Building mysql master-slave structure with docker-compose
Using docker-compose to build mysql master-slave structure
A few days ago, I tried to learn the online tutorial. Using docker-compose, I set up a simple master-slave mysql for learning purposes. Next, I will show you the pure dry goods step by step in the following section. Roll up!!!
First, the basic environment and software used by the auth ...
Posted by grantson on Mon, 21 Feb 2022 18:37:01 +0100
Manually deploy MySQL database on Linux system
Introduction: MySQL is a relational database management system, which is often used to build websites such as LAMP and LNMP. This book will introduce you how to install, configure and remotely access MySQL database on ECS instance of Linux system.
For image download, domain name resolution and time synchronization, please click Alibaba open ...
Posted by anujgarg on Mon, 21 Feb 2022 15:18:56 +0100
MySQL MHA high availability cluster deployment and failover
MySQL MHA high availability cluster deployment and failover
MySQL MHA
1, MHA concept
MHA (MasterHigh Availability) is a set of excellent software for failover and master-slave replication in MySQL high availability environment. The emergence of MHA is to solve the problem of MySQL single point. During MySQL failover, MHA can automatically co ...
Posted by Coldman on Mon, 21 Feb 2022 12:40:22 +0100
[tool for quickly creating MySQL stand-alone and cluster test environment] dbdeployer
1. Background
Do you have such trouble? When there is a problem in the online MySQL Cluster, you need to test some in the test environment However, when building a single machine cluster, especially a test cluster or MGR cluster, the environment needs to be built It takes a lot of time and then needs to be recycled. Moreover, the number of mac ...
Posted by siminder on Mon, 21 Feb 2022 09:22:51 +0100
Build mysql5 in CentOS 7.5 Intranet environment seven point three six
1, Configure local yum source
For Intranet environment, first configure the local yum source to solve the dependent installation of MySQL. For details, refer to this article: Click Open
2, View server environment
cat /etc/redhat-release
III. go to the official website to download mysql installation package Click Open
(1) Select versi ...
Posted by Navajo on Mon, 21 Feb 2022 07:34:48 +0100
Mysql optimistic lock practice
This paper first introduces the concept of optimistic lock, then introduces the implementation principle of optimistic lock, and finally demonstrates the implementation of optimistic lock with a spring boot project.
catalogue
What is optimistic lock
Implementation principle of optimistic lock
actual combat
What is optimistic lock
Durin ...
Posted by rlalande on Mon, 21 Feb 2022 03:30:58 +0100
Configure MySQL database for WSO2 ESB 5.0.0 cluster
For cluster configuration, see: WSO2 ESB 5.0.0 cluster configuration
1, Cluster database
Each Carbon based product uses a database to store user management details and registry data. All nodes in the cluster must use a central database for configuration and governance registry mount.
H2 is not recommended for production.It is not recomme ...
Posted by holstead on Mon, 21 Feb 2022 02:29:07 +0100
mysql uses binlog backup
1, Bin log backup function The operation log of mysql binary database is the safe log of transaction. 2, Open bin log Set the profile my inf Add the following content to the configuration file
log-bin=/var/lib/mysql/mysql-bin //Open and set the backup file directory and backup naming format
server-id=1 //The unique id of the database server ...
Posted by Deanznet on Mon, 21 Feb 2022 02:17:30 +0100
Sharding JDBC sub database and sub table case
9 cases
9.1 requirements description
The list of goods on the e-commerce platform is displayed. In addition to the basic information and description information of the goods, each list item also includes the store information to which the goods belong, as follows:
The functions of this case are as follows:
Add itemProduct paging queryC ...
Posted by dibyajyotig on Sun, 20 Feb 2022 15:07:45 +0100
SQL injection -- blind injection based on time
Purpose of this chapter
Popularize the application scenarios and conditions of delayed blind injection technology, be familiar with the usage of functions such as length(), Substr(), ascii(), sleep(), if(), and master the basic process of time-based blind injection.
PS: the interview questions and answers are delayed without deep questions
E ...
Posted by jokkis on Sun, 20 Feb 2022 14:50:47 +0100