mirror of
				https://github.com/MariaDB/server.git
				synced 2025-11-04 12:56:14 +01:00 
			
		
		
		
	
		
			
				
	
	
		
			485 lines
		
	
	
	
		
			19 KiB
		
	
	
	
		
			Text
		
	
	
	
	
	
			
		
		
	
	
			485 lines
		
	
	
	
		
			19 KiB
		
	
	
	
		
			Text
		
	
	
	
	
	
Codership Oy
 | 
						|
http://www.codership.com
 | 
						|
<info@codership.com>
 | 
						|
 | 
						|
DISCLAIMER
 | 
						|
 | 
						|
THIS SOFTWARE PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER
 | 
						|
EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
 | 
						|
OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE.
 | 
						|
IN NO EVENT SHALL CODERSHIP OY BE HELD LIABLE TO ANY PARTY FOR ANY DAMAGES
 | 
						|
RESULTING DIRECTLY OR INDIRECTLY FROM THE USE OF THIS SOFTWARE.
 | 
						|
 | 
						|
Trademark Information.
 | 
						|
 | 
						|
MySQL is a trademark or registered trademark of Oracle and/or its affiliates.
 | 
						|
Other trademarks are the property of their respective owners.
 | 
						|
 | 
						|
Licensing Information.
 | 
						|
 | 
						|
Please see file COPYING that came with this distribution
 | 
						|
 | 
						|
Source code can be found at
 | 
						|
wsrep API:    https://launchpad.net/wsrep
 | 
						|
MySQL patch:  https://launchpad.net/codership-mysql
 | 
						|
 | 
						|
 | 
						|
ABOUT THIS DOCUMENT
 | 
						|
 | 
						|
This document covers installation and configuration issues specific to this
 | 
						|
wsrep-patched MySQL distribution by Codership. It does not cover the use or
 | 
						|
administration of MySQL server per se. The reader is assumed to know how to
 | 
						|
install, configure, administer and use standard MySQL server version 5.1.xx.
 | 
						|
 | 
						|
 | 
						|
                        MYSQL-5.5.x/wsrep-23.x
 | 
						|
 | 
						|
CONTENTS:
 | 
						|
=========
 | 
						|
1. WHAT IS WSREP PATCH FOR MYSQL
 | 
						|
2. INSTALLATION
 | 
						|
3. FIRST TIME SETUP
 | 
						|
   3.1 CONFIGURATION FILES
 | 
						|
   3.2 DATABASE PRIVILEGES
 | 
						|
   3.3 CHECK AND CORRECT FIREWALL SETTINGS
 | 
						|
   3.4 SELINUX
 | 
						|
   3.5 APPARMOR
 | 
						|
   3.6 CONNECT TO CLUSTER
 | 
						|
4. UPGRADING FROM MySQL 5.1.x
 | 
						|
5. CONFIGURATION OPTIONS
 | 
						|
   5.1 MANDATORY MYSQL OPTIONS
 | 
						|
   5.2 WSREP OPTIONS
 | 
						|
6. ONLINE SCHEMA UPGRADE
 | 
						|
   6.1 TOTAL ORDER ISOLATION (TOI)
 | 
						|
   6.2 ROLLING SCHEMA UPGRADE (RSU)
 | 
						|
7. LIMITATIONS
 | 
						|
 | 
						|
 | 
						|
1. WHAT IS WSREP PATCH FOR MYSQL/INNODB
 | 
						|
 | 
						|
Wsrep API developed by Codership Oy is a modern generic (database-agnostic)
 | 
						|
replication API for transactional databases with a goal to make database
 | 
						|
replication/logging subsystem completely modular and pluggable. It is developed
 | 
						|
with flexibility and completeness in mind to satisfy a broad range of modern
 | 
						|
replication scenarios. It is equally suitable for synchronous and asynchronous,
 | 
						|
master-slave and multi-master replication.
 | 
						|
 | 
						|
wsrep stands for Write Set REPlication.
 | 
						|
 | 
						|
Wsrep patch for MySQL/InnoDB allows MySQL server to load and use various wsrep
 | 
						|
API implementations ("wsrep providers") with different qualities of service.
 | 
						|
Without wsrep provider MySQL-wsrep server will function like a regular
 | 
						|
standalone server.
 | 
						|
 | 
						|
 | 
						|
2. INSTALLATION
 | 
						|
 | 
						|
In the examples below mysql authentication options are omitted for brevity.
 | 
						|
