
Common Data Mining MethodsBasic Concepts
Data Mining is fromMassive, incomplete, noisy, and fuzzyThe process of extracting potentially useful information and knowledge hidden in the data that people do not know beforehand. Specifically, as a broad
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.
A Free Trial That Lets You Build Big!
Start building with 50+ products and up to 12 months usage for Elastic Compute Service