.\" Automatically generated by Pod::Man 2.25 (Pod::Simple 3.16) .\" .\" Standard preamble: .\" ======================================================================== .de Sp \" Vertical space (when we can't use .PP) .if t .sp .5v .if n .sp .. .de Vb \" Begin verbatim text .ft CW .nf .ne \\$1 .. .de Ve \" End verbatim text .ft R .fi .. .\" Set up some character translations and predefined strings. \*(-- will .\" give an unbreakable dash, \*(PI will give pi, \*(L" will give a left .\" double quote, and \*(R" will give a right double quote. \*(C+ will .\" give a nicer C++. Capital omega is used to do unbreakable dashes and .\" therefore won't be available. \*(C` and \*(C' expand to `' in nroff, .\" nothing in troff, for use with C<>. .tr \(*W- .ds C+ C\v'-.1v'\h'-1p'\s-2+\h'-1p'+\s0\v'.1v'\h'-1p' .ie n \{\ . ds -- \(*W- . ds PI pi . if (\n(.H=4u)&(1m=24u) .ds -- \(*W\h'-12u'\(*W\h'-12u'-\" diablo 10 pitch . if (\n(.H=4u)&(1m=20u) .ds -- \(*W\h'-12u'\(*W\h'-8u'-\" diablo 12 pitch . ds L" "" . ds R" "" . ds C` "" . ds C' "" 'br\} .el\{\ . ds -- \|\(em\| . ds PI \(*p . ds L" `` . ds R" '' 'br\} .\" .\" Escape single quotes in literal strings from groff's Unicode transform. .ie \n(.g .ds Aq \(aq .el .ds Aq ' .\" .\" If the F register is turned on, we'll generate index entries on stderr for .\" titles (.TH), headers (.SH), subsections (.SS), items (.Ip), and index .\" entries marked with X<> in POD. Of course, you'll have to process the .\" output yourself in some meaningful fashion. .ie \nF \{\ . de IX . tm Index:\\$1\t\\n%\t"\\$2" .. . nr % 0 . rr F .\} .el \{\ . de IX .. .\} .\" .\" Accent mark definitions (@(#)ms.acc 1.5 88/02/08 SMI; from UCB 4.2). .\" Fear. Run. Save yourself. No user-serviceable parts. . \" fudge factors for nroff and troff .if n \{\ . ds #H 0 . ds #V .8m . ds #F .3m . ds #[ \f1 . ds #] \fP .\} .if t \{\ . ds #H ((1u-(\\\\n(.fu%2u))*.13m) . ds #V .6m . ds #F 0 . ds #[ \& . ds #] \& .\} . \" simple accents for nroff and troff .if n \{\ . ds ' \& . ds ` \& . ds ^ \& . ds , \& . ds ~ ~ . ds / .\} .if t \{\ . ds ' \\k:\h'-(\\n(.wu*8/10-\*(#H)'\'\h"|\\n:u" . ds ` \\k:\h'-(\\n(.wu*8/10-\*(#H)'\`\h'|\\n:u' . ds ^ \\k:\h'-(\\n(.wu*10/11-\*(#H)'^\h'|\\n:u' . ds , \\k:\h'-(\\n(.wu*8/10)',\h'|\\n:u' . ds ~ \\k:\h'-(\\n(.wu-\*(#H-.1m)'~\h'|\\n:u' . ds / \\k:\h'-(\\n(.wu*8/10-\*(#H)'\z\(sl\h'|\\n:u' .\} . \" troff and (daisy-wheel) nroff accents .ds : \\k:\h'-(\\n(.wu*8/10-\*(#H+.1m+\*(#F)'\v'-\*(#V'\z.\h'.2m+\*(#F'.\h'|\\n:u'\v'\*(#V' .ds 8 \h'\*(#H'\(*b\h'-\*(#H' .ds o \\k:\h'-(\\n(.wu+\w'\(de'u-\*(#H)/2u'\v'-.3n'\*(#[\z\(de\v'.3n'\h'|\\n:u'\*(#] .ds d- \h'\*(#H'\(pd\h'-\w'~'u'\v'-.25m'\f2\(hy\fP\v'.25m'\h'-\*(#H' .ds D- D\\k:\h'-\w'D'u'\v'-.11m'\z\(hy\v'.11m'\h'|\\n:u' .ds th \*(#[\v'.3m'\s+1I\s-1\v'-.3m'\h'-(\w'I'u*2/3)'\s-1o\s+1\*(#] .ds Th \*(#[\s+2I\s-2\h'-\w'I'u*3/5'\v'-.3m'o\v'.3m'\*(#] .ds ae a\h'-(\w'a'u*4/10)'e .ds Ae A\h'-(\w'A'u*4/10)'E . \" corrections for vroff .if v .ds ~ \\k:\h'-(\\n(.wu*9/10-\*(#H)'\s-2\u~\d\s+2\h'|\\n:u' .if v .ds ^ \\k:\h'-(\\n(.wu*10/11-\*(#H)'\v'-.4m'^\v'.4m'\h'|\\n:u' . \" for low resolution devices (crt and lpr) .if \n(.H>23 .if \n(.V>19 \ \{\ . ds : e . ds 8 ss . ds o a . ds d- d\h'-1'\(ga . ds D- D\h'-1'\(hy . ds th \o'bp' . ds Th \o'LP' . ds ae ae . ds Ae AE .\} .rm #[ #] #H #V #F C .\" ======================================================================== .\" .IX Title "PT-ONLINE-SCHEMA-CHANGE 1p" .TH PT-ONLINE-SCHEMA-CHANGE 1p "2012-06-15" "perl v5.14.2" "User Contributed Perl Documentation" .\" For nroff, turn off justification. Always turn off hyphenation; it makes .\" way too many mistakes in technical documents. .if n .ad l .nh .SH "NAME" pt\-online\-schema\-change \- ALTER tables without locking them. .SH "SYNOPSIS" .IX Header "SYNOPSIS" Usage: pt-online-schema-change [\s-1OPTIONS\s0] \s-1DSN\s0 .PP pt-online-schema-change alters a table's structure without blocking reads or writes. Specify the database and table in the \s-1DSN\s0. Do not use this tool before reading its documentation and checking your backups carefully. .PP Add a column to sakila.actor: .PP .Vb 1 \& pt\-online\-schema\-change \-\-alter "ADD COLUMN c1 INT" D=sakila,t=actor .Ve .PP Change sakila.actor to InnoDB, effectively performing \s-1OPTIMIZE\s0 \s-1TABLE\s0 in a non-blocking fashion because it is already an InnoDB table: .PP .Vb 1 \& pt\-online\-schema\-change \-\-alter "ENGINE=InnoDB" D=sakila,t=actor .Ve .SH "RISKS" .IX Header "RISKS" The following section is included to inform users about the potential risks, whether known or unknown, of using this tool. The two main categories of risks are those created by the nature of the tool (e.g. read-only tools vs. read-write tools) and those created by bugs. .PP pt-online-schema-change modifies data and structures. You should be careful with it, and test it before using it in production. You should also ensure that you have recoverable backups before using this tool. .PP At the time of this release, we know of no bugs that could cause harm to users. .PP The authoritative source for updated information is always the online issue tracking system. Issues that affect this tool will be marked as such. You can see a list of such issues at the following \s-1URL:\s0 http://www.percona.com/bugs/pt\-online\-schema\-change . .PP See also \*(L"\s-1BUGS\s0\*(R" for more information on filing bugs and getting help. .SH "DESCRIPTION" .IX Header "DESCRIPTION" pt-online-schema-change emulates the way that MySQL alters tables internally, but it works on a copy of the table you wish to alter. This means that the original table is not locked, and clients may continue to read and change data in it. .PP pt-online-schema-change works by creating an empty copy of the table to alter, modifying it as desired, and then copying rows from the original table into the new table. When the copy is complete, it moves away the original table and replaces it with the new one. By default, it also drops the original table. .PP The data copy process is performed in small chunks of data, which are varied to attempt to make them execute in a specific amount of time (see \&\*(L"\-\-chunk\-time\*(R"). This process is very similar to how other tools, such as pt-table-checksum, work. Any modifications to data in the original tables during the copy will be reflected in the new table, because the tool creates triggers on the original table to update the corresponding rows in the new table. The use of triggers means that the tool will not work if any triggers are already defined on the table. .PP When the tool finishes copying data into the new table, it uses an atomic \&\f(CW\*(C`RENAME TABLE\*(C'\fR operation to simultaneously rename the original and new tables. After this is complete, the tool drops the original table. .PP Foreign keys complicate the tool's operation and introduce additional risk. The technique of atomically renaming the original and new tables does not work when foreign keys refer to the table. The tool must update foreign keys to refer to the new table after the schema change is complete. The tool supports two methods for accomplishing this. You can read more about this in the documentation for \&\*(L"\-\-alter\-foreign\-keys\-method\*(R". .PP Foreign keys also cause some side effects. The final table will have the same foreign keys and indexes as the original table (unless you specify differently in your \s-1ALTER\s0 statement), but the names of the objects may be changed slightly to avoid object name collisions in MySQL and InnoDB. .PP For safety, the tool does not modify the table unless you specify the \&\*(L"\-\-execute\*(R" option, which is not enabled by default. The tool supports a variety of other measures to prevent unwanted load or other problems, including automatically detecting replicas, connecting to them, and using the following safety checks: .IP "\(bu" 4 The tool refuses to operate if it detects replication filters. See \&\*(L"\-\-[no]check\-replication\-filters\*(R" for details. .IP "\(bu" 4 The tool pauses the data copy operation if it observes any replicas that are delayed in replication. See \*(L"\-\-max\-lag\*(R" for details. .IP "\(bu" 4 The tool pauses or aborts its operation if it detects too much load on the server. See \*(L"\-\-max\-load\*(R" and \*(L"\-\-critical\-load\*(R" for details. .IP "\(bu" 4 The tool sets its lock wait timeout to 1 second so that it is more likely to be the victim of any lock contention, and less likely to disrupt other transactions. See \*(L"\-\-lock\-wait\-timeout\*(R" for details. .IP "\(bu" 4 The tool refuses to alter the table if foreign key constraints reference it, unless you specify \*(L"\-\-alter\-foreign\-keys\-method\*(R". .SH "OUTPUT" .IX Header "OUTPUT" The tool prints information about its activities to \s-1STDOUT\s0 so that you can see what it is doing. During the data copy phase, it prints progress reports to \&\s-1STDERR\s0. You can get additional information with the \*(L"\-\-print\*(R" option. .SH "OPTIONS" .IX Header "OPTIONS" \&\*(L"\-\-dry\-run\*(R" and \*(L"\-\-execute\*(R" are mutually exclusive. .PP This tool accepts additional command-line arguments. Refer to the \&\*(L"\s-1SYNOPSIS\s0\*(R" and usage information for details. .IP "\-\-alter" 4 .IX Item "--alter" type: string .Sp The schema