Solved

Mysql Failover

Posted on 2010-08-19
5
481 Views
Last Modified: 2012-05-10
I have one master server Mysql and one slave working with replication feature and works really fine!

I can install another slave, but the question is how can I do a transparent automatic failover MySQL server scenario... (Both servers are connected by VPN)

Regards
0
Comment
Question by:lnrivera
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3
  • 2
5 Comments
 
LVL 9

Expert Comment

by:jeremycrussell
ID: 33479810
To do transparent failover of MySQL, your best bet would be to institure an HA cluster of MySQL.  You're slaves act as your data redundancy, but do not provide true High Availability capabilities for the MySQL service.
0
 

Author Comment

by:lnrivera
ID: 33479878
The cluster is for MySQL or OS cluster?
0
 

Author Comment

by:lnrivera
ID: 33479900
I need to do it in Windows
0
 
LVL 9

Expert Comment

by:jeremycrussell
ID: 33479906
It would be an OS  based cluster.   What OS are you running?
0
 
LVL 9

Accepted Solution

by:
jeremycrussell earned 500 total points
ID: 33479950
If you have Windows Server and MSCS available, you can install a MySQL HA cluster using the generic service resource.  Not sure if this is something available to you or not though.  However, it would provide you with the automated failover you are looking for.

You can implement a failover scenario with you master/slave setup...  However, it would not be instantaneous and would require intervention (although it could be automated).  You would have to promote the slave to a master, etc.. etc..  A pretty touch undertaking compared to the alternative.
0

Featured Post

Ransomware: The New Cyber Threat & How to Stop It

This infographic explains ransomware, type of malware that blocks access to your files or your systems and holds them hostage until a ransom is paid. It also examines the different types of ransomware and explains what you can do to thwart this sinister online threat.  

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Popularity Can Be Measured Sometimes we deal with questions of popularity, and we need a way to collect opinions from our clients.  This article shows a simple teaching example of how we might elect a favorite color by letting our clients vote for …
When table data gets too large to manage or queries take too long to execute the solution is often to buy bigger hardware or assign more CPUs and memory resources to the machine to solve the problem. However, the best, cheapest and most effective so…
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…
A short tutorial showing how to set up an email signature in Outlook on the Web (previously known as OWA). For free email signatures designs, visit https://www.mail-signatures.com/articles/signature-templates/?sts=6651 If you want to manage em…

740 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question