Search Results
https://dev.mysql.com/doc/refman/8.4/en/performance-schema-pre-filtering.html
Pre-filtering is done by the Performance Schema and has a global effect that applies to all users. Modifications to any of these tables affect monitoring immediately, with the exception that modifications to the setup_actors table affect only ...
https://dev.mysql.com/doc/refman/8.4/en/performance-schema-tp-thread-group-stats-table.html
WAKE_THREAD_STALL_CHECKER The number of times the stall check thread decided to wake or create a thread to possibly handle some statements or take care of the waiter thread role. USER_LOCK_WAITS The number of THD_WAIT_USER_LOCK waits for a special ...The tp_thread_group_stats table has these columns: TP_GROUP_ID The thread group ...
https://dev.mysql.com/doc/refman/8.4/en/performance-schema-tp-thread-state-table.html
The tp_thread_state table has one row per thread created by the thread pool to handle connections. The tp_thread_state table has these columns: TP_GROUP_ID The thread group ID. TP_GROUP_ID and TP_THREAD_NUMBER together provide a unique key within ...
https://dev.mysql.com/doc/refman/8.4/en/plugin-loading.html
If a user attempts to do so with UNINSTALL PLUGIN, an error occurs. For example, if the plugin implements a storage engine, existing tables for the storage engine become inaccessible, and attempts to create new tables for the storage engine result ... Server plugins must be loaded into the server before they can be ...
https://dev.mysql.com/doc/refman/8.4/en/point-in-time-recovery-binlog.html
By default, the server creates binary log files in the data directory, but a path name can be specified with the --log-bin option to place the files in a different location. For example: $> mysqlbinlog --read-from-remote-server --host=host_name ...
https://dev.mysql.com/doc/refman/8.4/en/replication-binlog-encryption.html
MySQL binary log files and relay log files can be encrypted, helping to protect these files and the potentially sensitive data contained in them from being misused by outside attackers, and also from unauthorized viewing by users of the operating ...The encryption algorithm used for the files, the AES (Advanced Encryption Standard) cipher algorithm, is built in to MySQL Server and cannot be ...
https://dev.mysql.com/doc/refman/8.4/en/replication-multi-source-adding-gtid-master.html
These steps assume you have enabled GTIDs for transactions on the sources using gtid_mode=ON, created a replication user, ensured that the replica is using TABLE based replication applier metadata repositories, and provisioned the replica with data ...Use CHANGE REPLICATION SOURCE TO to configure a replication channel for each source on the replica (see Section 19.2.2, “Replication ...
https://dev.mysql.com/doc/refman/8.4/en/replication-options.html
server_uuid The MySQL server generates a true UUID in addition to the default or user-supplied server ID set in the server_id system variable. If data_dir/auto.cnf is not found, generate a new UUID and save it to this file, creating the file if ...
https://dev.mysql.com/doc/refman/8.4/en/replication-solutions-backups-mysqldump.html
Using mysqldump to create a copy of a database enables you to capture all of the data in the database in a format that enables the information to be imported into another instance of MySQL Server (see Section 6.5.4, “mysqldump — A Database ...
https://dev.mysql.com/doc/refman/8.4/en/replication-solutions-scaleout.html
Most websites fit into this category, where users are browsing the website, reading articles, posts, or viewing products. Start by creating a wrapper library or module that implements the following functions: safe_writer_connect() ... You can use ...