 | 
						|
2.1 Download and install mysql-wsrep package.
 | 
						|
 | 
						|
Download binary package for your Linux distribution from
 | 
						|
https://launchpad.net/codership-mysql/
 | 
						|
 | 
						|
2.1.1 On Debian and Debian-derived distributions.
 | 
						|
 | 
						|
Upgrade from mysql-server-5.0 to mysql-wsrep is not supported yet, please 
 | 
						|
upgrade to mysql-server-5.1 first.
 | 
						|
 | 
						|
If you're installing over an existing mysql installation, mysql-server-wsrep
 | 
						|
will conflict with the mysql-server-5.1 package, so remove it first:
 | 
						|
 | 
						|
$ sudo apt-get remove mysql-server-5.1 mysql-server-core-5.1
 | 
						|
 | 
						|
mysql-server-wsrep requires psmisc and mysql-client-5.1.47 (or later).
 | 
						|
MySQL 5.1 packages can be found from backports repositories.
 | 
						|
For further information about configuring and using Debian or Ubuntu
 | 
						|
backports, see:
 | 
						|
 | 
						|
* http://backports.debian.org
 | 
						|
 | 
						|
* https://help.ubuntu.com/community/UbuntuBackports
 | 
						|
 | 
						|
For example, installation of required packages on Debian Lenny:
 | 
						|
 | 
						|
$ sudo apt-get install psmisc
 | 
						|
$ sudo apt-get -t lenny-backports install mysql-client-5.1
 | 
						|
 | 
						|
Now you should be able to install the mysql-wsrep package:
 | 
						|
 | 
						|
$ sudo dpkg -i <mysql-server-wsrep DEB>
 | 
						|
 | 
						|
2.1.2 On CentOS and similar RPM-based distributions.
 | 
						|
 | 
						|
If you're migrating from existing MySQL installation, there are two variants:
 | 
						|
 | 
						|
  a) If you're already using official MySQL-server-community 5.1.x RPM from
 | 
						|
     Oracle:
 | 
						|
 | 
						|
     # rpm -e mysql-server
 | 
						|
 | 
						|
  b) If you're upgrading from the stock mysql-5.0.77 on CentOS:
 | 
						|
 | 
						|
     1) Make sure that the following packages are not installed:
 | 
						|
     # rpm --nodeps --allmatches -e mysql-server mysql-test mysql-bench
 | 
						|
 | 
						|
     2) Install *official* MySQL-shared-compat-5.1.x from
 | 
						|
        http://dev.mysql.com/downloads/mysql/5.1.html
 | 
						|
 | 
						|
Actual installation:
 | 
						|
 | 
						|
   # rpm -Uvh <MySQL-server-wsrep RPM>
 | 
						|
 | 
						|
   If this fails due to unsatisfied dependencies, install missing packages
 | 
						|
   (e.g. yum install perl-DBI) and retry.
 | 
						|
 | 
						|
Additional packages to consider (if not yet installed):
 | 
						|
   * galera (multi-master replication provider, https://launchpad.net/galera)
 | 
						|
   * MySQL-client-community (for connecting to server and mysqldump-based SST)
 | 
						|
   * rsync (for rsync-based SST)
 | 
						|
   * mariabackup and nc (for mariabackup-based SST)
 | 
						|
 | 
						|
2.2 Upgrade system tables.
 | 
						|
 | 
						|
If you're upgrading a previous MySQL installation, it might be advisable to
 | 
						|
upgrade system tables. To do that start mysqld and run mysql_upgrade command.
 | 
						|
Consult MySQL documentation in case of errors. Normally they are not critical
 | 
						|
and can be ignored unless specific functionality is needed.
 | 
						|
 | 
						|
 | 
						|
3. FIRST TIME SETUP
 | 
						|
 | 
						|
Unless you're upgrading an already installed mysql-wsrep package, you will need
 | 
						|
to set up a few things to prepare the server for operation.
 | 
						|
 | 
						|
3.1 CONFIGURATION FILES
 | 
						|
 | 
						|
* Make sure system-wide my.cnf does not bind mysqld to 127.0.0.1. That is, if
 | 
						|
