1 mysq error日志报错如下:
2014-05-12 11:29:54 22977 [ERROR] Slave SQL: The incident LOST_EVENTS occured on the master. Message: error writing to the binary log, Error_code: 1590
2014-05-12 11:29:54 22977 [ERROR] Error running query, slave SQL thread aborted. Fix the problem, and restart the slave SQL thread with "SLAVE START". We stopped at log 'mysql-bin.010275' position 91642
2 登录mysql从库,check slave状态
mysql> show slave status\G
*************************** 1. row ***************************
Slave_IO_State: Waiting for master to send event
Master_Host: 10.2xx.3.xx
Master_User: repl
Master_Port: 3306
Connect_Retry: 60
Master_Log_File: mysql-bin.010298
Read_Master_Log_Pos: 67843
Relay_Log_File: mysql-relay-bin.003125
Relay_Log_Pos: 91805
Relay_Master_Log_File: mysql-bin.010275
Slave_IO_Running: Yes
Slave_SQL_Running: No
Replicate_Do_DB: business_db,user_db,plocc_system
Replicate_Ignore_DB:
Replicate_Do_Table:
Replicate_Ignore_Table:
Replicate_Wild_Do_Table:
Replicate_Wild_Ignore_Table:
Last_Errno: 1590
Last_Error: The incident LOST_EVENTS occured on the master. Message: error writing to the binary log
Skip_Counter: 0
Exec_Master_Log_Pos: 91642
Relay_Log_Space: 2420882
Until_Condition: None
Until_Log_File:
Until_Log_Pos: 0
Master_SSL_Allowed: No
Master_SSL_CA_File:
Master_SSL_CA_Path:
Master_SSL_Cert:
Master_SSL_Cipher:
Master_SSL_Key:
Seconds_Behind_Master: NULL
Master_SSL_Verify_Server_Cert: No
Last_IO_Errno: 0
Last_IO_Error:
Last_SQL_Errno: 1590
Last_SQL_Error: The incident LOST_EVENTS occured on the master. Message: error writing to the binary log
Replicate_Ignore_Server_Ids:
Master_Server_Id: 71
Master_UUID: 9b0dcf62-29f4-11e3-9471-677b33903869
Master_Info_File: mysql.slave_master_info
SQL_Delay: 0
SQL_Remaining_Delay: NULL
Slave_SQL_Running_State:
Master_Retry_Count: 86400
Master_Bind:
Last_IO_Error_Timestamp:
Last_SQL_Error_Timestamp: 140512 11:29:54
Master_SSL_Crl:
Master_SSL_Crlpath:
Retrieved_Gtid_Set:
Executed_Gtid_Set:
Auto_Position: 0
1 row in set (0.00 sec)
mysql>
从这里看出来,复制down了。
3,google了很多资料,大部分出现在mysql cluster中,大家的做法都是从新做从库,或者换个master接入点。
时间紧急,我也只能从新搭建从库了,特留此记录于此,如果有朋友看到这里,有别的解决方案,非常欢迎留言或者发email到mchdba@tom.com
分享到:
相关推荐
A_Systematic_Analysis_of_the_Juniper_Dual_EC_Incident.pdf
Who: who lost the data from the organisation? What: what actually went missing? Why: why did the data go missing? When: when did the data go missing? How: how did the data go missing? Now it’s ...
信息安全_数据安全_Incident_Response_beyond_Enterpr 云安全 安全架构信息保护 安全评级 数字取证
Clearing_the_Clouds_Incident_Response_in_AWS_Isnt_as_Bad_as_You_Thought 安全 安全威胁 法律法规 安全分析 数据分析
信息安全_数据安全_Accelerate_and_Simplify_Incident_Respo 数字风险 漏洞挖掘 安全管控 信息安全 安全行业
The Windows Forensic Toolchest™ (WFT) is designed to provide a structured and repeatable automated Live Forensic Response, Incident Response, or Audit on a Windows system while collecting security-...
aviation incident cause codes to motivate and practically demonstrate these concepts. These concepts will enable Actuaries to structure analysis pipelines to include both traditional and modern ...
The 2009 Magic Quadrant for SIEM evaluates technology providers with respect to the most- common technology selection scenario — an SIEM project that is funded to solve a compliance reporting issue, ...
Incident_Response_Guide.pdf
:keycap_0: :keycap_2: Read data (SEED, MiniSEED, SAC, SEDY and so on.) :pencil: :pencil: :down_arrow: 转换地震数据 :keycap_0: :keycap_1: SEED -> SAC. :keycap_0: :keycap_2: SEED -> SAC MiniSEED -> SAC...
信息安全_数据安全_Enterprise Incident Management H.pdf
AWS Security Incident Response Guide PDF Please check
Using a well-conceived incident response plan in the aftermath of an online security breach enables your team to identify attackers and learn how they operate. But, only when you approach incident ...
Java图形界面与事件响应,适合初学者。
“Effective incident response forms the criteria used to judge cybersecurity programs. Effective protection and detection measures do not matter if the response to an event falls short. Within days of...
INTRODUCTION A ccording to the Internet research firm comScore, goods and services worthmorethan$17...This icon alerts you to legal issues to consider when responding to an incident.
It is the only book on the market that focuses exclusively on memory forensics and how to deploy such techniques properly. Discover memory forensics techniques: How volatile memory analysis improves ...
「终端安全」How_to_"Marie_Kondo"_your_Incident_Response_with_Foundational_Security_Procedures_and_Case_Management - 金融安全 安全建设 法律法规 NGFW 漏洞挖掘 安全运营