PDF (US Ltr)
- 43.3Mb
PDF (A4)
- 43.4Mb
Man Pages (TGZ)
- 297.2Kb
Man Pages (Zip)
- 402.4Kb
Info (Gzip)
- 4.3Mb
Info (Zip)
- 4.3Mb
Search Results
https://dev.mysql.com/doc/refman/8.0/en/string-functions.html
[USING charset_name]) CHAR() interprets each argument N as an integer and returns a string consisting of the characters given by the code values of those integers. For more information about that option, see Section 6.5.1, “mysql — The MySQL ...
https://dev.mysql.com/doc/refman/8.0/en/lock-tables.html
LOCK TABLES and Triggers If you lock a table explicitly with LOCK TABLES, any tables used in triggers are also locked implicitly: The locks are taken as the same time as those acquired explicitly with the LOCK TABLES statement. For example, the HELP ...This is explained in more detail in Table-Locking Restrictions and ... LOCK {TABLE | ...
https://dev.mysql.com/doc/refman/8.0/en/clone-plugin-remote.html
The clone plugin supports the following syntax for cloning remote data; that is, cloning data from a remote MySQL server instance (the donor) and transferring it to the MySQL instance where the cloning operation was initiated (the recipient). Use ...CLONE INSTANCE FROM 'user'@'host':port IDENTIFIED BY 'password' [DATA DIRECTORY [=] 'clone_dir'] [REQUIRE [NO] SSL]; where: user is the clone user on the donor MySQL server ...
https://dev.mysql.com/doc/refman/8.0/en/converting-tables-to-innodb.html
While a transaction is open, the system keeps a snapshot of the data as seen at the beginning of the transaction, which can cause substantial overhead if the system inserts, updates, and deletes millions of rows while a stray transaction keeps ...
https://dev.mysql.com/doc/refman/8.0/en/pluggable-authentication.html
To minimize the potential for incompatibilities, regularly upgrade the server, clients, and connectors on a timely basis. If a connector links to libmysqlclient dynamically, it must be ensured that the newer version of libmysqlclient is installed on ... When a client connects to the MySQL server, the server uses the user name provided by the client and the client host to select the appropriate account row from the mysql.user system ...Pluggable ...
https://dev.mysql.com/doc/refman/8.0/en/version-tokens-usage.html
The next time the client sends a statement to server 2, its own token list no longer matches the server token list and an error occurs: mysql> UPDATE emp.employee SET salary = salary * 1.1 WHERE id = 4982; ERROR 3136 (42000): Version token mismatch ...Client applications that access the servers to retrieve and update data, choosing servers according to the purposes assigned ...A scenario in which Version Tokens can be useful is a system that accesses a collection of MySQL servers ...
https://dev.mysql.com/doc/refman/8.0/en/binary-log.html
If you disable binary logging, either omit these options, or specify --log-slave-updates=OFF and --skip-slave-preserve-commit-order. You can remove the files manually, but it is preferable to use PURGE BINARY LOGS, which also safely updates the ...
https://dev.mysql.com/doc/refman/8.0/en/binary-log-transaction-compression.html
However, the effort required for data compression also increases, taking time and CPU and memory resources on the originating server. In NDB 8.0.31 and later, you can enable binary logging of compressed transactions for tables using the NDB storage ...When binary log transaction compression is enabled, transaction payloads are compressed using the zstd algorithm, and then written to the server's binary log file as a single event (a ...
https://dev.mysql.com/doc/refman/8.0/en/replication-gtids-lifecycle.html
In addition, for a non-transactional update, if a disk write failure occurs while attempting to write to the binary log cache and a gap is therefore created in the binary log, the resulting incident log event is assigned a GTID. The life cycle of a ...The GTID is written to the source's binary log (immediately preceding the transaction itself in the ...
https://dev.mysql.com/doc/refman/8.0/en/audit-log-filter-definitions.html
It is equivalent to: { "filter": { } } Logging behavior depends on the log value and whether class or event items are specified: With log specified, its given value is used. Without log specified, logging is true if no class or event item is ...For ...