Search

Download this Manual
PDF (US Ltr) - 43.2Mb
PDF (A4) - 43.3Mb
Man Pages (TGZ) - 295.2Kb
Man Pages (Zip) - 400.4Kb
Info (Gzip) - 4.3Mb
Info (Zip) - 4.3Mb


Displaying 371 to 380 of 2150 total results
https://dev.mysql.com/doc/refman/8.0/en/enterprise-encryption-usage.html
The following general considerations apply when choosing key lengths and encryption algorithms: The strength of encryption for private and public keys increases with the key size, but the time for key generation increases as well. Key string values ...If you install the legacy functions then upgrade to MySQL 8.0.30 or later, the functions you created remain available, are supported, and continue to work in the same ...
https://dev.mysql.com/doc/refman/8.0/en/innodb-information-schema-examples.html
Note This section describes locking information as exposed by the Performance Schema data_locks and data_lock_waits tables, which supersede the INFORMATION_SCHEMA INNODB_LOCKS and INNODB_LOCK_WAITS tables in MySQL 8.0. For similar discussion ...
https://dev.mysql.com/doc/refman/8.0/en/mysql-cluster-security-mysql-privileges.html
This includes all MySQL privilege types (SELECT privilege, UPDATE privilege, DELETE privilege, and so on) granted on the database, table, and column level. In this section, we discuss how the MySQL privilege system works in relation to NDB Cluster ...It is important to keep in mind that, by default, the MySQL grant tables use the InnoDB storage ...
https://dev.mysql.com/doc/refman/8.0/en/replication-asynchronous-connection-failover.html
When you add a group member to the source list and define it as part of a managed group, the asynchronous connection failover mechanism updates the source list to keep it in line with membership changes, adding and removing group members ...The list ... Beginning with MySQL 8.0.22, you can use the asynchronous connection failover mechanism to automatically establish an asynchronous (source to replica) replication connection to a new source after the existing connection from a replica to its source ...
https://dev.mysql.com/doc/refman/8.0/en/replication-options.html
The following sections contain information about mysqld options and server variables that are used in replication and for controlling the binary log. Options and variables for use on sources and replicas are covered separately, as are options and ...The server can be started with this default ID, but when binary logging is enabled, an informational message is issued if you did not set server_id explicitly to specify a server ...
https://dev.mysql.com/doc/refman/8.0/en/mysql-cluster-overview-requirements.html
NDB Cluster requires communication between data nodes and API nodes (including SQL nodes), as well as between data nodes and other data nodes, to execute queries and updates. In addition, to maintain consistency and service despite the silent ...
https://dev.mysql.com/doc/refman/8.0/en/fulltext-fine-tuning.html
Most full-text variables described in this section must be set at server startup time. Note Minimum and maximum word length full-text parameters do not apply to FULLTEXT indexes created using the ngram parser. For example, to make two-character ...
https://dev.mysql.com/doc/refman/8.0/en/innodb-change-buffer.html
Similarly, deletes and updates may affect secondary index pages that are not adjacently located in an index tree. Merging cached changes at a later time, when affected pages are read into the buffer pool by other operations, avoids substantial ...
https://dev.mysql.com/doc/refman/8.0/en/slow-query-log.html
The slow query log can be used to find queries that take a long time to execute and are therefore candidates for optimization. The slow query log consists of SQL statements that take more than long_query_time seconds to execute and require at least ...However, examining a long slow query log can be a time-consuming ...By default, administrative ...
https://dev.mysql.com/doc/refman/8.0/en/replication-gtids-auto-positioning.html
This method is efficient and only takes a significant amount of time if the replica is behind the source by a large number of binary log files. GTIDs replace the file-offset pairs previously required to determine points for starting, stopping, or ...When GTIDs are in use, all the information that the replica needs for synchronizing with the source is obtained directly from the replication data ...
Displaying 371 to 380 of 2150 total results