Search

Download this Manual
PDF (US Ltr) - 43.3Mb
PDF (A4) - 43.4Mb
Man Pages (TGZ) - 297.2Kb
Man Pages (Zip) - 402.4Kb
Info (Gzip) - 4.3Mb
Info (Zip) - 4.3Mb


Displaying 121 to 130 of 861 total results
https://dev.mysql.com/doc/refman/8.0/en/mysql-cluster-replication-issues.html
Examples of incidents are server failures, database resynchronization, some software updates, and some hardware changes.) When the replica encounters a gap in the replication log, it stops with an error message. All SQL nodes acting as sources and ... This section discusses known problems or issues when using replication with NDB ...
https://dev.mysql.com/doc/refman/8.0/en/keyring-system-variables.html
If you create the directory manually, it should have a restrictive mode and be accessible only to the account used to run the MySQL server. If this variable is specified in an option file, the file should have a restrictive mode and be accessible ...
https://dev.mysql.com/doc/refman/8.0/en/group-replication-online-upgrade-methods.html
When the group is operating in single-primary mode, if you require the primary to remain the same throughout (except when it is being upgraded itself), it should be the last member to be upgraded. The group elects a new primary whenever necessary ...
https://dev.mysql.com/doc/refman/8.0/en/replication-features-differing-tables.html
A column's default value is determined by a number of factors, including its type, whether it is defined with a DEFAULT option, whether it is declared as NULL, and the server SQL mode in effect at the time of its creation; for more information, see ... Source and target tables for replication do not have to be ...
https://dev.mysql.com/doc/refman/8.0/en/x-plugin-connection-compression.html
On the client side, an X Protocol connection request can specify several parameters for compression control: The compression mode. The connection mode has these permitted values: disabled: The connection is uncompressed. required: Compression ...
https://dev.mysql.com/doc/refman/8.0/en/atomic-ddl.html
An atomic DDL statement combines the data dictionary updates, storage engine operations, and binary log writes associated with a DDL operation into a single, atomic operation. Atomic DDL Characteristics The characteristics of atomic DDL statements ...The operation is either committed, with applicable changes persisted to the data dictionary, storage engine, and binary log, or is rolled back, even if the server halts during the ...
https://dev.mysql.com/doc/refman/8.0/en/mysql-cluster-security-mysql-privileges.html
This includes all MySQL privilege types (SELECT privilege, UPDATE privilege, DELETE privilege, and so on) granted on the database, table, and column level. The only tables that would be safe from this sort of mayhem would be those tables that were ... In this section, we discuss how the MySQL privilege system works in relation to NDB Cluster and the implications of this for keeping an NDB Cluster ...
https://dev.mysql.com/doc/refman/8.0/en/datetime.html
The TIMESTAMP and DATETIME data types offer automatic initialization and updating to the current date and time. For more information, see Section 13.2.5, “Automatic Initialization and Updating for TIMESTAMP and DATETIME”. Invalid DATE, DATETIME, ...This section describes their characteristics, how they are similar, and how they ...
https://dev.mysql.com/doc/refman/8.0/en/binary-log-formats.html
With mixed logging, statement-based logging is used by default, but the logging mode switches automatically to row-based in certain cases as described below. In deciding whether or not a given statement is safe for statement-based replication, MySQL ... The server uses several logging formats to record information in the binary log: Replication capabilities in MySQL originally were based on propagation of SQL statements from source to ...
https://dev.mysql.com/doc/refman/8.0/en/innodb-recovery.html
If MySQL still has trouble starting because of InnoDB consistency problems, see Section 17.21.3, “Forcing InnoDB Recovery” for steps to start the instance in recovery mode, which permits you to dump the data. The current maximum auto-increment ...To achieve point-in-time recovery after restoring a backup, you can apply changes from the binary log that occurred after the backup was ...
Displaying 121 to 130 of 861 total results