ALL POSTS

Query Profiling Tools — Part 1, mysqlsla

The “sla” in mysqlsla stands for “statement log analyzer”. This does a much better job than mysqldumpslow of analyzing your slow query log. This is really good for weeding out pesky entries in the slow query log that you do not care about. In this case, I’m using –slow to read the slow query log at the filename specified, –flat to flatten all the text to lowercase (basically case-insensitive matching) and –sort at to sort by “average time”.

Pythian Goodies: The Answer to Free Memory, Swap, Oracle, and Everything

I gave this talk covering the different types of memory, how to monitor memory, and how to optimally use it with Oracle at the UKOUG, I have since received requests to post the slides online. Instead of just posting the PowerPoint I took some time to give the presentation again (internally here at Pythian) and this time we recorded the session and are posting it in a variety of formats. This is a bit of a departure from the typical Pythian Goodies, in that it is scripted, and there is a lot of content here in the whitepaper.

MySQL Query Profiling Tools — part 0, Maatkit Query Profiler

I’ve been checking out a new client environment. My mission is to figure out some of the characteristics of the queries being run, and if they’re “good” or “bad”. In my arsenal of “tools I really want to check out” has been Maatkit’s Query Profiler, it profiles a batch of queries, without granularity (at least not the way I ran it) to see what query is doing what. So I ran this against a production machine, read my results here

Oracle Grid Control: The Importance of Deleting the emkey

Oracle Grid Control documentation warns against leaving the emkey in the Grid Control repository, if it is not removed after it has been copied it is easy to decrypt data, like passwords. Oracle Management Service 10.2 uses several ways to protect these sensitive data, including Virtual Private Database and Password Encryption. To overcome the first one, you have to connect to the database as the SYS user, for the second one, you have to know the encrypted password form, the key, and the associated algorithm. Obviously, the key used to cipher the password is the emkey. So the next question is, “Where are stored the ciphered passwords?”.

Sheeri’s First Week at Pythian

The Pythian family got a new song last Monday — “Sheeri” means “my song” in Hebrew. I’ve been working at Pythian for over a week now, and I really like the work model, environment and culture.The Pythian model of training is “jump right in, and ask questions when you don’t understand something.” The teams are very good technically, and people routinely help each other out. My teammates have been known to work on something I’ve been meaning to get to, and nobody utters a word of complaint. It’s a great workplace. There is a link to a post on my own blog explaining how I got the job.

Page 207 of 258« First...102030...205206207208209...220230240...Last »