Search

Download this Manual
PDF (US Ltr) - 43.3Mb
PDF (A4) - 43.4Mb
Man Pages (TGZ) - 297.2Kb
Man Pages (Zip) - 402.4Kb
Info (Gzip) - 4.3Mb
Info (Zip) - 4.3Mb


Displaying 1571 to 1580 of 1832 total results
https://dev.mysql.com/doc/refman/8.0/en/alter-resource-group.html
These attributes are specified the same way as described for CREATE RESOURCE GROUP (see Section 15.7.2.2, “CREATE RESOURCE GROUP Statement”). The name and type attributes are set at group creation time and cannot be modified thereafter with ...
https://dev.mysql.com/doc/refman/8.0/en/call.html
CALL sp_name([parameter[,...]]) CALL sp_name[()] The CALL statement invokes a stored procedure that was defined previously with CREATE PROCEDURE. Stored procedures that take no arguments can be invoked without parentheses. CALL can pass back values ...
https://dev.mysql.com/doc/refman/8.0/en/clone.html
The MySQL server requires the necessary write access to create the specified directory. The MySQL server must have the necessary write access to create the directory. If an SSL clause is not specified, clone attempts to establish an encrypted ...
https://dev.mysql.com/doc/refman/8.0/en/declare-local-variable.html
type [DEFAULT value] This statement declares local variables within stored programs. To provide a default value for a variable, include a DEFAULT clause. The value can be specified as an expression; it need not be a constant. If the DEFAULT clause ...
https://dev.mysql.com/doc/refman/8.0/en/drop-role.html
To use this statement, you must have the global DROP ROLE or CREATE USER privilege. As of MySQL 8.0.16, users who have the CREATE USER privilege can use this statement to drop accounts that are locked or unlocked. DROP ROLE removes one or more roles ...
https://dev.mysql.com/doc/refman/8.0/en/encrypted-connections.html
When you must move information over a network in a secure fashion, an unencrypted connection is unacceptable. By default, MySQL programs attempt to connect using encryption if the server supports encrypted connections, falling back to an unencrypted ... With an unencrypted connection between the MySQL client and the server, someone with access to the network could watch all your traffic and inspect the data being sent or received between client and ...
https://dev.mysql.com/doc/refman/8.0/en/error-log-rotation.html
If the location of the error log file is not writable by the server, the log-flushing operation fails to create a new log file. For example, assuming a log file name of host_name.err, use the following commands to rename the file and create a new ...
https://dev.mysql.com/doc/refman/8.0/en/gis-class-geometry.html
It is a noninstantiable class but has a number of properties, described in the following list, that are common to all geometry values created from any of the Geometry subclasses. To ensure SRID 0 behavior, create geometry values using SRID 0.
https://dev.mysql.com/doc/refman/8.0/en/gis-format-conversion-functions.html
See Section 14.16.3, “Functions That Create Geometry Values from WKT Values”, and Section 14.16.4, “Functions That Create Geometry Values from WKB Values”. MySQL supports the functions listed in this section for converting geometry values ...
https://dev.mysql.com/doc/refman/8.0/en/gis-geometry-class-hierarchy.html
The geometry classes define a hierarchy as follows: Geometry (noninstantiable) Point (instantiable) Curve (noninstantiable) LineString (instantiable) Line LinearRing Surface (noninstantiable) Polygon (instantiable) GeometryCollection (instantiable) ...All classes have properties, and instantiable classes may also have assertions (rules that define valid class ...
Displaying 1571 to 1580 of 1832 total results