Search

Download this Manual
PDF (US Ltr) - 43.3Mb
PDF (A4) - 43.4Mb
Man Pages (TGZ) - 297.2Kb
Man Pages (Zip) - 402.4Kb
Info (Gzip) - 4.3Mb
Info (Zip) - 4.3Mb


Displaying 771 to 780 of 2047 total results
https://dev.mysql.com/doc/refman/8.0/en/assignment-operators.html
Table 14.6 Assignment Operators Name Description := Assign a value = Assign a value (as part of a SET statement, or as part of the SET clause in an UPDATE statement) := Assignment operator. Causes the user variable on the left hand side of the ...
https://dev.mysql.com/doc/refman/8.0/en/charset-binary-collations.html
This section describes how the binary collation for binary strings compares to _bin collations for nonbinary strings. Binary strings (as stored using the BINARY, VARBINARY, and BLOB data types) have a character set and collation named binary.
https://dev.mysql.com/doc/refman/8.0/en/group-replication-secure-socket-layer-support-ssl.html
From MySQL 8.0.16, you can change the tls_version system variable at runtime to alter the list of permitted TLS protocol versions for the server. If SSL is used, the means for configuring the secure connection depends on whether the XCom or the ...
https://dev.mysql.com/doc/refman/8.0/en/replication-administration-pausing.html
From MySQL 8.0.22, STOP SLAVE and START SLAVE are deprecated, and STOP REPLICA and START REPLICA are available to use instead. You can stop and start replication on the replica using the STOP REPLICA and START REPLICA statements. The I/O (receiver) ...
https://dev.mysql.com/doc/refman/8.0/en/replication-encrypted-connections.html
For more information on setting up a server and client for encrypted connections, see Section 8.3.1, “Configuring MySQL to Use Encrypted Connections”. To enable encrypted connections on the replica, use the CHANGE REPLICATION SOURCE TO statement ... To use an encrypted connection for the transfer of the binary log required during replication, both the source and the replica servers must support encrypted network ...
https://dev.mysql.com/doc/refman/8.0/en/security-plugins.html
MySQL includes several components and plugins that implement security features: Plugins for authenticating attempts by clients to connect to MySQL Server. (MySQL Enterprise Edition only) MySQL Enterprise Audit, implemented using a server plugin, ...
https://dev.mysql.com/doc/refman/8.0/en/selinux-troubleshooting.html
File Contexts If a MySQL directory or file has an incorrect SELinux context, access may be denied. This issue can occur if MySQL is configured to read from or write to a non-default directory or file. For example, if you configure MySQL to use a ...
https://dev.mysql.com/doc/refman/8.0/en/window-function-descriptions.html
It is part of the SQL standard, but the MySQL implementation permits only RESPECT NULLS (which is also the default). Beginning with MySQL 8.0.22, you cannot use a negative value for the rows argument of this function. In MySQL 8.0.22 and later, use ... This section describes nonaggregate window functions that, for each row from a query, perform a calculation using rows related to that ...
https://dev.mysql.com/doc/refman/8.0/en/backup-policy.html
A full backup (a snapshot of the data at a point in time) can be done in MySQL with several tools. For example, MySQL Enterprise Backup can perform a physical backup of an entire instance, with optimizations to minimize overhead and avoid disruption ...This backup operation acquires a global read lock on all tables at the beginning of the dump (using FLUSH TABLES WITH READ ...
https://dev.mysql.com/doc/refman/8.0/en/clone-plugin-options-variables.html
The delay is intended to provide enough time for the file system on the recipient host to free space before data is cloned from the donor MySQL Server instance. They can be changed dynamically at runtime using the SET statement, which enables you to ... This section describes the system variables that control operation of the clone ...
Displaying 771 to 780 of 2047 total results