  you have the following line in [mysqld] section, comment it out:
 | 
						|
 | 
						|
  #bind-address = 127.0.0.1
 | 
						|
 | 
						|
* Make sure system-wide my.cnf contains "!includedir /etc/mysql/conf.d/" line.
 | 
						|
 | 
						|
* Edit /etc/mysql/conf.d/wsrep.cnf and set wsrep_provider option by specifying
 | 
						|
  a path to the provider library. If you don't have a provider, leave it as it is.
 | 
						|
 | 
						|
* When a new node joins the cluster it'll have to receive a state snapshot from
 | 
						|
  one of the peers. This requires a privileged MySQL account with access from
 | 
						|
  the rest of the cluster. Edit /etc/mysql/conf.d/wsrep.cnf and set mysql
 | 
						|
  login/password pair for SST, for example:
 | 
						|
 | 
						|
  wsrep_sst_auth=wsrep_sst:wspass
 | 
						|
 | 
						|
* See CONFIGURATION section below about other configuration parameters that you
 | 
						|
  might want to change at this point.
 | 
						|
 | 
						|
3.2 DATABASE PRIVILEGES
 | 
						|
 | 
						|
Restart MySQL server and connect to it as root to grant privileges to SST
 | 
						|
account (empty users confuse MySQL authentication matching rules, we need to
 | 
						|
delete them too):
 | 
						|
 | 
						|
$ mysql -e "SET wsrep_on=OFF; DELETE FROM mysql.user WHERE user='';"
 | 
						|
$ mysql -e "SET wsrep_on=OFF; GRANT ALL ON *.* TO wsrep_sst@'%' IDENTIFIED BY 'wspass'";
 | 
						|
 | 
						|
3.3 CHECK AND CORRECT FIREWALL SETTINGS.
 | 
						|
 | 
						|
MySQL-wsrep server needs to be accessible from other cluster members through
 | 
						|
its client listening socket and through wsrep provider socket. See your
 | 
						|
distribution and wsrep provider documentation for details. For example on
 | 
						|
CentOS you might need to do something along these lines:
 | 
						|
 | 
						|
# iptables --insert RH-Firewall-1-INPUT 1 --proto tcp --source <my IP>/24 --destination <my IP>/32 --dport 3306 -j ACCEPT
 | 
						|
# iptables --insert RH-Firewall-1-INPUT 1 --proto tcp --source <my IP>/24 --destination <my IP>/32 --dport 4567 -j ACCEPT
 | 
						|
 | 
						|
If there is a NAT firewall between the nodes, it must be configured to allow
 | 
						|
direct connections between the nodes (e.g. via port forwarding).
 | 
						|
 | 
						|
3.4 SELINUX
 | 
						|
 | 
						|
If you have SELinux enabled, it may block mysqld from doing required operations.
 | 
						|
You'll need to either disable it or configure to allow mysqld to run external
 | 
						|
programs and open listen sockets at unprivileged ports (i.e. things that
 | 
						|
an unprivileged user can do). See SELinux documentation about it.
 | 
						|
 | 
						|
To quickly disable SELinux:
 | 
						|
1) run 'setenforce 0' as root.
 | 
						|
2) set 'SELINUX=permissive' in  /etc/selinux/config
 | 
						|
 | 
						|
3.5 APPARMOR
 | 
						|
 | 
						|
AppArmor automatically comes with Ubuntu and may also prevent mysqld to from
 | 
						|
opening additional ports or run scripts. See AppArmor documentation about its
 | 
						|
configuration. To disable AppArmor for mysqld:
 | 
						|
 | 
						|
$ cd /etc/apparmor.d/disable/
 | 
						|
$ sudo ln -s /etc/apparmor.d/usr.sbin.mysqld
 | 
						|
$ sudo service apparmor restart
 | 
						|
 | 
						|
 | 
						|
3.6 CONNECT TO CLUSTER
 | 
						|
 | 
						|
Now you're ready to connect to cluster by setting wsrep_cluster_address variable
 | 
						|
and monitor status of wsrep provider:
 | 
						|
 | 
						|
mysql> SET GLOBAL wsrep_cluster_address='<cluster address string>';
 | 
						|
mysql> SHOW STATUS LIKE 'wsrep%';
