install 5.5.16 from source

Posted on 2011-10-12
Last Modified: 2012-05-12
 there are many article in Google about how to install from source.

so i definitely not looking for any how to documents.

i am after some advise from people who has experience to install mysql from source in a very busy production environment

mainly this will be very busy mysql server 64 gb ram and it will be mainly innodb database .

i used to install with this flag

  ./configure --prefix=/usr/local/mysql --with-ssl --with-plugins=innobase

but is there any extra flag i need to mention to make it perfect for innodb databases ??

thanks for your advise ..

Question by:fosiul01
    LVL 24

    Expert Comment

    Think you should also add --enable-thread-safe-client (

    Alternatively, you might want to consider a different MySQL build that has enhanced version of InnoDB -

    On either option of course, the tuning after installation is the most critical.  See references below.

    References: (benchmarking MySQL vs Percona)
    LVL 6

    Expert Comment

    Install required dependencies to compile MySQL like
    $ yum install gcc gcc-c++ ncurses-devel
    $ cd mysql-5.1.45
    $ ./configure --prefix=/var/lib/mysql  --localstatedir=/var/lib/mysql/data --sysconfdir=/etc/mysql --with-mysqld-user=mysql --with-plugins=innobase,myisam --enable-thread-safe-client
    $ make
    $ make install

    and then change the permissions of mysql directory
    $ chown -R /var/lib/mysql:mysql mysql/

    LVL 29

    Author Comment

    hi its 5.6 , not 5.1

    i just installed 5.6  in test and production

    then installation is is quite differ from 5.1
    LVL 29

    Author Comment

    Sorry 5.5 , not 5.1
    LVL 6

    Accepted Solution

    LVL 29

    Author Comment

    i have already installed it

    anyway thanks for your help
    LVL 29

    Author Closing Comment

    i instaleld it before hand

    Write Comment

    Please enter a first name

    Please enter a last name

    We will never share this with anyone.

    Featured Post

    Why You Should Analyze Threat Actor TTPs

    After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

    Popularity Can Be Measured Sometimes we deal with questions of popularity, and we need a way to collect opinions from our clients.  This article shows a simple teaching example of how we might elect a favorite color by letting our clients vote for …
    Introduction Since I wrote the original article about Handling Date and Time in PHP and MySQL ( several years ago, it seemed like now was a good time to updat…
    Learn how to navigate the file tree with the shell. Use pwd to print the current working directory: Use ls to list a directory's contents: Use cd to change to a new directory: Use wildcards instead of typing out long directory names: Use ../ to move…
    Get a first impression of how PRTG looks and learn how it works.   This video is a short introduction to PRTG, as an initial overview or as a quick start for new PRTG users.

    760 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    15 Experts available now in Live!

    Get 1:1 Help Now