Search



Search Results
Displaying 91 to 100 of 1104 total results
https://dev.mysql.com/doc/refman/8.4/en/mysql-cluster-security-networking-issues.html
(We show the management and data nodes connected using a gigabit switch since this provides the best performance.) Both networks are protected from the outside by a hardware firewall, sometimes also known as a network-based firewall. It is also ...
https://dev.mysql.com/doc/refman/8.4/en/optimizer-hints.html
If one subquery is nested within another and both are merged into a semijoin of an outer query, any specification of semijoin strategies for the innermost query are ignored. One means of control over optimizer strategies is to set the ...
https://dev.mysql.com/doc/refman/8.4/en/partitioning-selection.html
Whereas partition pruning applies only to queries, explicit selection of partitions is supported for both queries and a number of DML statements. Explicit selection of partitions and subpartitions for rows matching a given WHERE condition is ...
https://dev.mysql.com/doc/refman/8.4/en/performance-schema-consumer-filtering.html
Wait Event Consumers These consumers require both global_instrumentation and thread_instrumentation to be YES or they are not checked. Stage Event Consumers These consumers require both global_instrumentation and thread_instrumentation to be YES or ...To enable or disable a consumer, set its ENABLED value to YES or ...
https://dev.mysql.com/doc/refman/8.4/en/performance-schema-memory-summary-tables.html
Allocating a single byte one million times is not the same as allocating one million bytes a single time; tracking both sizes and counts can expose the difference. Otherwise (that is, both the thread and the instrument are enabled), the memory block ...Operation counts help to understand or tune the overall pressure the server is putting on the memory allocator, which has an impact on ...
https://dev.mysql.com/doc/refman/8.4/en/pluggable-authentication-system-variables.html
(These are both empty by default, so if they are not set, the LDAP server must permit anonymous connections.) The resulting bind LDAP handle is used to search for the user DN, based on the client user name. The following value is the default, which ...The file name should be given as an absolute path ...
https://dev.mysql.com/doc/refman/8.4/en/replication-rules-examples.html
If these operations update both filtered-in and filtered-out tables, the results can vary with the binary logging format. Also, do not use multi-table DML statements that update both filtered-in and filtered-out tables. If you use statement-based or ... If you use a combination of database-level and table-level replication filtering options, the replica first accepts or ignores events using the database options, then it evaluates all events permitted by those options according to the table ...
https://dev.mysql.com/doc/refman/8.4/en/server-options.html
Use both the --verbose and --help options to see the full message. If both --defaults-file and --local-service are given following the service name, they can be in any order. On Windows, --console takes precedence over --log-error if both are given.
https://dev.mysql.com/doc/refman/8.4/en/server-status-variables.html
Includes both implicit (InnoDB-created) and explicit (user-created) undo tablespaces, active and inactive. The MySQL server maintains many status variables that provide information about its operation. You can view these variables and their values ...
https://dev.mysql.com/doc/refman/8.4/en/socket-pluggable-authentication.html
If a user named valerie tries the same thing, the plugin finds that the user name and the MySQL user name are both valerie and permits the connection. The server-side auth_socket authentication plugin authenticates clients that connect from the ...
Displaying 91 to 100 of 1104 total results