 | 
						|
 | 
						|
 | 
						|
4 UPGRADING FROM MySQL 5.1.x
 | 
						|
 | 
						|
!!! THESE INSTRUCTIONS ARE PRELIMINARY AND INCOMPLETE !!!
 | 
						|
 | 
						|
1) BEFORE UPGRADE (while running 5.1.x):
 | 
						|
   - comment out 'wsrep_provider' setting from configuration files
 | 
						|
     (my.cnf and/or wsrep.cnf)
 | 
						|
   - If performing a rolling upgrade on a running cluster, set
 | 
						|
     wsrep_sst_method=mysqldump.
 | 
						|
     You might also need to configure wsrep_sst_receive_address and
 | 
						|
     wsrep_sst_auth appropriately. mysqldump is the only way to transfer data
 | 
						|
     from 5.1.x to 5.5.x reliably.
 | 
						|
   - remove innodb_plugin settings from configuration files.
 | 
						|
 | 
						|
2) Perform upgrade as usual:
 | 
						|
   http://dev.mysql.com/doc/refman/5.5/en/upgrading-from-previous-series.html
 | 
						|
   Don't forget to run 'mysql_upgrade' command.
 | 
						|
 | 
						|
3) AFTER UPGRADING individual node:
 | 
						|
   - uncomment 'wsrep_provider' line in configuration file.
 | 
						|
   - restart the server and join the cluster.
 | 
						|
 | 
						|
4) AFTER UPGRADING the whole cluster:
 | 
						|
   - revert to usual wsrep SST settings if not 'mysqldump'.
 | 
						|
 | 
						|
 | 
						|
5. CONFIGURATION OPTIONS
 | 
						|
 | 
						|
5.1 MANDATORY MYSQL OPTIONS
 | 
						|
 | 
						|
binlog_format=ROW
 | 
						|
   This option is required to use row-level replication as opposed to
 | 
						|
   statement-level. For performance and consistency considerations don't change
 | 
						|
   that. As a side effect, binlog, if turned on, can be ROW only. In future this
 | 
						|
   option won't have special meaning.
 | 
						|
 | 
						|
innodb_autoinc_lock_mode=2
 | 
						|
   This is a required parameter. Without it INSERTs into tables with
 | 
						|
   AUTO_INCREMENT column may fail.
 | 
						|
   autoinc lock modes 0 and 1 can cause unresolved deadlock, and make
 | 
						|
   the system unresponsive.
 | 
						|
 | 
						|
5.2 WSREP OPTIONS
 | 
						|
 | 
						|
All options are optional except for wsrep_provider, wsrep_cluster_address, and
 | 
						|
wsrep_sst_auth.
 | 
						|
 | 
						|
wsrep_provider=none
 | 
						|
   A full path to the library that implements WSREP interface. If none is
 | 
						|
   specified, the server behaves like a regular mysqld.
 | 
						|
 | 
						|
wsrep_provider_options=
 | 
						|
   Provider-specific option string. Check wsrep provider documentation or
 | 
						|
   http://www.codership.com/wiki
 | 
						|
 | 
						|
wsrep_cluster_address=
 | 
						|
   Provider-specific cluster address string. This is used to connect a node to
 | 
						|
   the desired cluster. This option can be given either on mysqld startup or set
 | 
						|
   during runtime. See wsrep provider documentation for possible values.
 | 
						|
 | 
						|
wsrep_cluster_name="my_wsrep_cluster"
 | 
						|
   Logical cluster name, must be the same for all nodes of the cluster.
 | 
						|
 | 
						|
wsrep_node_address=
 | 
						|
   An option to explicitly specify the network address of the node in the form
 | 
						|
   <address>[:port] if autoguessing for some reason does not produce desirable
 | 
						|
   results (multiple network interfaces, NAT, etc.)
 | 
						|
   If not explicitly overridden by wsrep_sst_receive_address, the <address> part
 | 
						|
   will be used to listen for SST (see below). And the whole <address>[:port]
 | 
						|
   will be passed to the wsrep provider to be used as a base address in its
 | 
						|
