In the era of consolidation, storage has not been left out. The impact of backup on normal database activity . . . batch processing in one database impacting transactional processing — these are two real life examples of the consequences of storage consolidation known to almost every DBA. Virtualization puts a new twist in consolidation, but storage virtualization methods are very under-developed compared to computing resource virtualization. Storage QoS and storage virtualization must necessarily be very closely-related areas with a lot of overlap.
Welcome readers to the 76th edition of Log Buffer, the weekly review of database blogs.
The “sla” in mysqlsla stands for “statement log analyzer”. This does a much better job than mysqldumpslow of analyzing your slow query log. This is really good for weeding out pesky entries in the slow query log that you do not care about. In this case, I’m using –slow to read the slow query log at the filename specified, –flat to flatten all the text to lowercase (basically case-insensitive matching) and –sort at to sort by “average time”.
I gave this talk covering the different types of memory, how to monitor memory, and how to optimally use it with Oracle at the UKOUG, I have since received requests to post the slides online. Instead of just posting the PowerPoint I took some time to give the presentation again (internally here at Pythian) and this time we recorded the session and are posting it in a variety of formats. This is a bit of a departure from the typical Pythian Goodies, in that it is scripted, and there is a lot of content here in the whitepaper.
I’m on the plane back to Canada and I’m extremely satisfied with the UKOUG conference this year. Find out about the last day highlights and post conference exploits here.
I’ve been checking out a new client environment. My mission is to figure out some of the characteristics of the queries being run, and if they’re “good” or “bad”. In my arsenal of “tools I really want to check out” has been Maatkit’s Query Profiler, it profiles a batch of queries, without granularity (at least not the way I ran it) to see what query is doing what. So I ran this against a production machine, read my results here
We have several MySQL DBA openings, one in each of our offices in Ottawa, Boston, or Hyderabad,
Welcome to the 75th edition (a.k.a. the Diamond Edition) of Log Buffer, the weekly review of database blogs.
If you are wondering what the differences are between MySQL: SOUNDS LIKE and Full-Text search, look no further.
Oracle Grid Control documentation warns against leaving the emkey in the Grid Control repository, if it is not removed after it has been copied it is easy to decrypt data, like passwords. Oracle Management Service 10.2 uses several ways to protect these sensitive data, including Virtual Private Database and Password Encryption. To overcome the first one, you have to connect to the database as the SYS user, for the second one, you have to know the encrypted password form, the key, and the associated algorithm. Obviously, the key used to cipher the password is the emkey. So the next question is, “Where are stored the ciphered passwords?”.