当前位置:网站首页>Customer disaster recovery case - a MySQL database migration scheme
Customer disaster recovery case - a MySQL database migration scheme
2022-06-24 04:40:00 【dongdonglin】
During the construction of customer disaster recovery plan , The customer migrates the database instance to the cloud MySQL Is a very common need . At present, the most commonly used general migration scheme is a more mature one , This scheme can be adopted in the general migration process ; But there is an inconvenient point in the general scheme : Business switching in the migration process is a difficult point , Adjust the business database connection configuration , Switch the read / write data source to CDB Example of IP. The step of adjusting the connection configuration of the business database is likely to store the missing information , The front-end business has been developing for a long time , There are multiple sources that connect to the database , It is difficult to adjust the access source to the target at one time .
General switching scheme :
In the figure, No 3 Step , The business side is required to modify the direction MySQL Of IP.
This scheme provides a migration scheme : By directly modifying the database connection IP, Realize fast business switching , Avoid business front-end redirection IP.
This plan :
HHA yes MySQL Relatively mature solutions for high availability , This article illustrates with examples , Create a database on behalf of the customer .
Switch preconditions :
at present MySQL The console provides modification " Connect VIP" The function of :
This address is MySQL Connection provided VIP, this VIP It can be modified to any unoccupied in the subnet of this instance IP Address . Based on this principle , Require previous source data VIP In the same subnet as the target instance . This is guaranteed by resource planning .
Switching steps :
- Pre check . Check that the data synchronization is complete and as expected .
- Close target MySQL read-only , Open source MySQL read-only .
- Put the source library's MHA Of VIP Release .
- The target MySQL Of VIP Change to source VIP.
- Log in to the source library ,kill The process of deleting non system accounts .
- Observe the business situation , To complete the migration .
matters needing attention : A fallback strategy should be made during the switching process ,3,4 There are certain risks in the process , Careful evaluation is required before operation .
边栏推荐
- How to operate ECs and what types of system configuration schemes can be supported
- Submit sitemap to Baidu
- ServiceStack. Source code analysis of redis (connection and connection pool)
- What is the data center
- How to enlarge the ECS page? How to select ECS instance specifications?
- What are the advantages of ECS? Is ECS better than VM?
- What is etcd and its application scenarios
- [2021 "shadow seeking" medical artificial intelligence algorithm competition] Ti-One product use tutorial
- 一款支持内网脱机分享文档的接口测试软件
- Idea创建Servlet 后访问报404问题
猜你喜欢

What is the data center

Abnova fluorescence in situ hybridization (FISH) probe solution

线性回归的损失和优化,机器学习预测房价

Congratulations to Zhong Jun for becoming the maintainer of chaos metric model working group

什么是数据中台

Introduction to gradient descent method - black horse programmer machine learning handout

ServiceStack. Source code analysis of redis (connection and connection pool)

Abnova peptide design and synthesis solutions

编译器是如何将芯片执行的第一个指令放到芯片起始地址的?
Advanced authentication of uni app [Day12]
随机推荐
What if the ECS forgets its password? How can I retrieve my forgotten password?
Lldb common commands
What are the differences between ECs and virtual hosts? Which is better, ECS or VM?
Through the fog: location notes of Flink crash with a multi component timeout
SAP mts/ato/mto/eto topic 8: ATO mode 2 d+ empty mode strategy 85
How does ECS publish websites? What software tools are needed?
Indicator statistics: real time uvpv statistics based on flow computing Oceanus (Flink)
Kubernetes resource topology aware scheduling optimization
TCPIP协议详解
脚本之美│VBS 入门交互实战
一款支持内网脱机分享文档的接口测试软件
What is Ping? How can the server disable Ping?
黑马程序员机器学习讲义:线性回归api初步使用
Web penetration test - 5. Brute force cracking vulnerability - (9) MS-SQL password cracking
线性回归的损失和优化,机器学习预测房价
Web penetration test - 5. Brute force cracking vulnerability - (5) SMB password cracking
Openeuler kernel technology sharing issue 20 - execution entity creation and switching
Network timeout configuration method when PR and push are proposed
阿里云混合云首席架构师张晓丹:政企混合云技术架构的演进和发展
How to file ECS? What should be paid attention to when selecting ECS