19 April 2014

The Ruby Reflector



  Source Favicon

Calls to functions are logged directly on the Binary Log. Therefore if you don't have all functions created on all your servers you will break your replication and the SQL process will stop with an error.



mysql> insert into t VALUES(this_year());

Binary Log:

# 111213 23:25:46 server id 1 end_log_pos 676 Query thread_id=5 exec_time=0 error_code=0

SET TIMESTAMP=1323815146…

mysqlperformanceblog.com Read
  Source Favicon
By Guest Post of New Relic 3 months ago.

…our biggest challenge.

We are looking forward to hearing from you where we can take this integration next and provide you better real-time signals and analytics across your multiple environments logs.

The post Sumo Logic's Log Analysis QuickStart Plugin: Monitor Your Log's Events with Sumo Logic & New Relic appeared first on New Relic blog .

newrelic.com Read
  Source Favicon
By Desdemona Bandini of New Relic 6 months ago.

I Can't Log In!

At MultiPlan, we utilize a centralized web service to handle authentication requests and these requests occur between all layers of our application. One morning a server that handled authentication requests was functional, but performing slowly. And as a result, all of our applications were experiencing slowness and users were reporting they couldn't log in.

The following graph shows the severe blip in the authentication service's response time:

With New…

newrelic.com Read
  Source Favicon
By Mike Gunderloy of A Fresh Cup 6 months ago.

Appmaker - New online mobile application generation tool from Mozilla.

Introducting Harp - A web server for static files with built-in preprocessing.

Bitch - Log ruby messages to the OS X notification center.

Time to hand over the reigns before Capistrano costs me my youth? - Looks like Lee Hambley has about had it with maintaining this particular piece of OSS.

afreshcup.com Read
  Source Favicon
By Craig Kerstiens of Heroku 7 months ago.

…WAL-E, an open source application for archiving PostgreSQL WAL (Write Ahead Log) files quickly, continuously and with a low operational burden.

About Continuous Protection

In order to protect customer data and be resilient to failure modes, we provide all Heroku Postgres databases with continuous protection by replicating data to external storage. We store a base backup of your database as well as a log of all committed transactions in the form of WAL files - the standard …

blog.heroku.com Read
  Source Favicon
By Tyler Poland of Engine Yard Developer Blog over 1 year ago.

Binary Log Management

Coupled with the changes to replica binary logging we will be releasing several updates to our tool that manages binary logs. This tool will be receiving updates to enable it to purge binary logs on replica databases. Along with this change we will also be adding a bunch of other features:

Quicker Initial Purge: Initial log removal (when master-bin.000001 exists) will now happen at 50% disk usage by default instead of 90%. This will reduce concerns about disk space …

engineyard.com Read
  Source Favicon
By Mike Gunderloy of A Fresh Cup over 1 year ago.

Debunking the Node.js Gish Gallop - Someone intimately familiar with ruby web servers and frameworks takes on the more extreme claims of the Node.js community.

thin 2.0 - Out in alpha. Use at your own risk.

Firebug Tip: Log DOM Events - The easy way to avoid sprinkling your code with console.log().

Consuela - Log reader for the iPad.

afreshcup.com Read
  Source Favicon
By Bryan McLellan of Chef Blog almost 2 years ago.

[ CHEF-2927 ] - Log a warning if maxFieldLength is set to <= 10,000 in solrconfig.xml

[ CHEF-2935 ] - mdadm should support argument to change metadata version

[ CHEF-2968 ] - 'knife node run_list add' should take a list of RunListItems

[ CHEF-2971 ] - Force Chef:: Knife:: SSH to use the net-ssh 'keys_only' option when identity file is passed

[ CHEF-3025 ] - knife bootstrap …

opscode.com Read
  Source Favicon
On Coding Horror 2 years ago.

Now Log In With Your Password and a PIN

Now your password alone is no longer enough to access your email.

Once this is enabled, accessing your email always requires the password, and a code delivered via your cell phone . (You can check the "remember me for 30 days on this device" checkbox so you don't have to do this every time.) With this in place, even if they discover your super sekrit email password, would-be hackers can't do anything useful with it! To access …

codinghorror.com Read
  Source Favicon
By Todd Hoff of High Scalability 2 years ago.

…Architectural Overview; The Access Methods: Btree, Hash, Recno, Queue; The Library Interface Layer; The Buffer Manager: Mpool; Write-ahead Logging; The Lock Manager: Lock; The Log Manager: Log; The Transaction Manager: Txn.

highscalability.com Read