Mysql log recovery method: First specify the recovery time, the code is [mysqlbinlog --stop-date=""]; then specify the recovery location, the code is [mysqlbinlog --start-date="2020-10 -09 9:55:00"].
Mysql log recovery method:
To recover data from the binary log, you need to know the current binary log The path and file name of the file. The path can generally be found from the options file (i.e. my.cnf or my.ini, depending on your system). If not included in the options file, it can be given as an option on the command line when the server starts. The option to enable binary logging is --log-bin. To determine the file name of the current binary log file, enter the following MySQL statement:
SHOW BINLOG EVENTS /G
You can also enter the following from the command line:
mysql --user=root -pmy_pwd -e 'SHOW BINLOG EVENTS /G'
Replace the password my_pwd with the server's root password.
1. Specify the recovery time
For MySQL 4.1.4, you can specify the start and end time in DATETIME format through the --start-date and --stop-date options in the mysqlbinlog statement. For example, assume that at 10:00 this morning (today is April 20, 2006), execute a SQL statement to delete a large table. To restore tables and data, you can restore the previous night's backup and enter:
mysqlbinlog --stop-date="2005-04-20 9:59:59" /var/log/mysql/bin.123456 / mysql -u root -pmypwd
This command will restore all backups up to the date and time given in the --stop-date option in DATETIME format data. If you don't detect an incorrect SQL statement entered several hours later, you may want to resume the activity that occurred later. Based on these, you can run mysqlbinlog again using the date and time:
mysqlbinlog --start-date="2005-04-20 10:01:00" /var/log/mysql/bin.123456 / mysql -u root -pmypwd /
In this line, the SQL statement for the login from 10:01 AM will be run. Combining the dump file from the night before the execution and two lines from mysqlbinlog can restore all data to one second before 10:00 AM. You should check the logs to make sure the times are accurate. The next section explains how to do this.
2. Specify the recovery location
You can also specify the log location by using the mysqlbinlog options --start-position and --stop-position without specifying the date and time. They have the same effect as the start and end date options, except that they give a position number from the log. Using log locations is a more accurate recovery method, especially when many transactions are occurring simultaneously due to destructive SQL statements. To determine the position number, you can run mysqlbinlog to find the time range in which the unexpected transaction was performed, but redirect the results to a text file for inspection. The operation method is:
mysqlbinlog --start-date="2005-04-20 9:55:00" --stop-date="2005-04-20 10:05:00" / /var/log/mysql/bin.123456 > /tmp/mysql_restore.sql
This command will create a small text file in the /tmp directory and will display the SQL statement when the wrong SQL statement is executed. You can open the file with a text editor and look for statements you don't want to repeat. Position numbers in the binary log should be commented if they are used to stop and continue recovery operations. Use log_pos plus a number to mark the position. After restoring the previous backup file using the position number, you should enter the following from the command line:
mysqlbinlog --stop-position="368312" /var/log/mysql/bin.123456 / mysql -u root -pmypwd mysqlbinlog --start-position="368315" /var/log/mysql/bin.123456 / mysql -u root -pmypwd /
Line 1 above will restore all transactions up to the stop point. The next line will restore all transactions from the given starting position until the end of the binary log. Because the output of mysqlbinlog includes the SET TIMESTAMP statement before each SQL statement is logged, the recovered data and related MySQL logs will reflect the original time of transaction execution.
1. MySQL database does not have an incremental backup mechanism. When the amount of data is too large, backup is a big problem. Fortunately, the mysql database provides a master-slave backup mechanism, which actually writes all the data in the master database to the backup database at the same time. Implement hot backup of mysql database.
2. If you want to realize hot backup of two machines, you must first understand the version requirements of the master-slave database server. To achieve hot standby, the MySQL version must be higher than 3.2. Another basic principle is that the database version of the slave database can be higher than the master server database version, but it cannot be lower than the master server database version.
3. Set up the main database server:
a. First check whether the version of the main server supports hot standby. Then check whether the configuration of the mysqld configuration block in my.cnf (unix-like) or my.ini (windows) has log-bin (record database change log). Because the replication mechanism of mysql is a log-based replication mechanism, the main server must It needs to support change logs. Then set the database to which the log should be written or the database where the log should not be written. This way only changes to the database that interest you are written to the database's log.
server-id=1 //The id of the database should be 1 by default and does not need to be changed
log-bin=log_name //The name of the log file, you can specify the log here If there is no setting in other directories, a log name of the default host name
binlog-do-db=db_name //Database for recording logs
binlog-ignore-db=db_name //No recording Log database
If there are multiple databases above, use "," to separate them, and then set the user account for synchronizing the database
mysql> GRANT REPLICATION SLAVE ON *.*
-> TO
[email='repl'@'%.mydomain.com']'repl'@'%.mydomain.com'[/email]
IDENTIFIED BY 'slavepass';
4.0.2 以前的版本, 因为不支持 REPLICATION 要使用下面的语句来实现这个功能
mysql> GRANT FILE ON *.*
-> TO
[email='repl'@'%.mydomain.com']'repl'@'%.mydomain.com'[/email]
IDENTIFIED BY 'slavepass';
设置好主服务器的配置文件后重新启动数据库
b.锁定现有的数据库并备份现在的数据
锁定数据库
mysql> FLUSH TABLES WITH READ LOCK;
备份数据库有两种办法一种是直接进入到 mysql 的 data 目录然后打包你需要备份数据库的文件夹,第二种是使用 mysqldump 的方式来备份数据库但是要加上"--master-data " 这个参数,建议使用第一种方法来备份数据库.
解除表的锁定的方法:
unlock tables;
c.查看主服务器的状态
mysql> show master statusG;
+---------------+----------+--------------+------------------+
| File | Position | Binlog_Do_DB | Binlog_Ignore_DB |
+---------------+----------+--------------+------------------+
| mysql-bin.003 | 73 | test | manual,mysql |
+---------------+----------+--------------+------------------+
记录 File 和 Position 项目的值,以后要用的。
相关免费学习推荐:mysql数据库(视频)
The above is the detailed content of How to restore mysql log. For more information, please follow other related articles on the PHP Chinese website!

