Showing entries 42093 to 42102 of 44787
« 10 Newer Entries | 10 Older Entries »
My UC Talk tomorrow (what you should know)

MySQL Users Conference 2006 - MySQL Cluster: New Features and Enhancements

If you are coming to my talk, make sure you know a bit about cluster beforehand. Being at Johan’s talk today was a good idea.

Or reading the manual chapter.

Otherwise you may end up being quite lost for a lot of the talk. Mine isn’t an intro to cluster one.

Off to the MySQL tutorials

Up at 5:50am, dressed by 6:30am, and leaving the house by 7:10am to get on the VTA light rail by 7:30am. All because the tutorials start at 8:30am, and I want to catch the train instead of using up fuel...



Tags for this post: mysql() mysqluc()

Comment

Off to the MySQL tutorials

Up at 5:50am, dressed by 6:30am, and leaving the house by 7:10am to get on the VTA light rail by 7:30am. All because the tutorials start at 8:30am, and I want to catch the train instead of using up fuel...



Tags for this post: mysql() conference() mysqluc2006()

Comment

MySQL Replication for Scaling and High Availability

Afternoon tutorial at MySQL Users Conference (2006) is Replication for Scaling and High Availaility by Jeremy Cole (not this jeremycole) from Yahoo!.

Jeremy starts with a general overview of replication and provides some detail on general things replication is and is not. There is no limit to the number of slaves, but there is a limit on the bandwidth that a server can serve so with too many slaves the master could be overloaded. If you need massive numbers of replicated machines it's better to not have them all pointed at one master. It's better to have a relay slave who's job it is to stand in the middle and serve data out to groups of machines.

Master to master replication is possible, but there are lots of problems. Primary keys can be carefully disignated but the bottom line is that when it fails it's hard to know what …

[Read more]
MySQL UC Wiki

If you’re at the MySQL Users Conference 2006, we’d love if you took notes and shared it with everyone… There are some cool tools like Gobby or SubEthaEdit that some folk might enjoy, since there’s a WiFi network available.

We’ve got a UC2006 Category on the wiki that you might find handy. Go ahead, create a wiki account, and start writing some useful content :-)


The name of the wine seems appropriate to MySQL and writing

If you wanna chat (for collaborative writing purposes and not for skipping out on your session!) there’s #mysql-uc …

[Read more]
MySQL Performance Tuning

I am right now sitting in Introduction to MySQL Performance Tuning by Tobias.

Re-executing a command

We can use the -r option to re-execute a command.

For instance:

mysqladmin -ri 10 extended

will execute the command every 10 seconds

Open tables is the size of table cache.
Threads cached is caching of threads. When someone disconnects, we don't just throw it away.

If we have multiple queries at the same time, the number of tables opened will go up.

Brad of Live Journal has written a cool script called diskchecker.pl

Analyzing queries: Use the slow query log to obtain information about well, slow queries. One idea is to log all queries to CSV tables and then use them.

When enabling or disabling the slow …

[Read more]
Tutorial: Secure Your PHP and MySQL Web Applications

Session by Laura Thomson, OmniTI. Laura is author of a number of popular PHP and MySQL books.

Session will be on security at the developer level and is written from a programmer’s perspective.

Many developers plug along without any knowledge that they have security problems, security awareness is a relatively new thing. This session is not about guru-level knowledge, it is about developer-level practices.

MySQL Security Basics

  • Do not run your mysqld as the unix root user. Run it as a purpose-created user.Do not use the purpose-created user for anything else. MySQL root user is not related to the Unix root user.
  • Set permissions on DB data files directory so that only mysqld user can access them.
  • Disable symlinks to tables with –skip-symbolic-links unless you need them.
  • Disable access to port 3306 except to trusted hosts.

[Read more]
Optimizing MySQL Applications Using the Pluggable Storage Engine Architecture (Arjen)

I am sitting in Arjen's session titled "Optimizing MySQL Applications Using the Pluggable Storage Engine Architecture." Arjen has been covering the basics of how databases work and touching up on issues related to different storage engines.

[Notes that I need to transfer (blogger wasn't working)]

Key Buffers: Are only for MyISAM tables and not for InnoDB tables. Look at the current values
Key reads / Key read requests ratio should be 0.03. If the ratio is higher than this (.10) then increase the buffer. If its better than this (0.1) then we are wasting memory. If at 0.1, decrease it a bit.

The default settings are quite low on Linux. We can have multiple MyISAM key caches.

We can load MySQL key buffers into memory.

Different values of myisam_recover which can either be QUICK or BACKUP (If some corrupted tables are found, they are first backed up).

[Read more]
MySQL Cluster Configuration, Tuning, and Maintenance

First tutorial of Monday morning at the MySQL Users Conference is Johan Anderson on MySQL Cluster Configuration, Tuning and Maintenance. Found a spot next to Giuseppe (the data charmer) and a power strip (which are in ample supply here).

Johan came with the cluster aquisition from Ericsson to MySQL in 2003 and works mostly as a consultant with other folks using MySQL cluster for telecom, search engines and e-commerce. Likes to keep it simple, or be sure to avoid areas where the cluster isn't the best (ie MySQL cluster isn't great at joins).

Johan starts with a general overview, using the typical diagram of the cluster nodes and walks through the pieces of the cluster. MySQL is currently working on a new feature where you can add a …

[Read more]
Codename Falcon

At our user's conference this week, Jim Starkey will be discussing his latest database engine, codenamed Falcon.  Falcon brings to MySQL Jim's 30 years of data management experience to create an engine that is optimized for modern scale-out applications with lots of memory. 

Falcon is ACID compliant with a multi-generational architecture that guarantees server-enforced referential integrity.  It's based on MVCC (which Jim essentially invented) so it keeps lock contention near zero, ensuring very high performance.  Falcon uses advanced B-Tree indexing and includes crash recovery.  Jim's approach has also been to make sure the engine is easy to use and automatically manages storage allocation so there's no need to manually reorganize things.

We'll be presenting Falcon in the context of the overall …

[Read more]
Showing entries 42093 to 42102 of 44787
« 10 Newer Entries | 10 Older Entries »