Search



Search Results
Displaying 1441 to 1450 of 5281 total results
https://dev.mysql.com/doc/refman/8.4/en/point-in-time-recovery-binlog.html
To restore data from the binary log, you must know the name and location of the current binary log files. By default, the server creates binary log files in the data directory, but a path name can be specified with the --log-bin option to place the ...The source of information for point-in-time recovery is the set of binary log files generated subsequent to the full backup ...Viewing log ...
https://dev.mysql.com/doc/refman/8.4/en/can-not-connect-to-server.html
A MySQL client on Unix can connect to the mysqld server in two different ways: By using a Unix socket file to connect through a file in the file system (default /tmp/mysql.sock), or by using TCP/IP, which connects through a port number. A Unix ...
https://dev.mysql.com/doc/refman/8.4/en/blob.html
For truncation of nonspace characters, you can cause an error to occur (rather than a warning) and suppress insertion of the value by using strict SQL mode. This means that, if the index requires unique values, duplicate-key errors occur for values ... A BLOB is a binary large object that can hold a variable amount of ...In most respects, you can ...
https://dev.mysql.com/doc/refman/8.4/en/mysql-cluster-online-operations.html
For ALGORITHM=COPY, the mysqld NDB Cluster handler performs the following actions: Tells the data nodes to create an empty copy of the table, and to make the required schema changes to this copy. Tells the data nodes to drop the original table and ...NDB Cluster handles COPY and INPLACE as described in the next few ... MySQL ...
https://dev.mysql.com/doc/heatwave/en/mys-hwaml-anomaly-detection-logs.html
If the primary key column (or columns) is not one of the previous required columns (log data, source of log, or label), then you must use the exclude_column_list option when running ML_TRAIN to exclude all primary key columns that don't include ...
https://dev.mysql.com/doc/refman/8.4/en/keyring.html
These keyring components are available: component_keyring_file: Stores keyring data in a file local to the server host. component_keyring_encrypted_file: Stores keyring data in an encrypted, password-protected file local to the server host. The ...
https://dev.mysql.com/doc/mysql-em-plugin/en/myoem-performance-page-per-user-stats.html
File IO Latency The total wait time of timed file I/O events for the user. File IOs The total number of file I/O events for the user. Table 5.11 Per User Statistics Dashboard NameDescription User The client user name. Rows for which the USER column ...
https://dev.mysql.com/doc/refman/8.4/en/drop-tablespace.html
An NDB tablespace to be dropped must not contain any data files; in other words, before you can drop an NDB tablespace, you must first drop each of its data files using ALTER TABLESPACE ... Similar to the system tablespace, truncating or dropping ...
https://dev.mysql.com/doc/ndbapi/en/mccj-using-clusterj-annotations.html
In ClusterJ (as in JPA), annotations are used to describe how the interface is mapped to tables in a database. The annotation @PersistenceCapable(table="employee") is used to let ClusterJ know which database table to map the Employee to (in this ...
https://dev.mysql.com/doc/refman/8.4/en/multiple-servers.html
If you use the following log file options, their values must differ for each server: --general_log_file=file_name --log-bin[=file_name] --slow_query_log_file=file_name --log-error[=file_name] For further discussion of log file options, see Section ...In addition to using different data directories, several other options must have different values for each server instance: --port=port_num --port controls the port number for TCP/IP ...
Displaying 1441 to 1450 of 5281 total results