Search Results
https://dev.mysql.com/doc/connector-net/en/connector-net-entityframework60.html
For this option, select nuget.org as the package source, search for mysql.data, and install a stable version of MySql.Data.EntityFramework. Set the DbConfiguration type in the configuration file: <entityFramework ... MySQL Connector/NET integrates ...
https://dev.mysql.com/doc/internals/en/perfect-cleanup.html
Cleaning up becomes much more comfortable and less error prone if you create your "own" database and create all tables there. Do not forget to remove all users you created and all permissions you granted. Close all connections which you have ...At ...
https://dev.mysql.com/doc/heatwave/en/mys-hwaml-topic-modeling-prepare.html
mysql> CREATE DATABASE topic_modeling_data; mysql> USE topic_modeling_data; Create the table to use for both training and testing. mysql> CREATE TABLE movies ( description TEXT ); Insert the sample data into the table. They find themselves on an ...
https://dev.mysql.com/doc/refman/8.4/en/alter-logfile-group.html
You can verify that the undo files were created and obtain information about them by querying the Information Schema FILES table. For example, you cannot have a tablespace and an undo log file with the same name, or an undo log file and a data file ... ALTER LOGFILE GROUP logfile_group ADD UNDOFILE 'file_name' [INITIAL_SIZE [=] size] [WAIT] ENGINE [=] engine_name This statement adds an UNDO file named 'file_name' to an existing log file group ...
https://dev.mysql.com/doc/refman/8.4/en/group-replication-secure-user.html
State transfer from the binary log requires a replication user with the correct permissions so that Group Replication can establish direct member-to-member replication channels. To secure the user credentials, you can require SSL for connections ...
https://dev.mysql.com/doc/refman/8.4/en/locking-service.html
The namespace enables different applications to use the same lock names without colliding by creating locks in separate namespaces. Locking Service Monitoring The locking service is implemented using the MySQL Server metadata locks framework, so you ... MySQL distributions provide a locking interface that is accessible at two levels: At the SQL level, as a set of loadable functions that each map onto calls to the service ...
https://dev.mysql.com/doc/refman/8.4/en/sha256-pluggable-authentication.html
The following table shows the plugin names on the server and client sides. Assuming that MySQL has been compiled using OpenSSL, use the following procedure to enable use of an RSA key pair for password exchange during the client connection process: ... MySQL provides two authentication plugins that implement SHA-256 hashing for user account passwords: caching_sha2_password: Implements SHA-256 authentication (like sha256_password), but uses caching on the server side for better performance and has additional features for wider ...
https://dev.mysql.com/doc/refman/8.4/en/show-procedure-status.html
It returns characteristics of a stored procedure, such as the database, name, type, creator, creation and modification dates, and character set information. To use either statement, you must be the user named as the routine DEFINER, have the ...
https://dev.mysql.com/doc/mysql-enterprise-backup/8.4/en/mysqlbackup.backup.html
The unique ID for this backup job is recorded in special tables that mysqlbackup creates inside the MySQL instance, allowing you to monitor long-running backups and view information on previous backups. 240426 13:01:23 MAIN INFO: Backup directory ...
https://dev.mysql.com/doc/mysql-cluster-manager/8.4/en/mcm-install-tarball.html
On Solaris, gtar is often already installed in the /usr/sfw/bin directory, although the gtar executable may not be included in your path. When the agent runs for the first time, it creates a directory where the agent stores its own configuration ...