I'm pleased to announce the release of Spider storage engine
version 2.6(beta).
Spider is a Storage Engine for database sharding.
http://spiderformysql.com/
The main changes in this version are following.
- Add server parameter "spider_remote_access_charset",
"spider_remote_autocommit", "spider_remote_sql_log_off" and
"spider_remote_trx_isolation".
These parameters are setted by Spider at connecting
remote server. But it does not need to be setted if you know it
previously and no need to change it. In this case, you can set
these parameters for improvement connecting performance.
Please see "99_change_logs.txt" in the download documents for
checking other changes.
Thanks to Giuseppe for bug report.
Enjoy!
Yesterday I attended CPOSC 2009. The conference was great. It was very well run, and I liked the sessions. I would definitely attend this conference again, and will recommend that Percona sponsor it next year. I attended the following talks: Stop Worrying and Start Monitoring with Nagios (Andrew Libby) DRBD, Network Raid, High Availability and General Awesomeness (Brian Gorka) MySQL Performance Tuning for non-DBAs (Tom Clark) Wonderful Desktop Tricks, and Aesthetics (Seth Jerome) Jump Start Django: The Web Framework for Perfectionists with Deadlines (Rob Yates) Watching and Manipulating Your Network Traffic (Josiah Ritchie) And then of course I gave my own talk on Maatkit (slides).
You want to use or to know more about Sun technologies? Join these Webinars to improve your knowledge and skills. You will be able to ask questions to Sun's experts.
-
Mercredi 10 Février : Securité pour les applications Web. Pour les startups du Web, la protection et la sécurisation de leurs applications, de leurs données, et de celles de leurs clients est un véritable facteur clé de succès. Ce Webinar couvre les différents challenges liés à la sécurité ainsi que les solutions associées telles que l'encryption, l'authentification, les certificats, la sécurisation du stockage et le stockage à tolérance de panne, les environnements étanches. Les architectes de Sun Startup Essentials présenteront des implémentations économiques basées sur des composents standards et ouverts tel qu'Apache, MySQL et ZFS. Ce webinar est …
Harrison and Konstantin (Kostja) did not like my plan for making FLUSH TABLES WITH READ LOCK faster and suggested an alternative that is non-blocking and faster. The new syntax is as beautiful as the one it replaces -- START TRANSACTION WITH CONSISTENT INNODB SNAPSHOT.
I am still working on the return values for this command. I planned for this command to work on a master. Domas suggested I make this work on the slave too, so this returns 0, 1 or 2 rows:
- binlog filename and offset if the binlog is open
- master's binlog filename and offset if the server is a replication slave
Domas and I discussed another mutex contention problem that limits performance on servers that can do 10,000+ IOPs and I have another idea for tracking …
[Read more]You want to use or to know more about Sun technologies? Join these Webinars to improve your knowledge and skills. You will be able to ask questions to Sun's experts.
-
Mercredi 10 Février : Securité pour les applications Web. Pour les startups du Web, la protection et la sécurisation de leurs applications, de leurs données, et de celles de leurs clients est un véritable facteur clé de succès. Ce Webinar couvre les différents challenges liés à la sécurité ainsi que les solutions associées telles que l'encryption, l'authentification, les certificats, la sécurisation du stockage et le stockage à tolérance de panne, les environnements étanches. Les architectes de Sun Startup Essentials présenteront des implémentations économiques basées sur des composents standards et ouverts tel qu'Apache, MySQL et ZFS. Ce webinar est …
You want to use or to know more about Sun technologies? Join these Webinars to improve your knowledge and skills. You will be able to ask questions to Sun's experts.
-
Mercredi 10 Février : Securité pour les applications Web. Pour les startups du Web, la protection et la sécurisation de leurs applications, de leurs données, et de celles de leurs clients est un véritable facteur clé de succès. Ce Webinar couvre les différents challenges liés à la sécurité ainsi que les solutions associées telles que l'encryption, l'authentification, les certificats, la sécurisation du stockage et le stockage à tolérance de panne, les environnements étanches. Les architectes de Sun Startup Essentials présenteront des implémentations économiques basées sur des composents standards et ouverts tel qu'Apache, MySQL et ZFS. Ce webinar est …
Following up on this entry, here are some more best practices to secure MySQL in a production environment.
But before moving forward, let me pay credit to Lenz Grimmer who
helped me to put this information together.
After setting a password for the MySQL root account and removing the test database and anonymous account you can also limit the remote access to MySQL to a specific host. You do this by setting the bind-address attribute in the /etc/mysql/my.cnf file to the host ip-address:
bind-address=ip-address
If you set bind-address to 127.0.0.1, which is the loopback address, then MySQL only accepts connections from the host where it runs.
If you uncomment skip-networking in my.cnf MySQL only …
[Read more]
In the information age, everyone collaborates on this
worldwide knowledge exchange channel that's called Internet. Computing devices are proliferating and
all interactions are finding a common home: the net. It binds us
in a way that was inconceivable only a few years ago. I can stay
up to date on what my US or Japan colleagues are doing. I can
read articles and thoughts written in unknown cities all around
the globe.
We are all on the web; MySQL is so popular because of the web I'll say.
Whether you have a small niche blog or you are a famous writer in
your field of expertise, you should care about analyzing your
readers. This becomes more important if you are a company willing
to publicize products on the web.
I just found …
Following up on this entry, here are some more best practices to secure MySQL in a production environment.
But before moving forward, let me pay credit to Lenz Grimmer who
helped me to put this information together.
After setting a password for the MySQL root account and removing the test database and anonymous account you can also limit the remote access to MySQL to a specific host. You do this by setting the bind-address attribute in the /etc/mysql/my.cnf file to the host ip-address:
bind-address=ip-address
If you set bind-address to 127.0.0.1, which is the loopback address, then MySQL only accepts connections from the host where it runs.
If you uncomment skip-networking in my.cnf MySQL …
[Read more]Following up on this entry, here are some more best practices to secure MySQL in a production environment.
But before moving forward, let me pay credit to Lenz Grimmer who
helped me to put this information together.
After setting a password for the MySQL root account and removing the test database and anonymous account you can also limit the remote access to MySQL to a specific host. You do this by setting the bind-address attribute in the /etc/mysql/my.cnf file to the host ip-address:
bind-address=ip-address
If you set bind-address to 127.0.0.1, which is the loopback address, then MySQL only accepts connections from the host where it runs.
If you uncomment skip-networking in my.cnf MySQL …
[Read more]