InnoDBBufferPool reduces disk I/O by caching data and indexing pages, improving database performance. Its working principle includes: 1. Data reading: Read data from BufferPool; 2. Data writing: After modifying the data, write to BufferPool and refresh it to disk regularly; 3. Cache management: Use the LRU algorithm to manage cache pages; 4. Reading mechanism: Load adjacent data pages in advance. By sizing the BufferPool and using multiple instances, database performance can be optimized.

Compared with other programming languages, MySQL is mainly used to store and manage data, while other languages such as Python, Java, and C are used for logical processing and application development. MySQL is known for its high performance, scalability and cross-platform support, suitable for data management needs, while other languages have advantages in their respective fields such as data analytics, enterprise applications, and system programming.

MySQL is worth learning because it is a powerful open source database management system suitable for data storage, management and analysis. 1) MySQL is a relational database that uses SQL to operate data and is suitable for structured data management. 2) The SQL language is the key to interacting with MySQL and supports CRUD operations. 3) The working principle of MySQL includes client/server architecture, storage engine and query optimizer. 4) Basic usage includes creating databases and tables, and advanced usage involves joining tables using JOIN. 5) Common errors include syntax errors and permission issues, and debugging skills include checking syntax and using EXPLAIN commands. 6) Performance optimization involves the use of indexes, optimization of SQL statements and regular maintenance of databases.

MySQL is suitable for beginners to learn database skills. 1. Install MySQL server and client tools. 2. Understand basic SQL queries, such as SELECT. 3. Master data operations: create tables, insert, update, and delete data. 4. Learn advanced skills: subquery and window functions. 5. Debugging and optimization: Check syntax, use indexes, avoid SELECT*, and use LIMIT.

MySQL efficiently manages structured data through table structure and SQL query, and implements inter-table relationships through foreign keys. 1. Define the data format and type when creating a table. 2. Use foreign keys to establish relationships between tables. 3. Improve performance through indexing and query optimization. 4. Regularly backup and monitor databases to ensure data security and performance optimization.

MySQL is an open source relational database management system that is widely used in Web development. Its key features include: 1. Supports multiple storage engines, such as InnoDB and MyISAM, suitable for different scenarios; 2. Provides master-slave replication functions to facilitate load balancing and data backup; 3. Improve query efficiency through query optimization and index use.

SQL is used to interact with MySQL database to realize data addition, deletion, modification, inspection and database design. 1) SQL performs data operations through SELECT, INSERT, UPDATE, DELETE statements; 2) Use CREATE, ALTER, DROP statements for database design and management; 3) Complex queries and data analysis are implemented through SQL to improve business decision-making efficiency.

The basic operations of MySQL include creating databases, tables, and using SQL to perform CRUD operations on data. 1. Create a database: CREATEDATABASEmy_first_db; 2. Create a table: CREATETABLEbooks(idINTAUTO_INCREMENTPRIMARYKEY, titleVARCHAR(100)NOTNULL, authorVARCHAR(100)NOTNULL, published_yearINT); 3. Insert data: INSERTINTObooks(title, author, published_year)VA


Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

AI Hentai Generator
Generate AI Hentai for free.

Hot Article

Hot Tools

SecLists
SecLists is the ultimate security tester's companion. It is a collection of various types of lists that are frequently used during security assessments, all in one place. SecLists helps make security testing more efficient and productive by conveniently providing all the lists a security tester might need. List types include usernames, passwords, URLs, fuzzing payloads, sensitive data patterns, web shells, and more. The tester can simply pull this repository onto a new test machine and he will have access to every type of list he needs.

EditPlus Chinese cracked version
Small size, syntax highlighting, does not support code prompt function

Zend Studio 13.0.1
Powerful PHP integrated development environment

SublimeText3 English version
Recommended: Win version, supports code prompts!

PhpStorm Mac version
The latest (2018.2.1) professional PHP integrated development tool