Advanced chapter of Lesson 8_ Indexes
Advanced chapter of Lesson 8_ Indexes
I MySQL Linux Installation
1. Prepare Linux server
CentOS 7.0
Final shell connection server
2. Download MySQL installation package for Linux
www.mysql.com
Download Community Edition (free)
3. Upload MySQL installation package
4. Create a directory and unzip it
mkdir mysql
tar -xvf mysql-8.0.rpm-bu ...
Added by jake2891 on Mon, 07 Mar 2022 21:54:31 +0200
3, Index optimization analysis
4. Performance analysis
4.1 common performance bottlenecks of MySQL
① CPU: when the CPU runs at full load, it usually occurs when the data is loaded into the memory or read from the disk;
② IO: the disk IO bottleneck occurs when the loaded data is much larger than the memory capacity;
③ Server hardware bottleneck: check the performance an ...
Added by radstorm on Mon, 07 Mar 2022 21:00:48 +0200
Type of mysql index
MySQL index type
Original link: https://www.cnblogs.com/luyucheng/p/6289714.html
1, Introduction
MySQL currently has the following index types: 1. General index 2. Unique index 3. Primary key index 4. Combined index 5. Full text index
2, Statement
CREATE TABLE table_name[col_name data type]
[unique|fulltext][index|key][index_name](col_name ...
Added by denhamd2 on Mon, 07 Mar 2022 20:27:23 +0200
Lesson 4 Basic _ constraint
Lesson 4 Basic _ constraint
1. Summary
1. Concepts
Rules that act on fields in a table to restrict data stored in the table.
2. Purpose
Ensure that the data is correct, valid and complete.
3. Classification
constraintdescribeKeywordNon-empty constraintRestrict the field to data that cannot be nullNOT NULLUnique ConstraintEnsure that all ...
Added by Gen-ik on Mon, 07 Mar 2022 20:13:22 +0200
Basic operation network docker
View ifconfig of docker server
docker network principle
Docker uses Linux bridging. A docker container bridge (docker0) is virtualized in the host. When docker starts a container, it will assign an IP address to the container according to the network segment of docker bridge, which is called container IP. At the same time, docker bridge ...
Added by wolfrock on Mon, 07 Mar 2022 19:56:59 +0200
Lesson 5 Basic _ multi-table query
Lesson 5 Basic _ multi-table query
1. Multi-table relations
In project development, when designing database table structure, the table structure will be analyzed and designed according to the business requirements and the relationship between business modules. Because business is related to each other, there are also various connections among ...
Added by joeiscoolone on Mon, 07 Mar 2022 19:47:01 +0200
View, trigger, stored procedure, function, process control, transaction
1, View
View is a virtual table (non real). Its essence is to obtain a dynamic data set according to SQL statements and name it. When using, users only need to use the name to obtain the result set, which can be used as a table.
Using the view, we can pick out the temporary table in the query process and implement it with the view. In t ...
Added by narked on Mon, 07 Mar 2022 19:30:05 +0200
sql practical optimization and misunderstanding
sql common pit + optimization
How many of the eight common SQL misuses did you get? Alibaba cloud RDS expert delegation Java 2022-02-28 09:09
Introduction: Alibaba cloud RDS expert service team has helped cloud customers solve many urgent problems. Some common SQL problems in ApsaraDB expert diagnosis report are summarized as follows for your ...
Added by ashutosh.titan on Mon, 07 Mar 2022 11:31:39 +0200
Spring boot uses spring's built-in scheduled tasks
Original link
https://cloud.tencent.com/developer/article/1582434
1. Preface
We often use timed tasks in daily project development. For example, make statistics and settlement in the early morning, start planning activities, automatically change the unpaid orders that exceed 24 hours to cancelled status, and automatically change the orde ...
Added by danoli on Mon, 07 Mar 2022 10:51:20 +0200
Roll it up and take you to write a distributed RPC framework that middle and senior programmers will know
I summary
What is RPC?
Remote service callOfficial: the idea of requesting services from remote computer programs through the network without understanding the underlying network technologyA little more popular: without knowing the details of the call, the client calls an object that exists on the remote computer, just like calling an objec ...
Added by donald on Sun, 06 Mar 2022 16:46:07 +0200