modification, without the \s-1ALTER\s0 \s-1TABLE\s0 keywords. You can perform multiple modifications to the table by specifying them with commas. Please refer to the MySQL manual for the syntax of \s-1ALTER\s0 \s-1TABLE\s0. .Sp The following limitations apply which, if attempted, will cause the tool to fail in unpredictable ways: .RS 4 .IP "\(bu" 4 The \f(CW\*(C`RENAME\*(C'\fR clause cannot be used to rename the table. .IP "\(bu" 4 Columns cannot be renamed by dropping and re-adding with the new name. The tool will not copy the original column's data to the new column. .RE .RS 4 .RE .IP "\-\-alter\-foreign\-keys\-method" 4 .IX Item "--alter-foreign-keys-method" type: string .Sp How to modify foreign keys so they reference the new table. Foreign keys that reference the table to be altered must be treated specially to ensure that they continue to reference the correct table. When the tool renames the original table to let the new one take its place, the foreign keys \*(L"follow\*(R" the renamed table, and must be changed to reference the new table instead. .Sp The tool supports two techniques to achieve this. It automatically finds \*(L"child tables\*(R" that reference the table to be altered. .RS 4 .IP "auto" 4 .IX Item "auto" Automatically determine which method is best. The tool uses \&\f(CW\*(C`rebuild_constraints\*(C'\fR if possible (see the description of that method for details), and if not, then it uses \f(CW\*(C`drop_swap\*(C'\fR. .IP "rebuild_constraints" 4 .IX Item "rebuild_constraints" This method uses \f(CW\*(C`ALTER TABLE\*(C'\fR to drop and re-add foreign key constraints that reference the new table. This is the preferred technique, unless one or more of the \*(L"child\*(R" tables is so large that the \f(CW\*(C`ALTER\*(C'\fR would take too long. The tool determines that by comparing the number of rows in the child table to the rate at which the tool is able to copy rows from the old table to the new table. If the tool estimates that the child table can be altered in less time than the \&\*(L"\-\-chunk\-time\*(R", then it will use this technique. For purposes of estimating the time required to alter the child table, the tool multiplies the row-copying rate by \*(L"\-\-chunk\-size\-limit\*(R", because MySQL's \f(CW\*(C`ALTER TABLE\*(C'\fR is typically much faster than the external process of copying rows. .Sp Due to a limitation in MySQL, foreign keys will not have the same names after the \s-1ALTER\s0 that they did prior to it. The tool has to rename the foreign key when it redefines it, which adds a leading underscore to the name. In some cases, MySQL also automatically renames indexes required for the foreign key. .IP "drop_swap" 4 .IX Item "drop_swap" Disable foreign key checks (FOREIGN_KEY_CHECKS=0), then drop the original table before renaming the new table into its place. This is different from the normal method of swapping the old and new table, which uses an atomic \f(CW\*(C`RENAME\*(C'\fR that is undetectable to client applications. .Sp This method is faster and does not block, but it is riskier for two reasons. First, for a short time between dropping the original table and renaming the temporary table, the table to be altered simply does not exist, and queries against it will result in an error. Secondly, if there is an error and the new table cannot be renamed into the place of the old one, then it is too late to abort, because the old table is gone permanently. .Sp This method forces \f(CW\*(C`\-\-no\-swap\-tables\*(C'\fR and \f(CW\*(C`\-\-no\-drop\-old\-table\*(C'\fR. .IP "none" 4 .IX Item "none" This method is like \f(CW\*(C`drop_swap\*(C'\fR without the \*(L"swap\*(R". Any foreign keys that referenced the original table will now reference a nonexistent table. This will typically cause foreign key violations that are visible in \f(CW\*(C`SHOW ENGINE INNODB STATUS\*(C'\fR, similar to the following: .Sp .Vb 6 \& Trying to add to index \`idx_fk_staff_id\` tuple: \& DATA TUPLE: 2 fields; \& 0: len 1; hex 05; asc ;; \& 1: len 4; hex 80000001; asc ;; \& But the parent table \`sakila\`.