Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Using a slave isn't fool proof either. If someone were to run a malicious command, it gets replicated, and could get backed up before being caught.


I didn't say that. Read what I wrote.

You use the slave so you can shutdown the database and get a consistent file snapshot. Then you do offline backup.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: