Search Results
https://dev.mysql.com/doc/refman/8.4/en/error-log-components.html
Typically, a sink processes log events into log messages that have a particular format and writes these messages to its associated output, such as a file or the system log. This section describes the characteristics of individual error log ...
https://dev.mysql.com/doc/refman/8.4/en/error-log-configuration.html
Typically, a sink processes log events into log messages that have a particular format and writes these messages to its associated output, such as a file or the system log. In MySQL 8.4, error logging uses the MySQL component architecture described ...
https://dev.mysql.com/doc/refman/8.4/en/error-log-event-fields.html
Optional Error Event Fields Optional error event fields fall into the following categories: Additional information about the error, such as the error signaled by the operating system or the error label: OS_errno The operating system error number.
https://dev.mysql.com/doc/refman/8.4/en/event-scheduler.html
The following discussion covers the Event Scheduler and is divided into the following sections: Section 27.4.1, “Event Scheduler Overview”, provides an introduction to and conceptual overview of MySQL Events. The MySQL Event Scheduler manages ...
https://dev.mysql.com/doc/refman/8.4/en/events-status-info.html
INTO var_list statements, if the query returns no rows, a warning with error code 1329 occurs (No data), and the variable values remain unchanged. The Event Scheduler writes information about event execution that terminates with an error or warning ...
https://dev.mysql.com/doc/refman/8.4/en/faqs-tablespace-encryption.html
The master encryption key is rotated using the ALTER INSTANCE ROTATE INNODB MASTER KEY statement, which generates a new master encryption key, stores the key, and rotates the key into use. Is data decrypted for users who are authorized to see it? ...
https://dev.mysql.com/doc/refman/8.4/en/fetch.html
This statement fetches the next row for the SELECT statement associated with the specified cursor (which must be open), and advances the cursor pointer. If a row exists, the fetched columns are stored in the named variables. The number of columns ...
https://dev.mysql.com/doc/refman/8.4/en/firewall-elements.html
The MYSQL_FIREWALL plugin, along with server-side plugins named MYSQL_FIREWALL_USERS and MYSQL_FIREWALL_WHITELIST implement Performance Schema and INFORMATION_SCHEMA tables that provide views into the registered profiles. MySQL Enterprise Firewall ...
https://dev.mysql.com/doc/refman/8.4/en/firewall-information-schema-tables.html
The following sections describe the INFORMATION_SCHEMA tables associated with MySQL Enterprise Firewall (see Section 8.4.7, “MySQL Enterprise Firewall”). These tables are available only if the appropriate firewall plugins are enabled.
https://dev.mysql.com/doc/refman/8.4/en/flow-control-functions.html
The default return type of IF() (which may matter when it is stored into a temporary table) is calculated as follows: If expr2 or expr3 produce a string, the result is a string. The second syntax returns the result for the first condition that is ...