\`staff_old\` \& or its .ibd file does not currently exist! .Ve .Sp This is because the original table (in this case, sakila.staff) was renamed to sakila.staff_old and then dropped. This method of handling foreign key constraints is provided so that the database administrator can disable the tool's built-in functionality if desired. .RE .RS 4 .RE .IP "\-\-ask\-pass" 4 .IX Item "--ask-pass" Prompt for a password when connecting to MySQL. .IP "\-\-charset" 4 .IX Item "--charset" short form: \-A; type: string .Sp Default character set. If the value is utf8, sets Perl's binmode on \&\s-1STDOUT\s0 to utf8, passes the mysql_enable_utf8 option to DBD::mysql, and runs \s-1SET\s0 \&\s-1NAMES\s0 \s-1UTF8\s0 after connecting to MySQL. Any other value sets binmode on \s-1STDOUT\s0 without the utf8 layer, and runs \s-1SET\s0 \s-1NAMES\s0 after connecting to MySQL. .IP "\-\-check\-interval" 4 .IX Item "--check-interval" type: time; default: 1 .Sp Sleep time between checks for \*(L"\-\-max\-lag\*(R". .IP "\-\-[no]check\-plan" 4 .IX Item "--[no]check-plan" default: yes .Sp Check query execution plans for safety. By default, this option causes the tool to run \s-1EXPLAIN\s0 before running queries that are meant to access a small amount of data, but which could access many rows if MySQL chooses a bad execution plan. These include the queries to determine chunk boundaries and the chunk queries themselves. If it appears that MySQL will use a bad query execution plan, the tool will skip the chunk of the table. .Sp The tool uses several heuristics to determine whether an execution plan is bad. The first is whether \s-1EXPLAIN\s0 reports that MySQL intends to use the desired index to access the rows. If MySQL chooses a different index, the tool considers the query unsafe. .Sp The tool also checks how much of the index MySQL reports that it will use for the query. The \s-1EXPLAIN\s0 output shows this in the key_len column. The tool remembers the largest key_len seen, and skips chunks where MySQL reports that it will use a smaller prefix of the index. This heuristic can be understood as skipping chunks that have a worse execution plan than other chunks. .Sp The tool prints a warning the first time a chunk is skipped due to a bad execution plan in each table. Subsequent chunks are skipped silently, although you can see the count of skipped chunks in the \s-1SKIPPED\s0 column in the tool's output. .Sp This option adds some setup work to each table and chunk. Although the work is not intrusive for MySQL, it results in more round-trips to the server, which consumes time. Making chunks too small will cause the overhead to become relatively larger. It is therefore recommended that you not make chunks too small, because the tool may take a very long time to complete if you do. .IP "\-\-[no]check\-replication\-filters" 4 .IX Item "--[no]check-replication-filters" default: yes .Sp Abort if any replication filter is set on any server. The tool looks for server options that filter replication, such as binlog_ignore_db and replicate_do_db. If it finds any such filters, it aborts with an error. .Sp If the replicas are configured with any filtering options, you should be careful not to modify any databases or tables that exist on the master and not the replicas, because it could cause replication to fail. For more information on replication rules, see http://dev.mysql.com/doc/en/replication\-rules.html . .IP "\-\-check\-slave\-lag" 4 .IX Item "--check-slave-lag" type: string .Sp Pause the data copy until this replica's lag is less than \*(L"\-\-max\-lag\*(R". The value is a \s-1DSN\s0 that inherits properties from the the connection options (\*(L"\-\-port\*(R", \*(L"\-\-user\*(R", etc.). This option overrides the normal behavior of finding and continually monitoring replication lag on \s-1ALL\s0 connected replicas. If you don't want to monitor \s-1ALL\s0 replicas, but you want more than just one replica to be monitored, then use the \s-1DSN\s0 option to the \*(L"\-\-recursion\-method\*(R" option instead of this option. .IP "\-\-chunk\-index" 4 .IX Item "--chunk-index" type: string .Sp Prefer this index for chunking tables. By default, the tool chooses the most appropriate index for chunking. This option lets you specify the index that you prefer. If the index doesn't exist, then the tool will fall back to its default behavior of choosing an index. The tool adds the index to the \s-1SQL\s0 statements in a \f(CW\*(C`FORCE INDEX\*(C'\fR clause. Be careful when using this option; a poor choice of index could cause bad performance. .IP "\-\-chunk\-index\-columns" 4 .IX Item "--chunk-index-columns" type: int .Sp Use only this many left-most columns of a \*(L"\-\-chunk\-index\*(R". This works only for compound indexes, and is useful in cases where a bug in the MySQL query optimizer (planner) causes it to scan a large range of rows instead of using the index to locate starting and ending points precisely. This problem sometimes occurs on indexes with many columns, such as 4 or more. If this happens, the tool might print a warning related to the \&\*(L"\-\-[no]check\-plan\*(R" option. Instructing the tool to use only the first N columns of the index is a workaround