If you follow the general advices to create secure password the following ones seem to be secure, right? s11P$||!sh&2 pr0&!!ke0 3kj39|!381 The answer to the question is, “it depends on how you use them” Notice that these passwords all contain multiple exclamation points and ampersands which are normally special characters for your shell. The people [...]
I got a serendipitous call (thanks!) yesterday asking what would be needed to tune a database for better performance. It is a question that I hear often, but I never thought about answering it in public. Here’s a consolidated version of what I explained during our conversation.
In my previous post I introduced materialized view concepts. This post begins with an introduction to change data capture technology and describes some of the ways in which it can be leveraged for your benefit. This is followed by a description of FlexCDC, the change data capture tool included with Flexviews. It continues with an [...]
When examining MySQL configuration, we quite often want to know how various buffer sizes are used. This matters because some buffers (sort_buffer_size for example) are allocated to their full size immediately as soon as they are needed, but others are effectively a “max size” and the corresponding buffers are allocated only as big as needed [...]
When running InnoDB you are able to dig into the engine internals, look at various gauges and counters, see past deadlocks and the list of all open transactions. This is in your reach with one simple command —
SHOW ENGINE InnoDB STATUS
. On most occasions it works beautifully. The problems appear when you have a large spike in [...]