- 
                Notifications
    You must be signed in to change notification settings 
- Fork 524
MySQLTuning
Please note! This wiki is no longer maintained. Our documentation has moved to https://securityonion.net/docs/. Please update your bookmarks. You can find the latest version of this page at: https://securityonion.net/docs/MySQLTuning.
As of Security Onion 16.04.4.1 MySQL (on the master server) should have a randomized root password set by default. You can still access MySQL using the following as an example of the syntax to run a command against securityonion_db (Sguil DB):
sudo mysql --defaults-file=/etc/mysql/debian.cnf -Dsecurityonion_db -e 'select * from event limit 10';
You can install and run mysqltuner to get some initial recommendations.
Install mysqltuner if you haven't already:
sudo apt update && sudo apt install mysqltuner
Run mysqltuner:
sudo mysqltuner
You may also want to install mysqltuner via the following manner, given that Security Onion now uses defaults-file to handle MySQL database credentials:
wget http://mysqltuner.pl/ -O mysqltuner.pl && chmod +x mysqltuner.pl
sudo ./mysqltuner.pl
Implement mysqltuner's recommendations in /etc/mysql/my.cnf or create a new file in /etc/mysql/conf.d/ with the changes.  We recommend /etc/mysql/conf.d/ so that your changes don't get overwritten during MySQL package upgrades.
Changes don't take effect until MySQL is restarted and you should ensure that Sguil and other services aren't using MySQL before shutting it down.
The first variable that you'll probably need to tune is open-files-limit:
error_code_24 out-of-resources
Here are some other common variables that will probably need to be tuned for your system:
- table_cache
- key_buffer
- max_connections
At boot time, MySQL checks all tables, which can take a long time.  If you wish to disable this check, comment out check_for_crashed_tables in /etc/mysql/debian-start.
MySQL defaults table_definition_cache to 400.  You may want to increase this value if one or more of the following conditions applies to you:
- you have more than 400 MySQL .frmfiles
- you've increased DAYSTOKEEPin/etc/nsm/securityonion.confabove its default value of 30 (each day requires 5.frmfiles for OSSEC and 5.frmfiles for each sniffing interface)
- you're running prepared statements
Check mysql table_definition cache (defaults to 400):
mysql -uroot -e "show global variables like 'table_definition_cache'"
Check current open_table_definitions (probably maxed out at table_definition_cache):
mysql -uroot -e "show global status like 'open_table_definitions'"
Check number of .frm files:
sudo find /var/lib/mysql/ -name "*.frm" |wc -l
Increase table_definition_cache above number of .frm files by creating a file called /etc/mysql/conf.d/securityonion-table_definition_cache.cnf (please note .cnf extension NOT .conf) and adding the following (replacing 4000 with your desired setting):
[mysqld]
table_definition_cache = 4000
Reboot and then verify that open_table_definitions never gets limited by table_definition_cache.
For more information, please see:
https://bugs.mysql.com/bug.php?id=42041
https://dev.mysql.com/doc/refman/5.7/en/server-system-variables.html#sysvar_table_definition_cache
- Introduction
- Use Cases
- Hardware Requirements
- Release Notes
- Download/Install
- Booting Issues
- After Installation
- UTC and Time Zones
- Services
- VirtualBox Walkthrough
- VMWare Walkthrough
- Videos
- Architecture
- Cheat Sheet
- Conference
- Elastic Stack
- Elastic Architecture
- Elasticsearch
- Logstash
- Kibana
- ElastAlert
- Curator
- FreqServer
- DomainStats
- Docker
- Redis
- Data Fields
- Beats
- Pre-Releases
- ELSA to Elastic
- Network Configuration
- Proxy Configuration
- Firewall/Hardening
- Email Configuration
- Integrating with other systems
- Changing IP Addresses
- NTP
- Managing Alerts
- Managing Rules
- Adding Local Rules
- Disabling Processes
- Filtering with BPF
- Adjusting PF_RING for traffic
- MySQL Tuning
- Adding a new disk
- High Performance Tuning
- Trimming PCAPs