Search Results
https://dev.mysql.com/doc/refman/8.4/en/example-user-variables.html
You can employ MySQL user variables to remember results without having to store them in temporary variables in the client.
https://dev.mysql.com/doc/refman/8.4/en/faqs-c-api.html
What is “MySQL Native C API”? What are typical benefits and use cases? A.13.2. What if I want to use the “NoSQL” X DevAPI? A.13.4. What is “MySQL Native C API”? What are typical benefits and use cases? libmysql is a C-based API that you ...
https://dev.mysql.com/doc/refman/8.4/en/faqs-information-schema.html
Where can I find documentation for the MySQL INFORMATION_SCHEMA database? A.7.2. Where can I find the ANSI SQL 2003 specification for INFORMATION_SCHEMA? A.7.4. What is the difference between the Oracle Data Dictionary and MySQL INFORMATION_SCHEMA? ...
https://dev.mysql.com/doc/refman/8.4/en/faqs-innodb-change-buffer.html
What types of operations modify secondary indexes and result in change buffering? A.16.2. How much space does InnoDB use for the change buffer? A.16.5. How do I determine the current size of the change buffer? A.16.6. Where can I find additional ...
https://dev.mysql.com/doc/refman/8.4/en/federated-create-server.html
If you are creating a number of FEDERATED tables on the same server, or if you want to simplify the process of creating FEDERATED tables, you can use the CREATE SERVER statement to define the server connection parameters, just as you would with the ...
https://dev.mysql.com/doc/refman/8.4/en/fulltext-restrictions.html
Full-text searches are supported for InnoDB and MyISAM tables only. The exception is that for Unicode, the utf8mb3 or utf8mb4 character set can be used, but not the ucs2 character set. Although FULLTEXT indexes on ucs2 columns cannot be used, you ...
https://dev.mysql.com/doc/refman/8.4/en/general-security-issues.html
This section describes general security issues to be aware of and what you can do to make your MySQL installation more secure against attack or misuse. For information specifically about the access control system that MySQL uses for setting up user ...
https://dev.mysql.com/doc/refman/8.4/en/gpg-key-archived-packages.html
The following GPG public build key (keyID 3A79BD29) can be used to verify the authenticity and integrity of MySQL packages versions 8.0.28 through 8.0.35, 8.1.0, and 8.2.0. For signature checking instructions, see Section 2.1.4.2, “Signature ...
https://dev.mysql.com/doc/refman/8.4/en/group-replication-deploying-locally.html
The most common way to deploy Group Replication is using multiple server instances, to provide high availability. It is also possible to deploy Group Replication locally, for example for testing purposes. Important Group Replication is usually ...
https://dev.mysql.com/doc/refman/8.4/en/group-replication-distributed-recovery-fault.html
Group Replication's distributed recovery process has a number of built-in measures to ensure fault tolerance in the event of any problems during the process. The donor for distributed recovery is selected randomly from the existing list of suitable ...