How calculate Mysql Trafiq

Posted on 2011-10-07
Last Modified: 2012-08-14
I have setup Cacti graph which is showing mysql trafiq

but what i want to know is

is there any variables in mysql which shows the incoming traifq and out going trafiq ???

example : "Connection" will show how many connection is my the server

so i am woundering how the script actually calculating the Incomming trafiq and outgoing trafiq from mysql server .

Thanks for advise
Question by:fosiul01
    LVL 24

    Accepted Solution


    LVL 29

    Author Comment

    hi thank

    but how will you know.. how much data is comming into mysql server
    and going out from mysql server ??

    is this by

    Bytes_received           | 155372598  |
    | Bytes_sent               | 1176560426 |

    that value what that value ?? K or B??
    LVL 29

    Author Comment

    i think its sayin Bytes its saying Bytes Received

    but that value ..

    whats that value ??

    Bytes receives : it could be insert into database

    but what bytes_set ??
    LVL 29

    Author Comment

    also that value

    per second ??

    according to mysql documentaiton is saying


    The number of bytes received from all clients. This variable was added in MySQL 3.23.7.

    but this number is per second ?? or per minutes?? whats the interval ??
    LVL 24

    Expert Comment

    Guess those are totals since the counters were reset.  Suggest you take a peek at the code of cacti to check what commands it actually sends to MySQL.
    LVL 59

    Assisted Solution

    by:Kevin Cross
    I agree. My understanding was always that this number was reset every time your restarted MySQL server. The received is 0.15gb and the sent 1.1gb, which would make sense on a system doing more SELECT queries than INSERT or UPDATE. Remember this is for all clients. You get for SESSION if you want to just see current client.

    Write Comment

    Please enter a first name

    Please enter a last name

    We will never share this with anyone.

    Featured Post

    Top 6 Sources for Identifying Threat Actor TTPs

    Understanding your enemy is essential. These six sources will help you identify the most popular threat actor tactics, techniques, and procedures (TTPs).

    It’s 2016. Password authentication should be dead — or at least close to dying. But, unfortunately, it has not traversed Quagga stage yet. Using password authentication is like laundering hotel guest linens with a washboard — it’s Passé.
    Load balancing is the method of dividing the total amount of work performed by one computer between two or more computers. Its aim is to get more work done in the same amount of time, ensuring that all the users get served faster.
    Learn how to get help with Linux/Unix bash shell commands. Use help to read help documents for built in bash shell commands.: Use man to interface with the online reference manuals for shell commands.: Use man to search man pages for unknown command…
    Get a first impression of how PRTG looks and learn how it works.   This video is a short introduction to PRTG, as an initial overview or as a quick start for new PRTG users.

    759 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    7 Experts available now in Live!

    Get 1:1 Help Now