Search



Search Results
Displaying 1671 to 1680 of 3292 total results
https://dev.mysql.com/doc/refman/8.4/en/group-replication-system-variables.html
group_replication_advertise_recovery_endpoints specifies how a joining member can establish a connection to an existing member for state transfer for distributed recovery. The Performance Schema table replication_group_members shows this ... This ...
https://dev.mysql.com/doc/refman/8.4/en/mysql-cluster-nodes-groups.html
However, it is also possible to employ user-defined partitioning with NDBCLUSTER tables. This is subject to the following limitations: Only the KEY and LINEAR KEY partitioning schemes are supported in production with NDB tables. The maximum number ... This section discusses the manner in which NDB Cluster divides and duplicates data for ...
https://dev.mysql.com/doc/refman/8.4/en/thread-pool-operation.html
As connections are established, the thread pool assigns them to thread groups in round-robin fashion. A statement becomes blocked if it encounters a disk I/O operation or a user level lock (row lock or table lock). Thus, given a mix of statements ...
https://dev.mysql.com/doc/refman/8.4/en/window-functions-usage.html
For example, if a table contains a TIMESTAMP column named ts, standard SQL permits PARTITION BY ts but not PARTITION BY HOUR(ts), whereas MySQL permits both. However, whereas an aggregate operation groups query rows into a single result row, a ...
https://dev.mysql.com/doc/refman/8.4/en/x-plugin-connection-compression.html
The following table compares the characteristics of the different compression algorithms and shows their assigned priorities. Instead, its default is to permit all algorithms shown in Table 22.1, “X Protocol Compression Algorithm ... X Plugin ...
https://dev.mysql.com/doc/c-api/8.4/en/mysql-options.html
Options for information such as SSL certificate and key files are used to establish an encrypted connection if such connections are available, but do not enforce any requirement that the connection obtained be encrypted. The Performance Schema ...
https://dev.mysql.com/doc/extending-mysql/8.4/en/writing-authentication-plugins-server-side.html
auth_string: The value of the authentication_string column of the row in the mysql.user system table for the matching account name (that is, the row that matches the client user name and host name and that the server uses to determine how to ...
https://dev.mysql.com/doc/connectors/en/connector-net-tutorials-document-store.html
This tutorial provides instructions to get you started using MySQL as a document store with MySQL Connector/NET. Minimum Requirements MySQL Server 8.0.11 with X Protocol enabled Connector/NET 8.0.11 Visual Studio 2013/2015/2017 world_x database ...
https://dev.mysql.com/doc/connector-net/en/connector-net-tutorials-document-store.html
This tutorial provides instructions to get you started using MySQL as a document store with MySQL Connector/NET. Minimum Requirements MySQL Server 8.0.11 with X Protocol enabled Connector/NET 8.0.11 Visual Studio 2013/2015/2017 world_x database ...
https://dev.mysql.com/doc/refman/8.4/en/mysql-cluster-replication-abbreviations.html
Throughout this section, we use the following abbreviations or symbols for referring to the source and replica clusters, and to processes and commands run on the clusters or cluster nodes: Table 25.41 Abbreviations used throughout this section ...
Displaying 1671 to 1680 of 3292 total results