Search

Download this Manual
PDF (US Ltr) - 43.3Mb
PDF (A4) - 43.4Mb
Man Pages (TGZ) - 297.2Kb
Man Pages (Zip) - 402.4Kb
Info (Gzip) - 4.3Mb
Info (Zip) - 4.3Mb


Displaying 371 to 380 of 912 total results
https://dev.mysql.com/doc/refman/8.0/en/replication-mode-change-online-verify-transactions.html
This section explains how to monitor a replication topology and verify that all anonymous transactions have been replicated. This is helpful when changing the replication mode online as you can verify that it is safe to change to GTID transactions.
https://dev.mysql.com/doc/refman/8.0/en/replication-sbr-rbr.html
For most users, the mixed replication format should provide the best combination of data integrity and performance. If, however, you want to take advantage of the features specific to the statement-based or row-based replication format when ...
https://dev.mysql.com/doc/refman/8.0/en/show-triggers.html
SHOW TRIGGERS [{FROM | IN} db_name] [LIKE 'pattern' | WHERE expr] SHOW TRIGGERS lists the triggers currently defined for tables in a database (the default database unless a FROM clause is given). This statement returns results only for databases ...
https://dev.mysql.com/doc/refman/8.0/en/socket-pluggable-authentication.html
The server-side auth_socket authentication plugin authenticates clients that connect from the local host through the Unix socket file. The plugin uses the SO_PEERCRED socket option to obtain information about the user running the client program.
https://dev.mysql.com/doc/refman/8.0/en/statement-caching.html
For certain statements that a client might execute multiple times during a session, the server converts the statement to an internal structure and caches that structure to be used during execution. Caching enables the server to perform more ...
https://dev.mysql.com/doc/refman/8.0/en/stored-objects-security.html
Stored programs (procedures, functions, triggers, and events) and views are defined prior to use and, when referenced, execute within a security context that determines their privileges. The privileges applicable to execution of a stored object are ...
https://dev.mysql.com/doc/refman/8.0/en/stored-programs-logging.html
The binary log contains information about SQL statements that modify database contents. This information is stored in the form of “events” that describe the modifications. (Binary log events differ from scheduled event stored objects.) The ...
https://dev.mysql.com/doc/refman/8.0/en/string-functions.html
For functions that operate on string positions, the first position is numbered 1. For functions that take length arguments, noninteger arguments are rounded to the nearest integer. ASCII(str) Returns the numeric value of the leftmost character of ...
https://dev.mysql.com/doc/refman/8.0/en/sys-ps-setup-show-disabled-instruments.html
Displays all currently disabled Performance Schema instruments. This might be a long list. Parameters None. Example mysql> CALL sys.ps_setup_show_disabled_instruments()\G *************************** 1. row *************************** ...
https://dev.mysql.com/doc/refman/8.0/en/sys-ps-setup-show-enabled-instruments.html
Displays all currently enabled Performance Schema instruments. This might be a long list. Parameters None. Example mysql> CALL sys.ps_setup_show_enabled_instruments()\G *************************** 1. row *************************** ...
Displaying 371 to 380 of 912 total results