Search Results
https://dev.mysql.com/doc/refman/8.4/en/mrr-optimization.html
Reading rows using a range scan on a secondary index can result in many random disk accesses to the base table when the table is large and not stored in the storage engine's cache. With the Disk-Sweep Multi-Range Read (MRR) optimization, MySQL ...
https://dev.mysql.com/doc/refman/8.4/en/multiple-unix-servers.html
It is also possible to use the same server binary and start each invocation of it with different parameter values at runtime. For MySQL installation using an RPM distribution, server startup and shutdown is managed by systemd on several Linux ...
https://dev.mysql.com/doc/refman/8.4/en/mysql-gr-memory-monitoring-ps-sample-queries.html
This section describes sample queries using the instruments and events for monitoring Group Replication memory usage. row *************************** EVENT_NAME: memory/group_rpl/memory_gr SUM(COUNT_ALLOC): 127 SUM(COUNT_FREE): 117 ...The memory ...
https://dev.mysql.com/doc/refman/8.4/en/performance-schema-status-variable-tables.html
There are also summary tables that provide status variable information aggregated by account, host name, and user name. To obtain global and per-session statement execution counts, use the events_statements_summary_global_by_event_name and ... The ...
https://dev.mysql.com/doc/refman/8.4/en/replication-asynchronous-connection-failover-replica.html
The feature is designed for a group of senders and a group of receivers to keep synchronized with each other even when some members are temporarily unavailable. When the feature is active and correctly configured, if the primary that is replicating ... Asynchronous connection failover for replicas is activated automatically for a replication channel on a Group Replication primary when you set SOURCE_CONNECTION_AUTO_FAILOVER=1 in the CHANGE REPLICATION SOURCE TO statement for the ...
https://dev.mysql.com/doc/refman/8.4/en/replication-encrypted-connections.html
To use an encrypted connection for the transfer of the binary log required during replication, both the source and the replica servers must support encrypted network connections. You must obtain (or create) a suitable security certificate that you ...If either server does not support encrypted connections (because it has not been compiled or configured for them), replication through an encrypted connection is not ...
https://dev.mysql.com/doc/refman/8.4/en/replication-formats.html
Replication works because events written to the binary log are read from the source and then processed on the replica. The correlation between binary logging formats and the terms used during replication are: When using statement-based binary ...
https://dev.mysql.com/doc/refman/8.4/en/replication-functions-async-failover.html
For more information on the mechanism, see Section 19.4.9, “Switching Sources and Replicas with Asynchronous Connection Failover”. Source lists are stored in the mysql.replication_asynchronous_connection_failover and ... The following functions ...
https://dev.mysql.com/doc/refman/8.4/en/replication-upgrade.html
In other words, stop client updates on the source, wait for at least one replica to apply all changes, reconfigure the replication topology so that replica becomes the source and that the source is left outside the replication topology. When you ...
https://dev.mysql.com/doc/refman/8.4/en/row-subqueries.html
A row subquery is a subquery variant that returns a single row and can thus return more than one column value. If this row has col3 and col4 values equal to the col1 and col2 values of any rows in t1, the WHERE expression is TRUE and each query ...