search
HomeDatabaseMysql TutorialPerformance considerations for MYSQL source code installation under Linux systems

Performance considerations for source code installation:
17.3.1 Remove unnecessary modules:
Source code installation has greater flexibility because it can flexibly customize and compile the database. Certain compilation options can greatly enhance the performance of our database.
Execute the following command to see all compiled configuration options:
shell> ./configure --help
If you only install the client, you can execute the following command:
shell> ./configure --without-server
If you don’t want For log files and databases located under the "/usr/local/var" directory, use one of the following configure commands:
local/mysql/tmp/mysql.sock
17.3.2 Select only the character set to be used :
Change the default character set and collation after installation:
shell> ./configure -- with-charset=CHARSET
./configure --with-collation=COLLATION
Select the character set to be installed:
shell>./ configure --with-extra-charsets=LIST
list can be any of the following:
A series of character set names separated by spaces
complex -, to include all character sets that cannot be loaded dynamically
all -, to combine all character sets Included in binary
17.3.3 Compiled with pgcc:
pgcc 2.90.29 or newer:
CFLAGS="-O3 -mpentiumpro -mstack-align-double" CXX=gcc
CXXFLAGS="-O3 -mpentiumpro -mstack-align -double
-felide-constructors -fno- exceptions -fno-rtti"
17.3.4 Use static compilation to improve performance:
shell>./configure --with-client-ldflags=-all-static
--with- mysqld-ldflags=-all-static
17.4 mysql upgrade
Method 1 is the simplest and suitable for any storage engine (not necessarily the fastest)
Install a new database
Export the old database as text and import it into the new database
shell> mysqladmin -h hostname -P port -u user -p passwd create db_name
shell> mysqldump --opt db_name | mysql -h hostname -P port -u user -p
passwd db_name
Note: If the network is slow, you can export Add --compress to the option to reduce network transmission
Upgrade the privilege table
CP all the mysql database directories in the original library to overwrite the mysql database in the new library
Execute the mysql_fix_privilege_tables command in the shell to upgrade the permission table
shell>mysql_fix_privilege_tables
Restart the database Service
Method 2 is suitable for any storage engine and is faster
Install a new database
Create a directory to save the output file in the old library and back up the database:
shell> mkdir DUMPDIR
shell>mysqldump --tab=DUMPDIR db_name
Change the DUMPDIR directory Transfer the files in to the corresponding directory on the target machine and load the files into MySQL:
shell> mysqladmin create db_name # create database
shell> cat DUMPDIR/*.sql | mysql db_name # create tables in database
shell> mysqlimport db_name DUMPDIR /*.txt # load data into tables
(During the actual test, it was found that txt must be placed under data before execution, otherwise it will prompt that the file cannot be found)
Upgrade the permission table
Cp all the mysql database directories in the original library to overwrite For the mysql database in the new library, execute the mysql_fix_privilege_tables command in the shell to upgrade the privilege table
shell>mysql_fix_privilege_tables
Restart the database service
Method 3 is suitable for the myisam table and is the fastest
Install the new database
Copy all the files in the data directory in the original library ( .frm, .MYD, MYI) cp to the corresponding directory under the new library to upgrade the permission table
Cp all the mysql database directories in the original library to overwrite the mysql database in the new library. Execute the mysql_fix_privilege_tables command in the shell to upgrade the permission table
shell> mysql_fix_privilege_tables
flush tables or restart the database service to take effect

For more related articles, please pay attention to the PHP Chinese website (www.php.cn)!

Statement
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn
What Are the Limitations of Using Views in MySQL?What Are the Limitations of Using Views in MySQL?May 14, 2025 am 12:10 AM

MySQLviewshavelimitations:1)Theydon'tsupportallSQLoperations,restrictingdatamanipulationthroughviewswithjoinsorsubqueries.2)Theycanimpactperformance,especiallywithcomplexqueriesorlargedatasets.3)Viewsdon'tstoredata,potentiallyleadingtooutdatedinforma

Securing Your MySQL Database: Adding Users and Granting PrivilegesSecuring Your MySQL Database: Adding Users and Granting PrivilegesMay 14, 2025 am 12:09 AM

ProperusermanagementinMySQLiscrucialforenhancingsecurityandensuringefficientdatabaseoperation.1)UseCREATEUSERtoaddusers,specifyingconnectionsourcewith@'localhost'or@'%'.2)GrantspecificprivilegeswithGRANT,usingleastprivilegeprincipletominimizerisks.3)