   communications.
 | 
						|
 | 
						|
wsrep_node_name=
 | 
						|
   Human readable node name (for easier log reading only). Defaults to hostname.
 | 
						|
 | 
						|
wsrep_slave_threads=1
 | 
						|
   The number of threads dedicated to the processing of writesets from other nodes.
 | 
						|
   For best performance should be few per CPU core.
 | 
						|
 | 
						|
wsrep_dbug_option
 | 
						|
   Options for the built-in DBUG library (independent from what MySQL uses).
 | 
						|
   Empty by default. Not currently in use.
 | 
						|
 | 
						|
wsrep_debug=0
 | 
						|
   Enable debug-level logging.
 | 
						|
 | 
						|
wsrep_convert_LOCK_to_trx=0
 | 
						|
   Implicitly convert locking sessions into transactions inside mysqld. By
 | 
						|
   itself it does not mean support for locking sessions, but it prevents the
 | 
						|
   database from going into logically inconsistent state. Note however, that
 | 
						|
   loading large database dump with LOCK statements might result in abnormally
 | 
						|
   large transactions and cause an out-of-memory condition
 | 
						|
 | 
						|
wsrep_retry_autocommit=1
 | 
						|
   Retry autocommit queries and single statement transactions should they fail
 | 
						|
   certification test. This is analogous to rescheduling an autocommit query
 | 
						|
   should it go into a deadlock with other transactions in the database lock
 | 
						|
   manager.
 | 
						|
 | 
						|
wsrep_auto_increment_control=1
 | 
						|
   Automatically adjust auto_increment_increment and auto_increment_offset
 | 
						|
   variables based on the number of nodes in the cluster. Significantly reduces
 | 
						|
   certification conflict rate for INSERTS.
 | 
						|
 | 
						|
wsrep_drupal_282555_workaround=1
 | 
						|
   MySQL seems to have an obscure bug when INSERT into table with
 | 
						|
   AUTO_INCREMENT column with NULL value for that column can fail with a 
 | 
						|
   duplicate key error. When this option is on, it retries such INSERTs.
 | 
						|
   Required for stable Drupal operation. Documented at:
 | 
						|
      http://bugs.mysql.com/bug.php?id=41984
 | 
						|
      http://drupal.org/node/282555
 | 
						|
 | 
						|
wsrep_causal_reads=0
 | 
						|
   Enforce strict READ COMMITTED semantics on reads and transactions. May
 | 
						|
   result in additional latencies. It is a session variable.
 | 
						|
 | 
						|
wsrep_OSU_method=TOI
 | 
						|
   Online Schema Upgrade (OSU) can be performed with two alternative  methods:
 | 
						|
   Total Order Isolation (TOI) runs DDL statement in all cluster nodes in
 | 
						|
   same total order sequence locking the affected table for the duration of the
 | 
						|
   operation. This may result in the whole cluster being blocked for the
 | 
						|
   duration of the operation.
 | 
						|
   Rolling Schema Upgrade (RSU) executes the DDL statement only locally, thus
 | 
						|
   blocking only one cluster node. During the DDL processing, the node
 | 
						|
   is not replicating and may be unable to process replication events (due to
 | 
						|
   table lock). Once DDL operation is complete, the node will catch up and sync
 | 
						|
   with the cluster to become fully operational again. The DDL statement or
 | 
						|
   its effects are not replicated, so it is the user's responsibility to manually
 | 
						|
   perform this operation on each of the nodes.
 | 
						|
 | 
						|
wsrep_forced_binlog_format=none
 | 
						|
   Force every transaction to use given binlog format. When this variable is 
 | 
						|