for the bug in some cases. .IP "\-\-chunk\-size" 4 .IX Item "--chunk-size" type: size; default: 1000 .Sp Number of rows to select for each chunk copied. Allowable suffixes are k, M, G. .Sp This option can override the default behavior, which is to adjust chunk size dynamically to try to make chunks run in exactly \*(L"\-\-chunk\-time\*(R" seconds. When this option isn't set explicitly, its default value is used as a starting point, but after that, the tool ignores this option's value. If you set this option explicitly, however, then it disables the dynamic adjustment behavior and tries to make all chunks exactly the specified number of rows. .Sp There is a subtlety: if the chunk index is not unique, then it's possible that chunks will be larger than desired. For example, if a table is chunked by an index that contains 10,000 of a given value, there is no way to write a \s-1WHERE\s0 clause that matches only 1,000 of the values, and that chunk will be at least 10,000 rows large. Such a chunk will probably be skipped because of \&\*(L"\-\-chunk\-size\-limit\*(R". .IP "\-\-chunk\-size\-limit" 4 .IX Item "--chunk-size-limit" type: float; default: 4.0 .Sp Do not copy chunks this much larger than the desired chunk size. .Sp When a table has no unique indexes, chunk sizes can be inaccurate. This option specifies a maximum tolerable limit to the inaccuracy. The tool uses <\s-1EXPLAIN\s0> to estimate how many rows are in the chunk. If that estimate exceeds the desired chunk size times the limit, then the tool skips the chunk. .Sp The minimum value for this option is 1, which means that no chunk can be larger than \*(L"\-\-chunk\-size\*(R". You probably don't want to specify 1, because rows reported by \s-1EXPLAIN\s0 are estimates, which can be different from the real number of rows in the chunk. You can disable oversized chunk checking by specifying a value of 0. .Sp The tool also uses this option to determine how to handle foreign keys that reference the table to be altered. See \*(L"\-\-alter\-foreign\-keys\-method\*(R" for details. .IP "\-\-chunk\-time" 4 .IX Item "--chunk-time" type: float; default: 0.5 .Sp Adjust the chunk size dynamically so each data-copy query takes this long to execute. The tool tracks the copy rate (rows per second) and adjusts the chunk size after each data-copy query, so that the next query takes this amount of time (in seconds) to execute. It keeps an exponentially decaying moving average of queries per second, so that if the server's performance changes due to changes in server load, the tool adapts quickly. .Sp If this option is set to zero, the chunk size doesn't auto-adjust, so query times will vary, but query chunk sizes will not. Another way to do the same thing is to specify a value for \*(L"\-\-chunk\-size\*(R" explicitly, instead of leaving it at the default. .IP "\-\-config" 4 .IX Item "--config" type: Array .Sp Read this comma-separated list of config files; if specified, this must be the first option on the command line. .IP "\-\-critical\-load" 4 .IX Item "--critical-load" type: Array; default: Threads_running=50 .Sp Examine \s-1SHOW\s0 \s-1GLOBAL\s0 \s-1STATUS\s0 after every chunk, and abort if the load is too high. The option accepts a comma-separated list of MySQL status variables and thresholds. An optional \f(CW\*(C`=MAX_VALUE\*(C'\fR (or \f(CW\*(C`:MAX_VALUE\*(C'\fR) can follow each variable. If not given, the tool determines a threshold by examining the current value at startup and doubling it. .Sp See \*(L"\-\-max\-load\*(R" for further details. These options work similarly, except that this option will abort the tool's operation instead of pausing it, and the default value is computed differently if you specify no threshold. The reason for this option is as a safety check in case the triggers on the original table add so much load to the server that it causes downtime. There is probably no single value of Threads_running that is wrong for every server, but a default of 50 seems likely to be unacceptably high for most servers, indicating that the operation should be canceled immediately. .IP "\-\-defaults\-file" 4 .IX Item "--defaults-file" short form: \-F; type: string .Sp Only read mysql options from the given file. You must give an absolute pathname. .IP "\-\-[no]drop\-new\-table" 4 .IX Item "--[no]drop-new-table" default: yes .Sp Drop the new table if copying the original table fails. .Sp Specifying \f(CW\*(C`\-\-no\-drop\-new\-table\*(C'\fR and \f(CW\*(C`\-\-no\-swap\-tables\*(C'\fR leaves the new, altered copy of the table without modifying the original table. The new table name is like \f(CW\*(C`_TBL_new\*(C'\fR