What Factors Influence the Number of Triggers I Can Use in MySQL?What Factors Influence the Number of Triggers I Can Use in MySQL?May 14, 2025 am 12:08 AM

MySQLdoesn'timposeahardlimitontriggers,butpracticalfactorsdeterminetheireffectiveuse:1)Serverconfigurationimpactstriggermanagement;2)Complextriggersincreasesystemload;3)Largertablesslowtriggerperformance;4)Highconcurrencycancausetriggercontention;5)M

MySQL: Is it safe to store BLOB?MySQL: Is it safe to store BLOB?May 14, 2025 am 12:07 AM

Yes,it'ssafetostoreBLOBdatainMySQL,butconsiderthesefactors:1)StorageSpace:BLOBscanconsumesignificantspace,potentiallyincreasingcostsandslowingperformance.2)Performance:LargerrowsizesduetoBLOBsmayslowdownqueries.3)BackupandRecovery:Theseprocessescanbe

MySQL: Adding a user through a PHP web interfaceMySQL: Adding a user through a PHP web interfaceMay 14, 2025 am 12:04 AM

Adding MySQL users through the PHP web interface can use MySQLi extensions. The steps are as follows: 1. Connect to the MySQL database and use the MySQLi extension. 2. Create a user, use the CREATEUSER statement, and use the PASSWORD() function to encrypt the password. 3. Prevent SQL injection and use the mysqli_real_escape_string() function to process user input. 4. Assign permissions to new users and use the GRANT statement.

MySQL: BLOB and other no-sql storage, what are the differences?MySQL: BLOB and other no-sql storage, what are the differences?May 13, 2025 am 12:14 AM

MySQL'sBLOBissuitableforstoringbinarydatawithinarelationaldatabase,whileNoSQLoptionslikeMongoDB,Redis,andCassandraofferflexible,scalablesolutionsforunstructureddata.BLOBissimplerbutcanslowdownperformancewithlargedata;NoSQLprovidesbetterscalabilityand

MySQL Add User: Syntax, Options, and Security Best PracticesMySQL Add User: Syntax, Options, and Security Best PracticesMay 13, 2025 am 12:12 AM

ToaddauserinMySQL,use:CREATEUSER'username'@'host'IDENTIFIEDBY'password';Here'showtodoitsecurely:1)Choosethehostcarefullytocontrolaccess.2)SetresourcelimitswithoptionslikeMAX_QUERIES_PER_HOUR.3)Usestrong,uniquepasswords.4)EnforceSSL/TLSconnectionswith

MySQL: How to avoid String Data Types common mistakes?MySQL: How to avoid String Data Types common mistakes?May 13, 2025 am 12:09 AM

ToavoidcommonmistakeswithstringdatatypesinMySQL,understandstringtypenuances,choosetherighttype,andmanageencodingandcollationsettingseffectively.1)UseCHARforfixed-lengthstrings,VARCHARforvariable-length,andTEXT/BLOBforlargerdata.2)Setcorrectcharacters

See all articles

Hot AI Tools

Undresser.AI Undress

Undresser.AI Undress

AI-powered app for creating realistic nude photos

AI Clothes Remover

AI Clothes Remover

Online AI tool for removing clothes from photos.

Undress AI Tool

Undress AI Tool

Undress images for free

Clothoff.io

Clothoff.io

AI clothes remover

Video Face Swap

Video Face Swap

Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Article

Hot Tools

SublimeText3 Chinese version

SublimeText3 Chinese version

Chinese version, very easy to use

VSCode Windows 64-bit Download

VSCode Windows 64-bit Download

A free and powerful IDE editor launched by Microsoft

SecLists

SecLists

SecLists is the ultimate security tester's companion. It is a collection of various types of lists that are frequently used during security assessments, all in one place. SecLists helps make security testing more efficient and productive by conveniently providing all the lists a security tester might need. List types include usernames, passwords, URLs, fuzzing payloads, sensitive data patterns, web shells, and more. The tester can simply pull this repository onto a new test machine and he will have access to every type of list he needs.

Notepad++7.3.1

Notepad++7.3.1

Easy-to-use and free code editor

SAP NetWeaver Server Adapter for Eclipse

SAP NetWeaver Server Adapter for Eclipse

Integrate Eclipse with SAP NetWeaver application server.