PDF (US Ltr)
- 35.0Mb
PDF (A4)
- 35.1Mb
Man Pages (TGZ)
- 254.9Kb
Man Pages (Zip)
- 359.9Kb
Info (Gzip)
- 3.4Mb
Info (Zip)
- 3.4Mb
Search Results
https://dev.mysql.com/doc/refman/5.7/en/mysql-cluster-params-ndbd.html
MaxNoOfAttributes: Suggests total number of attributes stored in database (sum over all tables). TimeBetweenLocalCheckpoints: Time between taking snapshots of database (expressed in base-2 logarithm of bytes). The listings in this section provide ...
https://dev.mysql.com/doc/refman/5.7/en/mysql-cluster-programs-ndb-drop-table.html
--database, -d Command-Line Format --database=name Type String Default Value TEST_DB Name of the database in which the table resides. Usage ndb_drop_table -c connection_string tbl_name -d db_name Options that can be used with ndb_drop_table are ...
21.7.9.1 NDB Cluster Replication: Automating Synchronization of the Replica to the Source Binary Log
https://dev.mysql.com/doc/refman/5.7/en/mysql-cluster-replication-auto-sync.html
It is possible to automate much of the process described in the previous section (see Section 21.7.9, “NDB Cluster Backups With NDB Cluster Replication”). The following Perl script reset-replica.pl serves as an example of how you can do this.
https://dev.mysql.com/doc/refman/5.7/en/mysql-enterprise-backup.html
MySQL Enterprise Backup performs hot backup operations for MySQL databases. Hot backups are performed while the database is running and applications are reading and writing to it. This type of backup does not block normal database operations, and ...The product is architected for efficient and reliable backups of tables created by the InnoDB storage ...
https://dev.mysql.com/doc/refman/5.7/en/password-logging.html
For example, the following statement is logged as shown because a password hash value is expected: CREATE USER 'user1'@'localhost' IDENTIFIED BY PASSWORD 'not-so-secret'; To guard log files against unwarranted exposure, locate them in a directory ...
https://dev.mysql.com/doc/refman/5.7/en/query-cache-operation.html
Queries that use different databases, different protocol versions, or different default character sets are considered different queries and are cached separately. A table can be changed by many types of statements, such as INSERT, UPDATE, DELETE, ...
https://dev.mysql.com/doc/refman/5.7/en/replica-logs-status.html
Access to the replica's connection metadata repository file or table should be restricted to the database administrator, because it contains the replication user account name and password for connecting to the source. Use a restricted access mode to ... A replica server creates two replication metadata repositories, the connection metadata repository and the applier metadata ...
https://dev.mysql.com/doc/refman/5.7/en/replication-features-reserved-words.html
Replication can fail in such cases with Error 1064 You have an error in your SQL syntax..., even if a database or table named using the reserved word or a table having a column named using the reserved word is excluded from replication. In any SQL ... You can encounter problems when you attempt to replicate from an older source to a newer replica and you make use of identifiers on the source that are reserved words in the newer MySQL version running on the ...
https://dev.mysql.com/doc/refman/5.7/en/replication-rules-table-options.html
The replica checks for and evaluates table options only if either of the following two conditions is true: No matching database options were found. One or more database options were found, and were evaluated to arrive at an “execute” condition ...First, as a preliminary condition, the replica checks whether statement-based replication is ...
https://dev.mysql.com/doc/refman/5.7/en/security.html
Access control and security within the database system itself, including the users and databases granted with access to the databases, views and stored programs in use within the database. Ensure that you have adequate and appropriate backups of ...