where \f(CW\*(C`TBL\*(C'\fR is the table name. .Sp \&\-\-no\-drop\-new\-table does not work with \&\f(CW\*(C`alter\-foreign\-keys\-method drop_swap\*(C'\fR. .IP "\-\-[no]drop\-old\-table" 4 .IX Item "--[no]drop-old-table" default: yes .Sp Drop the original table after renaming it. After the original table has been successfully renamed to let the new table take its place, and if there are no errors, the tool drops the original table by default. If there are any errors, the tool leaves the original table in place. .Sp If \f(CW\*(C`\-\-no\-swap\-tables\*(C'\fR is specified, then there is no old table to drop. .IP "\-\-dry\-run" 4 .IX Item "--dry-run" Create and alter the new table, but do not create triggers, copy data, or replace the original table. .IP "\-\-execute" 4 .IX Item "--execute" Indicate that you have read the documentation and want to alter the table. You must specify this option to alter the table. If you do not, then the tool will only perform some safety checks and exit. This helps ensure that you have read the documentation and understand how to use this tool. If you have not read the documentation, then do not specify this option. .IP "\-\-help" 4 .IX Item "--help" Show help and exit. .IP "\-\-host" 4 .IX Item "--host" short form: \-h; type: string .Sp Connect to host. .IP "\-\-lock\-wait\-timeout" 4 .IX Item "--lock-wait-timeout" type: int; default: 1 .Sp Set the session value of \f(CW\*(C`innodb_lock_wait_timeout\*(C'\fR. This option helps guard against long lock waits if the data-copy queries become slow for some reason. Setting this option dynamically requires the InnoDB plugin, so this works only on newer InnoDB and MySQL versions. If the setting's current value is greater than the specified value, and the tool cannot set the value as desired, then it prints a warning. If the tool cannot set the value but the current value is less than or equal to the desired value, there is no error. .IP "\-\-max\-lag" 4 .IX Item "--max-lag" type: time; default: 1s .Sp Pause the data copy until all replicas' lag is less than this value. After each data-copy query (each chunk), the tool looks at the replication lag of all replicas to which it connects, using Seconds_Behind_Master. If any replica is lagging more than the value of this option, then the tool will sleep for \*(L"\-\-check\-interval\*(R" seconds, then check all replicas again. If you specify \*(L"\-\-check\-slave\-lag\*(R", then the tool only examines that server for lag, not all servers. If you want to control exactly which servers the tool monitors, use the \s-1DSN\s0 value to \*(L"\-\-recursion\-method\*(R". .Sp The tool waits forever for replicas to stop lagging. If any replica is stopped, the tool waits forever until the replica is started. The data copy continues when all replicas are running and not lagging too much. .Sp The tool prints progress reports while waiting. If a replica is stopped, it prints a progress report immediately, then again at every progress report interval. .IP "\-\-max\-load" 4 .IX Item "--max-load" type: Array; default: Threads_running=25 .Sp Examine \s-1SHOW\s0 \s-1GLOBAL\s0 \s-1STATUS\s0 after every chunk, and pause if any status variables are higher than their thresholds. The option accepts a comma-separated list of MySQL status variables. An optional \f(CW\*(C`=MAX_VALUE\*(C'\fR (or \f(CW\*(C`:MAX_VALUE\*(C'\fR) can follow each variable. If not given, the tool determines a threshold by examining the current value and increasing it by 20%. .Sp For example, if you want the tool to pause when Threads_connected gets too high, you can specify \*(L"Threads_connected\*(R", and the tool will check the current value when it starts working and add 20% to that value. If the current value is 100, then the tool will pause when Threads_connected exceeds 120, and resume working when it is below 120 again. If you want to specify an explicit threshold, such as 110, you can use either \*(L"Threads_connected:110\*(R" or \*(L"Threads_connected=110\*(R". .Sp The purpose of this option is to prevent the tool from adding too much load to the server. If the data-copy queries are intrusive, or if they cause lock waits, then other queries on the server will tend to block and queue. This will typically cause Threads_running to increase, and the tool can detect that by running \s-1SHOW\s0 \s-1GLOBAL\s0 \s-1STATUS\s0 immediately after each query finishes. If you specify a threshold for this variable, then you can instruct the tool to wait until queries are running normally again. This will not prevent queueing, however; it will only give the server a chance to recover from the queueing. If