Search Results
https://dev.mysql.com/doc/refman/8.4/en/version-tokens-usage.html
An administrative or management application that communicates with the servers and organizes them into high-availability groups. (Version Tokens uses the locking service routines built into the server, not the locking service function interface, so ... Before using Version Tokens, install it according to the instructions provided at Section 7.6.6.2, “Installing or Uninstalling Version ...
https://dev.mysql.com/doc/refman/8.4/en/view-algorithms.html
For TEMPTABLE, the results from the view are retrieved into a temporary table, which then is used to execute the statement. As mentioned earlier, MERGE is handled by merging corresponding parts of a view definition into the statement that refers to ... The optional ALGORITHM clause for CREATE VIEW or ALTER VIEW is a MySQL extension to standard ...
https://dev.mysql.com/doc/refman/8.4/en/what-is-crashing.html
This can normally be checked by pressing the Caps Lock key. If the Caps Lock light does not change, you have to replace your keyboard. (Before doing this, you should try to restart your computer and check all cables to the keyboard.) The mouse ...
https://dev.mysql.com/doc/refman/8.4/en/windows-choosing-package.html
The noinstall ZIP archives are split into two separate compressed files. If this occurs, you can move the contents of the subfolder into the chosen installation location. For MySQL 8.4, there are multiple installation package formats to choose from ...
https://dev.mysql.com/doc/refman/8.4/en/x-plugin-system-monitoring.html
When you execute a CRUD statement, it is translated into SQL and executed against the server. Issue: mysql-py> \sql SELECT thread_id INTO @id FROM performance_schema.threads WHERE processlist_id=connection_id() Execute the X DevAPI CRUD operation ...
https://dev.mysql.com/doc/refman/8.4/en/xml-functions.html
code injection occurs when malicious code is introduced into the system to gain unauthorized access to privileges and data. Table 14.16 XML Functions Name Description ExtractValue() Extract a value from an XML string using XPath notation ...
https://dev.mysql.com/doc/mysql-enterprise-backup/8.4/en/advanced.encrypted-binlog-relaylog.html
mysqlbackup then copies over from the server the encrypted keyring data file, which contains the replication master key used to encrypt all the passwords for the individual log files, into the meta folder in the backup and names the file keyring_kef. The replication master key is then put into a keyring data file, which is encrypted with the user password supplied with the option --encrypt-password, and then saved under the meta folder in the backup with the name ...
https://dev.mysql.com/doc/mysql-enterprise-backup/8.4/en/advanced.point.html
You can restore your database server to its state at an arbitrary time using the binary log files included in the backups. The process assumes that following conditions are met: The backed-up MySQL Server has had its binary logging enabled (which ...
https://dev.mysql.com/doc/mysql-enterprise-backup/8.4/en/backup-cloud-options.html
A backup larger than the value of --cloud-chunk-size is split into multiple segments. A backup larger than the value of --cloud-chunk-size is split into multiple segments. These options are for using cloud storage for single-file operations. See ...
https://dev.mysql.com/doc/mysql-enterprise-backup/8.4/en/index.html
Abstract This is the user manual for MySQL Enterprise Backup, a commercially licensed backup utility for MySQL databases. It explains the different kinds of backup and restore that can be performed with MySQL Enterprise Backup, and describes the ...