   set to something else than NONE, all transactions will use the given forced
 | 
						|
   format, regardless of what the client session has specified in binlog_format.
 | 
						|
   Valid choices for wsrep_forced_binlog_format are: ROW, STATEMENT, MIXED and
 | 
						|
   special value NONE, meaning that there is no forced binlog format in effect.
 | 
						|
   This variable was introduced to support STATEMENT format replication during
 | 
						|
   rolling schema upgrade processing. However, in most cases ROW replication 
 | 
						|
   is valid for asymmetric schema replication.
 | 
						|
 | 
						|
State snapshot transfer options.
 | 
						|
 | 
						|
When a new node joins the cluster it has to synchronize its initial state with
 | 
						|
the other cluster members by transferring state snapshot from one of them.
 | 
						|
The options below govern how this happens and should be set up before attempting
 | 
						|
to join or start a cluster.
 | 
						|
 | 
						|
wsrep_sst_method=rsync
 | 
						|
   What method to use to copy database state to a newly joined node. Supported
 | 
						|
   methods:
 | 
						|
   - mysqldump:   slow (except for small datasets) but allows for upgrade
 | 
						|
                  between major MySQL versions or InnoDB features.
 | 
						|
   - rsync:       much faster on large datasets (default).
 | 
						|
   - rsync_wan:   same as rsync but with deltaxfer to minimize network traffic.
 | 
						|
   - mariabackup: very fast and practically non-blocking SST method based on
 | 
						|
                  mariabackup tool (enhanced version of Percona's xtrabackup).
 | 
						|
 | 
						|
   (for mariabackup to work the following settings must be present in my.cnf
 | 
						|
    on all nodes:
 | 
						|
      [mysqld]
 | 
						|
      wsrep_sst_auth=root:<root password>
 | 
						|
      datadir=<path to data dir>
 | 
						|
      [client]
 | 
						|
      socket=<path to socket>
 | 
						|
   )
 | 
						|
 | 
						|
wsrep_sst_receive_address=
 | 
						|
   Address (hostname:port) at which this node wants to receive state snapshot.
 | 
						|
   Defaults to mysqld bind address, and if that is not specified (0.0.0.0) -
 | 
						|
   to the first IP of eth0 + mysqld bind port.
 | 
						|
   NOTE: check that your firewall allows connections to this address from other
 | 
						|
         cluster nodes.
 | 
						|
 | 
						|
wsrep_sst_auth=
 | 
						|
   Authentication information needed for state transfer. Depends on the state
 | 
						|
   transfer method. For mysqldump-based SST it is
 | 
						|
   <mysql_root_user>:<mysql_root_password>
 | 
						|
   and should be the same on all nodes - it is used to authenticate with both
 | 
						|
   state snapshot receiver and state snapshot donor.
 | 
						|
 | 
						|
wsrep_sst_donor=
 | 
						|
   A name of the node which should serve as state snapshot donor. This allows
 | 
						|
   controlling which node will serve the state snapshot request. By default the
 | 
						|
   most suitable node is chosen by the wsrep provider. This is the same as given in
 | 
						|
   wsrep_node_name.
 | 
						|
 | 
						|
 | 
						|
6. ONLINE SCHEMA UPGRADE
 | 
						|
 | 
						|
   Schema upgrades mean any data definition statements (DDL statements) run
 | 
						|
   for the database. They change the database structure and are non-
 | 
						|
   transactional.
 | 
						|
 | 
						|
   Release 22.3 brings a new method for performing schema upgrades. A user can
 | 
						|
   now choose whether to use the traditional total order isolation or new
 | 
						|
