Search



Search Results
Displaying 1381 to 1390 of 4736 total results
https://dev.mysql.com/doc/refman/8.4/en/clone-plugin-installation.html
This section describes how to install and configure the clone plugin. For remote cloning operations, the clone plugin must be installed on the donor and recipient MySQL server instances. For general information about installing or uninstalling ...
https://dev.mysql.com/doc/refman/8.4/en/clone-plugin-replication.html
In addition to cloning data, a cloning operation extracts replication coordinates from the donor and transfers them to the recipient, which enables using the clone plugin for provisioning Group Replication members and replicas. Using the clone ...
https://dev.mysql.com/doc/refman/8.4/en/connecting-disconnecting.html
To connect to the server, you usually need to provide a MySQL user name when you invoke mysql and, most likely, a password. If the server runs on a machine other than the one where you log in, you must also specify a host name. Contact your ...
https://dev.mysql.com/doc/refman/8.4/en/constraint-primary-key.html
Normally, errors occur for data-change statements (such as INSERT or UPDATE) that would violate primary-key, unique-key, or foreign-key constraints. If you are using a transactional storage engine such as InnoDB, MySQL automatically rolls back the ...
https://dev.mysql.com/doc/refman/8.4/en/create-table-check-constraints.html
CREATE TABLE permits the core features of table and column CHECK constraints, for all storage engines. CREATE TABLE permits the following CHECK constraint syntax, for both table constraints and column constraints: [CONSTRAINT [symbol]] CHECK (expr) ...
https://dev.mysql.com/doc/refman/8.4/en/creating-ssl-rsa-files-using-mysql.html
MySQL provides these ways to create the SSL certificate and key files and RSA key-pair files required to support encrypted connections using SSL and secure password exchange using RSA over unencrypted connections, if those files are missing: The ...
https://dev.mysql.com/doc/refman/8.4/en/data-masking-component-variables.html
The MySQL Enterprise Data Masking and De-Identification components support the following system variables. Variables are unavailable unless the appropriate MySQL Enterprise Data Masking and De-Identification components are installed (see Section ...
https://dev.mysql.com/doc/refman/8.4/en/data-masking-components-installation.html
Components provide expanded access to MySQL Enterprise Data Masking and De-Identification functionality. Previously, MySQL implemented masking and de-identification capabilities as a plugin library file containing a plugin and several loadable ...
https://dev.mysql.com/doc/refman/8.4/en/date-and-time-type-syntax.html
The date and time data types for representing temporal values are DATE, TIME, DATETIME, TIMESTAMP, and YEAR. For the DATE and DATETIME range descriptions, “supported” means that although earlier values might work, there is no guarantee. MySQL ...
https://dev.mysql.com/doc/refman/8.4/en/debugging-server.html
If you are using some functionality that is very new in MySQL, you can try to run mysqld with the --skip-new option (which disables all new, potentially unsafe functionality). If mysqld does not want to start, verify that you have no my.cnf files ...
Displaying 1381 to 1390 of 4736 total results