I gave this talk covering the different types of memory, how to monitor memory, and how to optimally use it with Oracle at the UKOUG, I have since received requests to post the slides online. Instead of just posting the PowerPoint I took some time to give the presentation again (internally here at Pythian) and this time we recorded the session and are posting it in a variety of formats. This is a bit of a departure from the typical Pythian Goodies, in that it is scripted, and there is a lot of content here in the whitepaper.
I’m on the plane back to Canada and I’m extremely satisfied with the UKOUG conference this year. Find out about the last day highlights and post conference exploits here.
I’ve been checking out a new client environment. My mission is to figure out some of the characteristics of the queries being run, and if they’re “good” or “bad”. In my arsenal of “tools I really want to check out” has been Maatkit’s Query Profiler, it profiles a batch of queries, without granularity (at least not the way I ran it) to see what query is doing what. So I ran this against a production machine, read my results here
We have several MySQL DBA openings, one in each of our offices in Ottawa, Boston, or Hyderabad,
Welcome to the 75th edition (a.k.a. the Diamond Edition) of Log Buffer, the weekly review of database blogs.
If you are wondering what the differences are between MySQL: SOUNDS LIKE and Full-Text search, look no further.
Oracle Grid Control documentation warns against leaving the emkey in the Grid Control repository, if it is not removed after it has been copied it is easy to decrypt data, like passwords. Oracle Management Service 10.2 uses several ways to protect these sensitive data, including Virtual Private Database and Password Encryption. To overcome the first one, you have to connect to the database as the SYS user, for the second one, you have to know the encrypted password form, the key, and the associated algorithm. Obviously, the key used to cipher the password is the emkey. So the next question is, “Where are stored the ciphered passwords?”.
The Pythian family got a new song last Monday — “Sheeri” means “my song” in Hebrew. I’ve been working at Pythian for over a week now, and I really like the work model, environment and culture.The Pythian model of training is “jump right in, and ask questions when you don’t understand something.” The teams are very good technically, and people routinely help each other out. My teammates have been known to work on something I’ve been meaning to get to, and nobody utters a word of complaint. It’s a great workplace. There is a link to a post on my own blog explaining how I got the job.
With the popularity of multi-core machines (and innodb_thread_concurrency) on the rise, we are seeing more issues with adaptive hash index semaphore deadlocks. I guess there finally is a benefit to having MySQL Enterprise — the ability to disable InnoDB’s Adaptive Hash. If you want, you can hack the source code and compile your own version of MySQL. Only 4 file changes are needed to make the workaround happen, and the changes are detailed here.
This message is for our readers mostly located in UK and Europe but keep reading even if you are far away geographically – nothing is impossible in our digital age and you might actually consider traveling there in case of desperate interest. Your feedback would be useful, either way. What I want to draw your attention to is that Jonathan Lewis has posted a call for attendees for a special event dedicated to virtualization technologies with Oracle. This event is considered by UKOUG and whether it happens or not depends on you.