PDF (US Ltr)
- 43.3Mb
PDF (A4)
- 43.4Mb
Man Pages (TGZ)
- 297.2Kb
Man Pages (Zip)
- 402.4Kb
Info (Gzip)
- 4.3Mb
Info (Zip)
- 4.3Mb
Search Results
https://dev.mysql.com/doc/refman/8.0/en/mysql-cluster-ndb-api-statistics.html
Such actions include starting and closing (or aborting) transactions; primary key and unique key operations; table, range, and pruned scans; threads blocked while waiting for the completion of various operations; and data and events sent and ... A ...
https://dev.mysql.com/doc/refman/8.0/en/mysql-cluster-tcp-definition.html
This parameter can be used to determine the amount of unsent data that must be present in the send buffer before the connection is considered overloaded. To override the default connection parameters, it is necessary to define a connection using one ... TCP/IP is the default transport mechanism for all connections between nodes in an NDB ...Note For an exception to ...
https://dev.mysql.com/doc/refman/8.0/en/windows-start-service.html
The error log is located in the MySQL data directory (for example, C:\Program Files\MySQL\MySQL Server 8.0\data). Note On Windows, if the server is started with the --defaults-file and --install options, --install must be first. Install the server ... On Windows, the recommended way to run MySQL is to install it as a Windows service, so that MySQL starts and stops automatically when Windows starts and ...
https://dev.mysql.com/doc/refman/8.0/en/dynamic-system-variables.html
This differs from the ENUM data type used for table columns, for which the first enumeration value corresponds to 1. For a description of the privilege requirements for setting system variables, see Section 7.1.9.1, “System Variable Privileges” ... Many server system variables are dynamic and can be set at ...
https://dev.mysql.com/doc/refman/8.0/en/set-variable.html
SET can also be used to persist certain system variables to the mysqld-auto.cnf file in the data directory, to affect server operation for subsequent startups. To make a global system variable setting permanent so that it applies across server ...| ...variable: { user_var_name | param_name | local_var_name | {GLOBAL | @@GLOBAL.} system_var_name | {PERSIST | @@PERSIST.} system_var_name | {PERSIST_ONLY | @@PERSIST_ONLY.} system_var_name | [SESSION | ...
https://dev.mysql.com/doc/refman/8.0/en/insert.html
Data conversions that would trigger errors abort the statement if IGNORE is not specified. If any of the rows to be inserted by a given INSERT statement do not match one of the partitions listed, the INSERT statement fails with the error Found a row ...SET forms of the statement insert rows based on explicitly specified ... INSERT [LOW_PRIORITY | DELAYED | HIGH_PRIORITY] [IGNORE] [INTO] tbl_name [PARTITION (partition_name [, partition_name] ...)] ...
https://dev.mysql.com/doc/refman/8.0/en/replica-sql-thread-states.html
Making temporary file (append) before replaying LOAD DATA INFILE The thread is executing a LOAD DATA statement and is appending the data to a temporary file containing the data from which the replica reads rows. Making temporary file (create) before ...This state can only be encountered if the original LOAD DATA statement was logged by a source running a version of MySQL lower than MySQL ...
https://dev.mysql.com/doc/refman/8.0/en/deploy-mysql-nonlinux-docker.html
This is because the way Docker for Windows handles file mounting does not allow a host file from being bind-mounted on the socket file. Warning The MySQL Docker images provided by Oracle are built specifically for Linux platforms. Other platforms ...
https://dev.mysql.com/doc/refman/8.0/en/known-issues.html
To retain the same log file names if you change your host name to something else, you must explicitly use options such as --log-bin=old_host_name-bin. If these are binary logs, you must edit the binary log index file and fix the binary log file ...
https://dev.mysql.com/doc/refman/8.0/en/enterprise-encryption-functions.html
MySQL Enterprise Encryption functions have these general characteristics: For arguments of the wrong type or an incorrect number of arguments, each function returns an error. asymmetric_decrypt(algorithm, data_str, priv_key_str) Decrypts an ... In ...This occurs, for example, if a function does not support a specified algorithm, a key length is too short or long, or a string expected to be a key string in PEM format is not a valid ...