search
HomeDatabaseMysql TutorialMySQL5.5加主键锁读问题_MySQL

bitsCN.com

MySQL5.5加主键锁读问题

 

背景

     有同学讨论到MySQL 5.5下给大表加主键时会锁住读的问题,怀疑与fast index creation有关,这里简单说明下。

 

对照现象

         为了说明这个问题的原因,有兴趣的同学可以做对比实验。

    1)  在给InnoDB表创建主键期间,会锁住该表上的读数据

    2) 但是同样的表执行删除主键期间,不会锁住该表上的读操作

----这说明与是否fast index creation无关,因为这两个操作在数据层面的行为应该是类似的,实际上,创建/删除主键都必须copy data。

 

    3) 在创建主键期间,会锁住该表上执行的show create table

----用1、3的现象可以猜测出,实际上与meta data lock有关。

 

关于meta data lock(MDL)

         MySQL 5.5中引入了MDL,当需要访问、修改表结构时,都需要对meta data加锁(读或写)。比如,当一个线程需要修改表结构的任意一部分时,此时需要阻塞对表结构的访问,当然也需要阻塞对数据行的访问。

 

加主键流程

         当对一个表作加主键操作时,大致流程如下

        1) MDL加写锁

       2) 操作数据,最耗时部分,注意需要copy data,因此流程上是

             a)创建一个临时表A,表A定义为修改后的表结构

             b)从原表读取数据插入表A

             c)删除原表,将表A重命名为原表名

       3)  MDL释放写锁

 

从这个流程可以看到,在最耗时的部分,meta data是被一个X锁保护的。因此在此期间,show create table 或者select data都是会被阻塞。

 

这解释了上面的1) 3)。

 

删除主键流程

        1)  MDL加读锁

       2)  操作数据,最耗时部分

             a) 创建一个临时表A,表A定义为修改后的表结构

             b) 从原表读取数据插入表A

        3) MDL将写锁升级为读锁

            c) 删除原表,将表A重命名为原表名

       4)  MDL释放写锁

 

   这个在最耗时的数据操作部分,加的是MDL的读锁,这样不会影响访问原表的表结构或数据(当然要做更新是不行的)。而最后升级为写锁的时间,只是做重命名表的操作,阻塞的时间就很短。

 

结论

          1) 显然第二个流程更合理

        2) 这个可以认为是MySQL一个可改进的点,并且在5.6下已经改进

        3) 这个问题与是copy data还是inplace方式执行DDL无关,实际上由于InnoDB的聚集索引组织结构,增、删主键都是必须得copy data的。

bitsCN.com
Statement
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn
How do you alter a table in MySQL using the ALTER TABLE statement?How do you alter a table in MySQL using the ALTER TABLE statement?Mar 19, 2025 pm 03:51 PM

The article discusses using MySQL's ALTER TABLE statement to modify tables, including adding/dropping columns, renaming tables/columns, and changing column data types.

How do I configure SSL/TLS encryption for MySQL connections?How do I configure SSL/TLS encryption for MySQL connections?Mar 18, 2025 pm 12:01 PM

Article discusses configuring SSL/TLS encryption for MySQL, including certificate generation and verification. Main issue is using self-signed certificates' security implications.[Character count: 159]

How do you handle large datasets in MySQL?How do you handle large datasets in MySQL?Mar 21, 2025 pm 12:15 PM

Article discusses strategies for handling large datasets in MySQL, including partitioning, sharding, indexing, and query optimization.

What are some popular MySQL GUI tools (e.g., MySQL Workbench, phpMyAdmin)?What are some popular MySQL GUI tools (e.g., MySQL Workbench, phpMyAdmin)?Mar 21, 2025 pm 06:28 PM

Article discusses popular MySQL GUI tools like MySQL Workbench and phpMyAdmin, comparing their features and suitability for beginners and advanced users.[159 characters]

How do you drop a table in MySQL using the DROP TABLE statement?How do you drop a table in MySQL using the DROP TABLE statement?Mar 19, 2025 pm 03:52 PM

The article discusses dropping tables in MySQL using the DROP TABLE statement, emphasizing precautions and risks. It highlights that the action is irreversible without backups, detailing recovery methods and potential production environment hazards.

How do you represent relationships using foreign keys?How do you represent relationships using foreign keys?Mar 19, 2025 pm 03:48 PM

Article discusses using foreign keys to represent relationships in databases, focusing on best practices, data integrity, and common pitfalls to avoid.

How do you create indexes on JSON columns?How do you create indexes on JSON columns?Mar 21, 2025 pm 12:13 PM

The article discusses creating indexes on JSON columns in various databases like PostgreSQL, MySQL, and MongoDB to enhance query performance. It explains the syntax and benefits of indexing specific JSON paths, and lists supported database systems.

How do I secure MySQL against common vulnerabilities (SQL injection, brute-force attacks)?How do I secure MySQL against common vulnerabilities (SQL injection, brute-force attacks)?Mar 18, 2025 pm 12:00 PM

Article discusses securing MySQL against SQL injection and brute-force attacks using prepared statements, input validation, and strong password policies.(159 characters)

See all articles

Hot AI Tools

Undresser.AI Undress

Undresser.AI Undress

AI-powered app for creating realistic nude photos

AI Clothes Remover

AI Clothes Remover

Online AI tool for removing clothes from photos.

Undress AI Tool

Undress AI Tool

Undress images for free

Clothoff.io

Clothoff.io

AI clothes remover

AI Hentai Generator

AI Hentai Generator

Generate AI Hentai for free.

Hot Article

Hot Tools

Notepad++7.3.1

Notepad++7.3.1

Easy-to-use and free code editor

Atom editor mac version download

Atom editor mac version download

The most popular open source editor

Dreamweaver Mac version

Dreamweaver Mac version

Visual web development tools

Dreamweaver CS6

Dreamweaver CS6

Visual web development tools

DVWA

DVWA

Damn Vulnerable Web App (DVWA) is a PHP/MySQL web application that is very vulnerable. Its main goals are to be an aid for security professionals to test their skills and tools in a legal environment, to help web developers better understand the process of securing web applications, and to help teachers/students teach/learn in a classroom environment Web application security. The goal of DVWA is to practice some of the most common web vulnerabilities through a simple and straightforward interface, with varying degrees of difficulty. Please note that this software