   rolling schema upgrade method. The OSU method choice is done by global
 | 
						|
   parameter: 'wsrep_OSU_method'.
 | 
						|
 | 
						|
6.1 Total Order Isolation (TOI)
 | 
						|
 | 
						|
   With earlier releases, DDL processing happened always by Total Order
 | 
						|
   Isolation (TOI) method. With TOI, the DDL was scheduled to be processed in
 | 
						|
   same transaction sequencing 'slot' in each cluster node.
 | 
						|
   The processing is secured by locking the affected table from any other use.
 | 
						|
   With TOI method, the whole cluster has part of the database locked for the
 | 
						|
   duration of the DDL processing.
 | 
						|
 | 
						|
6.2 Rolling Schema Upgrade (RSU)
 | 
						|
 | 
						|
   Rolling schema upgrade is a new DDL processing method, where DDL will be
 | 
						|
   processed locally for the node. The node is disconnected of the replication
 | 
						|
   for the duration of the DDL processing, so that there is only DDL statement
 | 
						|
   processing in the node and it does not block the rest of the cluster. When
 | 
						|
   the DDL processing is complete, the node applies delayed replication events
 | 
						|
   and synchronizes back with the cluster.
 | 
						|
   The DDL can then be executed cluster-wide by running the same DDL statement
 | 
						|
   for each node in turn. When this rolling schema upgrade proceeds, part of
 | 
						|
   the cluster will have old schema structure and part of the cluster will have
 | 
						|
   new schema structure.
 | 
						|
 | 
						|
 | 
						|
7. LIMITATIONS
 | 
						|
 | 
						|
1) Currently replication works only with InnoDB storage engine. Any writes to 
 | 
						|
   tables of other types, including system (mysql.*) tables are not replicated. 
 | 
						|
   However, DDL statements are replicated in statement level, and changes
 | 
						|
   to mysql.* tables will get replicated that way.
 | 
						|
   So, you can safely issue: CREATE USER...,
 | 
						|
   but issuing: INSERT INTO mysql.user..., will not be replicated.
 | 
						|
 | 
						|
2) DELETE operation is unsupported on tables without primary key. Also rows in
 | 
						|
   tables without primary key may appear in different order on different nodes.
 | 
						|
   As a result SELECT...LIMIT... may return slightly different sets.
 | 
						|
 | 
						|
3) Unsupported queries:
 | 
						|
    * LOCK/UNLOCK TABLES cannot be supported in multi-master setups.
 | 
						|
    * lock functions (GET_LOCK(), RELEASE_LOCK()... )
 | 
						|
 | 
						|
4) Query log cannot be directed to a table. If you enable query logging,
 | 
						|
   you must forward the log to a file:
 | 
						|
       log_output = FILE
 | 
						|
   Use general_log and general_log_file to choose query logging and the 
 | 
						|
   log file name
 | 
						|
 | 
						|
5) Maximum allowed transaction size is defined by wsrep_max_ws_rows and
 | 
						|
   wsrep_max_ws_size. Anything bigger (e.g. huge LOAD DATA) will be rejected.
 | 
						|
 | 
						|
6) Due to cluster level optimistic concurrency control, transaction issuing
 | 
						|
   COMMIT may still be aborted at that stage. There can be two transactions.
 | 
						|
   writing to same rows and committing in separate cluster nodes, and only one
 | 
						|
   of them can successfully commit. The failing one will be aborted.
 | 
						|
   For cluster level aborts, MySQL/galera cluster gives back deadlock error.
 | 
						|
   code (Error: 1213 SQLSTATE: 40001  (ER_LOCK_DEADLOCK)).
 | 
						|
 | 
						|
7) XA transactions can not be supported due to possible rollback on commit.
 | 
						|
 |