PDF (US Ltr)
- 43.3Mb
PDF (A4)
- 43.4Mb
Man Pages (TGZ)
- 297.2Kb
Man Pages (Zip)
- 402.5Kb
Info (Gzip)
- 4.3Mb
Info (Zip)
- 4.3Mb
Search Results
https://dev.mysql.com/doc/refman/8.0/en/show-engines.html
row *************************** Engine: MRG_MYISAM Support: YES Comment: Collection of identical MyISAM tables Transactions: NO XA: NO Savepoints: NO *************************** 4. row *************************** Engine: MEMORY Support: YES Comment: ... SHOW [STORAGE] ENGINES SHOW ENGINES displays status information about the server's storage ...
https://dev.mysql.com/doc/refman/8.0/en/stop-replica.html
When the source is using the row-based binary logging format, you should execute STOP REPLICA or STOP REPLICA SQL_THREAD on the replica prior to shutting down the replica server if you are replicating any tables that use a nontransactional storage ...] thread_type: IO_THREAD | SQL_THREAD channel_option: FOR CHANNEL channel Stops the replication ...
https://dev.mysql.com/doc/refman/8.0/en/testing-server.html
For more information about mysql, mysqladmin, and mysqlshow, see Section 6.5.1, “mysql — The MySQL Command-Line Client”, Section 6.5.2, “mysqladmin — A MySQL Server Administration Program”, and Section 6.5.7, “mysqlshow — Display ...
https://dev.mysql.com/doc/refman/8.0/en/xa-restrictions.html
The implementation of internal XA requires that a storage engine support two-phase commit at the table handler level, and currently this is true only for InnoDB. This means that the same XA transaction can appear in the events_transactions_current ... XA transaction support is limited to the InnoDB storage ...
https://dev.mysql.com/doc/refman/8.0/en/enterprise-encryption-usage.html
Key string values can be created at runtime and stored into a variable or table using SET, SELECT, or INSERT. If you install the legacy functions then upgrade to MySQL 8.0.30 or later, the functions you created remain available, are supported, and ... To use MySQL Enterprise Encryption in applications, invoke the functions that are appropriate for the operations you wish to ...
https://dev.mysql.com/doc/refman/8.0/en/keyring-aws-plugin.html
To configure keyring_aws, you must obtain a secret access key that provides credentials for communicating with AWS KMS and write it to a configuration file: Create an AWS KMS account. Use AWS KMS to create a secret access key ID and secret access ...
https://dev.mysql.com/doc/refman/8.0/en/mysql-cluster-install-configuration.html
Important Once you have started a mysqld process with the ndbcluster and ndb-connectstring parameters in the [mysqld] and [mysql_cluster] sections of the my.cnf file as shown previously, you cannot execute any CREATE TABLE or ALTER TABLE statements ... In this section, we discuss manual configuration of an installed NDB Cluster by creating and editing configuration ...For our four-node, four-host ...
https://dev.mysql.com/doc/refman/8.0/en/alter-logfile-group.html
You can verify that the UNDO files were created and obtain information about them by querying the Information Schema FILES table. For example, you cannot have a tablespace and an undo log file with the same name, or an undo log file and a data file ... ALTER LOGFILE GROUP logfile_group ADD UNDOFILE 'file_name' [INITIAL_SIZE [=] size] [WAIT] ENGINE [=] engine_name This statement adds an UNDO file named 'file_name' to an existing log file group ...
https://dev.mysql.com/doc/refman/8.0/en/group-replication-secure-user.html
State transfer from the binary log requires a replication user with the correct permissions so that Group Replication can establish direct member-to-member replication channels. To secure the user credentials, you can require SSL for connections ...
https://dev.mysql.com/doc/refman/8.0/en/locking-service.html
The namespace enables different applications to use the same lock names without colliding by creating locks in separate namespaces. Locking Service Monitoring The locking service is implemented using the MySQL Server metadata locks framework, so you ... MySQL distributions provide a locking interface that is accessible at two levels: At the SQL level, as a set of loadable functions that each map onto calls to the service ...