Search Results
https://dev.mysql.com/doc/mysql-em-plugin/en/myoem-config-metric-myisamfulltext-category.html
Lists the Myisam Full Text configuration metrics and provides a brief description of each. Table 7.22 Myisam Full Text Configuration Metrics NameDescriptionBoolean Syntax The list of operators supported by boolean full-text searches performed using ...
https://dev.mysql.com/doc/relnotes/heatwave/en/news-9-5-0.html
Note These release notes were created with the assistance of MySQL HeatWave GenAI. MySQL HeatWave AutoML MySQL HeatWave GenAI MySQL HeatWave Lakehouse MySQL HeatWave MySQL HeatWave AutoML MySQL HeatWave AutoML now supports enhanced log anomaly ...
https://dev.mysql.com/doc/connector-j/en/connector-j-connp-props-authentication.html
If none is specified, it is authentication plugin dependent what user name is used. Since Version all versions password The password to use when authenticating the user. Since Version all versions password1 The password to use in the first phase of ...
https://dev.mysql.com/doc/connector-j/en/connector-j-connp-props-result-sets.html
clobberStreamingResults This will cause a streaming result set to be automatically closed, and any outstanding data still streaming from the server to be discarded if another query is executed before all the data has been read from the server.
https://dev.mysql.com/doc/connector-j/en/connector-j-using-mfa.html
Multifactor authentication (MFA) is the use of multiple authentication factors during an authentication process. When authenticating user accounts that require multiple passwords, up to three passwords can be specified using the Connector/J ...
https://dev.mysql.com/doc/refman/8.4/en/begin-end.html
END syntax is used for writing compound statements, which can appear within stored programs (stored procedures and functions, triggers, and events). A compound statement can contain multiple statements, enclosed by the BEGIN and END keywords.
https://dev.mysql.com/doc/refman/8.4/en/connection-access.html
Rather, the password supplied by a user who is attempting to connect is encrypted (using the password hashing method implemented by the account authentication plugin). When you attempt to connect to a MySQL server, the server accepts or rejects the ...
https://dev.mysql.com/doc/refman/8.4/en/error-log-priority-based-filtering.html
The log_filter_internal log filter component implements a simple form of log filtering based on error event priority and error code. To affect how log_filter_internal permits or suppresses error, warning, and information events intended for the ...
https://dev.mysql.com/doc/refman/8.4/en/information-schema-optimizer-trace-table.html
The OPTIMIZER_TRACE table provides information produced by the optimizer tracing capability for traced statements. The OPTIMIZER_TRACE table has these columns: QUERY The text of the traced statement. MISSING_BYTES_BEYOND_MAX_MEM_SIZE Each ...
https://dev.mysql.com/doc/refman/8.4/en/performance-schema-log-status-table.html
The log_status table provides information that enables an online backup tool to copy the required log files without locking those resources for the duration of the copy process. When the log_status table is queried, the server blocks logging and ...