MySQL for the Internet of Things
Chapter 7 ■ high availability iOt SOlutiOnS Until_Condition: None Until_Log_File: Until_Log_Pos: 0 Master_SSL_Allowed: No Master ...
Chapter 7 ■ high availability iOt SOlutiOnS How do you fix this? That depends. If you really wanted the testme database replicat ...
Chapter 7 ■ high availability iOt SOlutiOnS Returning to the slave, check to see what databases are listed there, as shown in Li ...
Chapter 7 ■ high availability iOt SOlutiOnS You may be wondering why you would implement fault tolerance at this level. Recall t ...
Chapter 8 Demonstration of High Availability Techniques Understanding what high availability is and some of the key goals for ac ...
ChapTEr 8 ■ DEmonsTraTion of high availabiliTy TEChniquEs ■Note The replication examples in this chapter require mysql server ve ...
ChapTEr 8 ■ DEmonsTraTion of high availabiliTy TEChniquEs mysql> SELECT * FROM test_trans; +----+-------+ | id | value | +--- ...
ChapTEr 8 ■ DEmonsTraTion of high availabiliTy TEChniquEs mysql> COMMIT; Query OK, 0 rows affected (0.01 sec) mysql> SELEC ...
ChapTEr 8 ■ DEmonsTraTion of high availabiliTy TEChniquEs the REPLICATION SLAVE privilege for all databases. It is also good pra ...
ChapTEr 8 ■ DEmonsTraTion of high availabiliTy TEChniquEs Now that you understand and can use GTIDs, you can start using some ad ...
ChapTEr 8 ■ DEmonsTraTion of high availabiliTy TEChniquEs Switchover Sometimes it is necessary to switch the role of master from ...
ChapTEr 8 ■ DEmonsTraTion of high availabiliTy TEChniquEs a slave to the topology after the new master takes over. It should be ...
ChapTEr 8 ■ DEmonsTraTion of high availabiliTy TEChniquEs When the failover is complete, the utility returns to its monitoring m ...
ChapTEr 8 ■ DEmonsTraTion of high availabiliTy TEChniquEs Note in the previous screenshots that the utility is running as a cons ...
ChapTEr 8 ■ DEmonsTraTion of high availabiliTy TEChniquEs For binary log file and position-based replication, you can instruct t ...
ChapTEr 8 ■ DEmonsTraTion of high availabiliTy TEChniquEs Errant transactions on the slave are those GTIDs listed that do not st ...
ChapTEr 8 ■ DEmonsTraTion of high availabiliTy TEChniquEs You could also take a backup of the master, but you would have to susp ...
ChapTEr 8 ■ DEmonsTraTion of high availabiliTy TEChniquEs Now that you understand what read scaling is and how it is used to imp ...
ChapTEr 8 ■ DEmonsTraTion of high availabiliTy TEChniquEs What I DON’t WaNt CertaIN Data repLICateD? sometimes there may be data ...
ChapTEr 8 ■ DEmonsTraTion of high availabiliTy TEChniquEs CREATE DATABASE read_scaling; CREATE TABLE read_scaling.current_slave( ...
«
8
9
10
11
12
13
14
15
16
17
»
Free download pdf