It's not on my computer its a on a rented Linux cloud. I am not sure how much CPU power can be diverted to it. I can ask the person who rents the server if it is needed.
I packed your fix into the prc_d2as.hak(checking that the default hak packer did put the compiled script in it) and uploaded it to the server. The exact same thing happened as before.
What do you mean by check database usage with a script? Run a test with something that needs MySQL to work and does a fair number of calls?
If you did this is a copy of the ODBC log after using a MySQL vault system.
]NWNX2 ODBC2 version 0.3.2 for Linux.
(c) 2005-2006 dumbo (dumbo@nm.ru)
(c) 2006-2008 virusman (virusman@virusman.ru)
o SCO located at 82d9c44.
o RCO located at 82d9b60.
o Connect successful.
o Got request: SELECT enabled FROM banlist WHERE playerCD='********'
o Sent response (0 bytes):
o Got request: SELECT num FROM qptrack WHERE player='Kenquinn'
o Sent response (1 bytes): 6
o Got request: SELECT val FROM pwdata WHERE player='Kenquinn' AND tag='Kalie Jora' AND name='LastCDKey' AND ( NOW() < last + INTERVAL expire SECOND OR expire = 0 )
o Sent response (0 bytes):
o Got request: SELECT player FROM pwdata WHERE player='Kenquinn' AND tag='Kalie Jora' AND name='LastCDKey'
o Sent response (0 bytes):
o Got request: INSERT INTO pwdata (player,tag,name,val,expire) VALUES('Kenquinn','Kalie Jora','LastCDKey','********',0)
o Got request: SELECT val FROM pwdata WHERE player='Kenquinn' AND tag='Kalie Jora' AND name='Jailed' AND ( NOW() < last + INTERVAL expire SECOND OR expire = 0 )
o Sent response (0 bytes):
o Got request: SELECT player FROM pwdata WHERE player='Kenquinn' AND tag='Kalie Jora' AND name='LastCDKey'
o Sent response (8 bytes): Kenquinn
o Got request: UPDATE pwdata SET val='',expire=0 WHERE player='Kenquinn' AND tag='Kalie Jora' AND name='LastCDKey'
o Got request: SELECT enabled FROM banlist WHERE playerCD='********'
o Sent response (0 bytes):
o Got request: SELECT num FROM qptrack WHERE player='Kenquinn'
o Sent response (1 bytes): 6
o Got request: SELECT val FROM pwdata WHERE player='Kenquinn' AND tag='Moristin Nefzen' AND name='LastCDKey' AND ( NOW() < last + INTERVAL expire SECOND OR expire = 0 )
o Sent response (0 bytes):
o Got request: SELECT player FROM pwdata WHERE player='Kenquinn' AND tag='Moristin Nefzen' AND name='LastCDKey'
o Sent response (0 bytes):
o Got request: INSERT INTO pwdata (player,tag,name,val,expire) VALUES('Kenquinn','Moristin Nefzen','LastCDKey','********',0)
o Got request: SELECT val FROM pwdata WHERE player='Kenquinn' AND tag='Moristin Nefzen' AND name='Jailed' AND ( NOW() < last + INTERVAL expire SECOND OR expire = 0 )
o Sent response (0 bytes):
o Got request: SELECT resref,stack,charges,identified FROM bankvault2 WHERE player='Kenquinn' AND name=''
o Sent response (21 bytes): blackwillowsan¬1¬35¬1
o Sent response (17 bytes): dragonscale¬1¬0¬1
o Sent response (22 bytes): grayonyxdragbel1¬1¬0¬1
o Sent response (22 bytes): gray_treebracers¬1¬0¬1
o Sent response (22 bytes): hpy_itmbashbardb¬1¬0¬1
o Sent response (22 bytes): hpy_itmskelebook¬1¬0¬1
o Sent response (22 bytes): hpy_itmwizrunner¬1¬0¬1
o Sent response (18 bytes): nw_ashmto006¬1¬0¬1
o Sent response (17 bytes): soul_belt1c¬1¬0¬1
o Sent response (17 bytes): soul_belt1c¬1¬0¬1
o Sent response (20 bytes): soul_clothing2¬1¬0¬1
o Sent response (18 bytes): soul_dagger4¬1¬0¬1
o Sent response (18 bytes): soul_dagger5¬1¬0¬1
o Sent response (20 bytes): soul_gauntlet1¬1¬0¬1
o Sent response (22 bytes): soul_heavarmour1¬1¬0¬1
o Sent response (18 bytes): soul_staff1¬1¬50¬1
o Sent response (0 bytes):
o Got request: SELECT player FROM pwdata WHERE player='Kenquinn' AND tag='Moristin Nefzen' AND name='LastCDKey'
o Sent response (8 bytes): Kenquinn
o Got request: UPDATE pwdata SET val='',expire=0 WHERE player='Kenquinn' AND tag='Moristin Nefzen' AND name='LastCDKey'
o Shutdown.