you notice queueing, it is best to decrease the chunk time. .IP "\-\-password" 4 .IX Item "--password" short form: \-p; type: string .Sp Password to use when connecting. .IP "\-\-pid" 4 .IX Item "--pid" type: string .Sp Create the given \s-1PID\s0 file. The file contains the process \s-1ID\s0 of the tool's instance. The \s-1PID\s0 file is removed when the tool exits. The tool checks for the existence of the \s-1PID\s0 file when starting; if it exists and the process with the matching \s-1PID\s0 exists, the tool exits. .IP "\-\-port" 4 .IX Item "--port" short form: \-P; type: int .Sp Port number to use for connection. .IP "\-\-print" 4 .IX Item "--print" Print \s-1SQL\s0 statements to \s-1STDOUT\s0. Specifying this option allows you to see most of the statements that the tool executes. You can use this option with \&\*(L"\-\-dry\-run\*(R", for example. .IP "\-\-progress" 4 .IX Item "--progress" type: array; default: time,30 .Sp Print progress reports to \s-1STDERR\s0 while copying rows. The value is a comma-separated list with two parts. The first part can be percentage, time, or iterations; the second part specifies how often an update should be printed, in percentage, seconds, or number of iterations. .IP "\-\-quiet" 4 .IX Item "--quiet" short form: \-q .Sp Do not print messages to \s-1STDOUT\s0. Errors and warnings are still printed to \&\s-1STDERR\s0. .IP "\-\-recurse" 4 .IX Item "--recurse" type: int .Sp Number of levels to recurse in the hierarchy when discovering replicas. Default is infinite. See also \*(L"\-\-recursion\-method\*(R". .IP "\-\-recursion\-method" 4 .IX Item "--recursion-method" type: string .Sp Preferred recursion method for discovering replicas. Possible methods are: .Sp .Vb 6 \& METHOD USES \& =========== ================== \& processlist SHOW PROCESSLIST \& hosts SHOW SLAVE HOSTS \& dsn=DSN DSNs from a table \& none Do not find slaves .Ve .Sp The processlist method is the default, because \s-1SHOW\s0 \s-1SLAVE\s0 \s-1HOSTS\s0 is not reliable. However, the hosts method can work better if the server uses a non-standard port (not 3306). The tool usually does the right thing and finds all replicas, but you may give a preferred method and it will be used first. .Sp The hosts method requires replicas to be configured with report_host, report_port, etc. .Sp The dsn method is special: it specifies a table from which other \s-1DSN\s0 strings are read. The specified \s-1DSN\s0 must specify a D and t, or a database-qualified t. The \s-1DSN\s0 table should have the following structure: .Sp .Vb 6 \& CREATE TABLE \`dsns\` ( \& \`id\` int(11) NOT NULL AUTO_INCREMENT, \& \`parent_id\` int(11) DEFAULT NULL, \& \`dsn\` varchar(255) NOT NULL, \& PRIMARY KEY (\`id\`) \& ); .Ve .Sp To make the tool monitor only the hosts 10.10.1.16 and 10.10.1.17 for replication lag, insert the values \f(CW\*(C`h=10.10.1.16\*(C'\fR and \f(CW\*(C`h=10.10.1.17\*(C'\fR into the table. Currently, the DSNs are ordered by id, but id and parent_id are otherwise ignored. .IP "\-\-retries" 4 .IX Item "--retries" type: int; default: 3 .Sp Retry a chunk this many times when there is a nonfatal error. Nonfatal errors are problems such as a lock wait timeout or the query being killed. This option applies to the data copy operation. .IP "\-\-set\-vars" 4 .IX Item "--set-vars" type: string; default: wait_timeout=10000 .Sp Set these MySQL variables. Immediately after connecting to MySQL, this string will be appended to \s-1SET\s0 and executed. .IP "\-\-socket" 4 .IX Item "--socket" short form: \-S; type: string .Sp Socket file to use for connection. .IP "\-\-[no]swap\-tables" 4 .IX Item "--[no]swap-tables" default: yes .Sp Swap the original table and the new, altered table. This step completes the online schema change process by making the table with the new schema take the place of the original table. The original table becomes the \*(L"old table,\*(R" and the tool drops it unless you disable \*(L"\-\-[no]drop\-old\-table\*(R". .IP "\-\-user" 4 .IX Item "--user" short form: \-u; type: string .Sp User for login if not current user. .IP "\-\-version" 4 .IX Item "--version" Show version and exit. .SH "DSN OPTIONS" .IX Header "DSN OPTIONS" These \s-1DSN\s0 options are used to create a \s-1DSN\s0. Each option is given like \&\f(CW\*(C`option=value\*(C'\fR. The options are case-sensitive, so P and p are not the same option. There cannot be whitespace before or after the \f(CW\*(C`=\*(C'\fR and if the value contains whitespace it must be quoted. \s-1DSN\s0 options are comma-separated. See the percona-toolkit manpage for full details. .IP "\(bu" 4 A .Sp dsn: charset; copy: yes .Sp Default character set. .IP "\(bu" 4 D .Sp dsn: database; copy: yes .Sp Database for the old and new table. .IP "\(bu" 4 F .Sp dsn: mysql_read_default_file; copy: yes .Sp Only read default options from the given file .IP "\(bu" 4 h .Sp dsn: host; copy: yes .Sp Connect to host. .IP "\(bu" 4 p .Sp dsn: password; copy: yes .Sp Password to use when connecting. .IP "\(bu" 4 P .Sp dsn: port; copy: yes .Sp Port number to use for connection. .IP "\(bu" 4 S .Sp dsn: mysql_socket; copy: yes .Sp Socket file to use for connection. .IP "\(bu" 4 t .Sp dsn: table; copy: no .Sp Table to alter. .IP "\(bu" 4 u .Sp dsn: user; copy: yes .Sp User for login if not current user. .SH "ENVIRONMENT" .IX Header "ENVIRONMENT" The environment variable \f(CW\*(C`PTDEBUG\*(C'\fR enables verbose debugging output to \s-1STDERR\s0. To enable debugging and capture all output to a file, run the tool like: .PP .Vb 1 \& PTDEBUG=1 pt\-online\-schema\-change ... > FILE 2>&1 .Ve .PP Be careful: debugging output is voluminous and can generate several megabytes of output. .SH "SYSTEM REQUIREMENTS" .IX Header "SYSTEM REQUIREMENTS" You need Perl, \s-1DBI\s0, DBD::mysql, and some core packages that ought to be installed in any reasonably new version of Perl. .PP This tool works only on MySQL 5.0.2 and newer versions, because earlier versions do not support triggers. .SH "BUGS" .IX Header "BUGS" For a list of known bugs, see http://www.percona.com/bugs/pt\-online\-schema\-change . .PP Please report bugs at https://bugs.launchpad.net/percona\-toolkit . Include the following information in your bug report: .IP "\(bu" 4 Complete command-line used to run the tool .IP "\(bu" 4 Tool \*(L"\-\-version\*(R" .IP "\(bu" 4 MySQL version of all servers involved .IP "\(bu" 4 Output from the tool including \s-1STDERR\s0 .IP "\(bu" 4 Input files (log/dump/config files, etc.) .PP If possible, include debugging output by running the tool with \f(CW\*(C`PTDEBUG\*(C'\fR; see \*(L"\s-1ENVIRONMENT\s0\*(R". .SH "DOWNLOADING" .IX Header "DOWNLOADING" Visit http://www.percona.com/software/percona\-toolkit/ to download the latest release of Percona Toolkit. Or, get the latest release from the command line: .PP .Vb 1 \& wget percona.com/get/percona\-toolkit.tar.gz \& \& wget percona.com/get/percona\-toolkit.rpm \& \& wget percona.com/get/percona\-toolkit.deb .Ve .PP You can also get individual tools from the latest release: .PP .Vb 1 \& wget percona.com/get/TOOL .Ve .PP Replace \f(CW\*(C`TOOL\*(C'\fR with the name of any tool. .SH "AUTHORS" .IX Header "AUTHORS" Daniel Nichter and Baron Schwartz .SH "ACKNOWLEDGMENTS" .IX Header "ACKNOWLEDGMENTS" The \*(L"online schema change\*(R" concept was first implemented by Shlomi Noach in his tool \f(CW\*(C`oak\-online\-alter\-table\*(C'\fR, part of . Engineers at Facebook then built another version called \f(CW\*(C`OnlineSchemaChange.php\*(C'\fR as explained by their blog post: . This tool is a hybrid of both approaches, with additional features and functionality not present in either. .SH "ABOUT PERCONA TOOLKIT" .IX Header "ABOUT PERCONA TOOLKIT" This tool is part of Percona Toolkit, a collection of advanced command-line tools developed by Percona for MySQL support and consulting. Percona Toolkit was forked from two projects in June, 2011: Maatkit and Aspersa. Those projects were created by Baron Schwartz and developed primarily by him and Daniel Nichter, both of whom are employed by Percona. Visit for more software developed by Percona. .SH "COPYRIGHT, LICENSE, AND WARRANTY" .IX Header "COPYRIGHT, LICENSE, AND WARRANTY" This program is copyright 2011\-2012 Percona Inc. Feedback and improvements are welcome. .PP \&\s-1THIS\s0 \s-1PROGRAM\s0 \s-1IS\s0 \s-1PROVIDED\s0 \*(L"\s-1AS\s0 \s-1IS\s0\*(R" \s-1AND\s0 \s-1WITHOUT\s0 \s-1ANY\s0 \s-1EXPRESS\s0 \s-1OR\s0 \s-1IMPLIED\s0 \&\s-1WARRANTIES\s0, \s-1INCLUDING\s0, \s-1WITHOUT\s0 \s-1LIMITATION\s0, \s-1THE\s0 \s-1IMPLIED\s0 \s-1WARRANTIES\s0 \s-1OF\s0 \&\s-1MERCHANTABILITY\s0 \s-1AND\s0 \s-1FITNESS\s0 \s-1FOR\s0 A \s-1PARTICULAR\s0 \s-1PURPOSE\s0. .PP This program is free software; you can redistribute it and/or modify it under the terms of the \s-1GNU\s0 General Public License as published by the Free Software Foundation, version 2; \s-1OR\s0 the Perl Artistic License. On \s-1UNIX\s0 and similar systems, you can issue `man perlgpl' or `man perlartistic' to read these licenses. .PP You should have received a copy of the \s-1GNU\s0 General Public License along with this program; if not, write to the Free Software Foundation, Inc., 59 Temple Place, Suite 330, Boston, \s-1MA\s0 02111\-1307 \s-1USA\s0. .SH "VERSION" .IX Header "VERSION" pt-online-schema-change 2.1.2