background preloader

MySQL 5.5 - Performance and Scalability

MySQL 5.5 - Performance and Scalability
Related:  RDS-Tools

PHP: Hypertext Preprocessor Remotely connect to an AWS RDS instance using MySQL Workbench How to connect and send SQL queries remotely to an Amazon Web Service RDS instance using MySQL Workbench After having created a new Amazon Web Service RDS instance it's often useful to have access to it remotely to send SQL command. By default a newly created RDS instance will deny any connection. So the first step is to create a new security rule (or edit an existing one) and add your IP address to gain access to the instance. Navigate to the RDS console: Then head to the security group screen, select or create a new security group: And add your public IP address (don't forget to add the subnet mask for example /32 after the host). Then we'll need to figure out what is the instance address, to do so go to the instance menu and write down the endpoint, port number and principal username: Now launch MySQL Workbench (you can download it from the MySQL website): On the top left, locate the '+' icon to add a new connection: Then fill up the form as below:

JoomLeague I am part of a team on a site that has used Joomleague extensively, for a number of leagues over the last year or so. Its been upgraded a few times during this period, and I have to say, the work done on this component is superb. The problem with league software (and I've been using this league software or similar since 2004) is that it has to be able to do a number of things to suit a wide range of sports with differing teams, fixture setups, scoring methods and so on. This means that Joomleague can come across as somewhat complicated to novice users of the software. If you're after quick slapdash league software that doesn't bring much to the front end, look elsewhere. If you're after something that will look great, have some excellent features (stats, prediction leagues and so on), and are willing to put a bit of effort in to produce the goods, Joomleague is the way forward.

Virtual Private Clouds (VPCs) and Amazon RDS - Amazon Relational Database Service Unless you are working with a legacy DB instance, your DB instance is in a virtual private cloud (VPC). A virtual private cloud is a virtual network that is logically isolated from other virtual networks in the AWS cloud. Amazon Virtual Private Cloud (Amazon VPC) lets you launch AWS resources, such as an Amazon Relational Database Service (Amazon RDS) or Amazon Elastic Compute Cloud (Amazon EC2) instance, into a VPC. The VPC can either be a default VPC that comes with your account or one that you create. All VPCs are associated with your AWS account. There are two EC2 platforms that host Amazon RDS DB instances. Some legacy DB instances on the EC2-Classic platform are not in a VPC. Amazon VPC is an AWS service and this section only covers VPC functionality that directly affects access to a DB instance. The following table provides links to the Amazon VPC guides.

STRATO FAQ Categories: Hosting & Domains Joomla is a Content Management System (CMS), which allows users to build interesting and attractive websites, with a very user-friendly content manager. The relatively easy installation and the intuitive administration interface make this program accessible to anyone. Note: Joomla can be used in all STRATO hosting packages featuring MySQL. Minimum requirements for installing Joomla: A hosting package or an operational Linux server. At least one MySQL database: v3.23 or higher are compatible. The PHP language is enabled in the hosting package or server: the minimum PHP version is 4.3.x. Installing JoomlaAt first, you download the distribution file, which can be found on the official Joomla website: the zip/tar distribution file with a zip/tar program, like 7-Zip (available at . In the next step, upload all the unzipped files to the root directory or a subdirectory on your STRATO hosting space. 1. 2. 3.

Access Scenarios for Working with a DB Instance in a VPC - Amazon Relational Database Service Amazon RDS supports the following access scenarios. For more detail on what you need to do to successfully address each scenario, see the documentation section given. Scenario 1: DB Instance and EC2 Instance in the Same VPC A common use of an RDS instance in a VPC is to share data with an application server that is running in an EC2 instance in the same VPC. The following diagram shows this scenario. The simplest way to manage access between EC2 instances and DB instances in the same VPC is to do the following: Create a VPC security group that your DB instances will be in. To create a rule in a VPC security group that allows connections from another security group, do the following: Sign in to the AWS Management Console and open the Amazon VPC console at You can communicate between an EC2 instance that is not in an Amazon VPC and an Amazon RDS DB instance that is in a VPC by using ClassicLink. Note ClassicLink is available at no charge. Caution

MediaWiki Connecting to a DB Instance Running the MySQL Database Engine - Amazon Relational Database Service Once Amazon RDS provisions your DB instance, you can use any standard MySQL client application or utility to connect to the instance. In the connection string, you specify the DNS address from the DB instance endpoint as the host parameter, and specify the port number from the DB instance endpoint as the port parameter. You can use the AWS Management Console, the rds-describe-db-instances CLI command, or the DescribeDBInstances API action to list the details of an Amazon RDS DB instance, including its endpoint. For host or host name, specify port, specify 3306 You can connect to an Amazon RDS MySQL DB instance by using tools like the MySQL command line utility. Two common causes of connection failures to a new DB instance are: The DB instance was created using a security group that does not authorize connections from the device or Amazon EC2 instance where the MySQL application or utility is running. Connecting from the MySQL Utility

Connecting to a RDS Server from a Local Computer Using SSH Tunneling on a Mac That was the google query I searched and it took me a long time to find an answer so I’m going to contribute it back to the internet. Most helpful resources: (almost helpful: ) Problem I wanted to connect to a remote RDS instance from my mac computer. mysql -u user -p -h but that won’t work. Solution If you scour the internet there appear to two main solutions. Add your IP address to a whitelist on rds, but could be problematic since your IP address will probably change.Connect to the RDS instance using SSH tunneling. I had not set up SSH tunneling before and for some reason had a hard time tracking it down. So, what is the solution? There are two steps: Set up the SSH Tunnel -N only set up the tunnel -L set up the forwarding 2.

Amazon RDS Security Groups - Amazon Relational Database Service Security groups control the access that traffic has in and out of a DB instance. Three types of security groups are used with Amazon RDS: DB security groups, VPC security groups, and EC2 security groups. In simple terms, a DB security group controls access to a DB instance that is not in a VPC, a VPC security group controls access to a DB instance (or other AWS instances) inside a VPC, and an EC2 security group controls access to an EC2 instance. By default, network access is turned off to a DB instance. Each DB security group rule enables a specific source to access a DB instance that is associated with that DB security group. You do not need to specify a destination port number when you create DB security group rules; the port number defined for the DB instance is used as the destination port number for all rules defined for the DB security group. For more information about working with DB security groups, see Working with DB Security Groups. DB Security Groups vs.

Working with DB Security Groups - Amazon Relational Database Service A DB security group controls network access to a DB instance that is not inside a VPC. By default, network access is turned off to a DB instance. You can specify rules in a security group that allows access from an IP address range, port, or EC2 security group. If you are a new customer to Amazon RDS or if you are an existing customer who is using a new region, your DB instance is most likely in a default VPC. Creating a DB Security Group To create a DB security group, you need to provide a name and a description. To create a DB security group Sign in to the AWS Management Console and open the Amazon RDS console at what platforms are supported for your AWS account in your current region.If Supported Platforms indicates EC2,VPC, your AWS account in the current region does not use a default VPC. Note that a newly created DB security group does not provide access to a DB instance by default. Listing Available DB Security Groups Caution Important

Download Oracle 11g release 2 client ODBC drivers - At the download pages there is a requirement to accept the OTN license agreement. At the top of the page, click the "Accept License Agreement" radio before clicking download. 32-bit Windows Go to Download win3211gR2client.zipExtract the zip file.Open the "Client" directory.Launch the "Oracle Client Installer" by clicking setup.exe. Done. Back to driver info page → 64-bit Windows Go to Download Extract the zip file.Open the "Client" directory.Launch the "Oracle Client Installer" by clicking setup.exe.