Search Results
https://dev.mysql.com/doc/refman/8.4/en/precision-math-decimal-characteristics.html
This section discusses the characteristics of the DECIMAL data type (and its synonyms), with particular regard to the following topics: Maximum number of digits Storage format Storage requirements The nonstandard MySQL extension to the upper range ...
https://dev.mysql.com/doc/refman/8.4/en/privilege-changes.html
If the mysqld server is started without the --skip-grant-tables option, it reads all grant table contents into memory during its startup sequence. The in-memory tables become effective for access control at that point. If you modify the grant ...
https://dev.mysql.com/doc/refman/8.4/en/problems-with-mysql-sock.html
The default location for the Unix socket file that the server uses for communication with local clients is /tmp/mysql.sock. (For some distribution formats, the directory might be different, such as /var/lib/mysql for RPMs.) On some versions of ...
https://dev.mysql.com/doc/refman/8.4/en/rename-user.html
RENAME USER old_user TO new_user [, old_user TO new_user] ... An error occurs for old accounts that do not exist or new accounts that already exist. To use RENAME USER, you must have the global CREATE USER privilege, or the UPDATE privilege for the ...
https://dev.mysql.com/doc/refman/8.4/en/replica-logs-status.html
A replica server creates two replication metadata repositories, the connection metadata repository and the applier metadata repository. If binary log file position based replication is in use, when the replica restarts, it reads the two ...
https://dev.mysql.com/doc/refman/8.4/en/replication-binlog-encryption-key-rotation.html
When binary log encryption is enabled, you can rotate the binary log master key at any time while the server is running by issuing ALTER INSTANCE ROTATE BINLOG MASTER KEY. You can rotate the binary log master key on a regular basis to comply with ...
https://dev.mysql.com/doc/refman/8.4/en/replication-binlog-encryption.html
MySQL binary log files and relay log files can be encrypted, helping to protect these files and the potentially sensitive data contained in them from being misused by outside attackers, and also from unauthorized viewing by users of the operating ...
https://dev.mysql.com/doc/refman/8.4/en/replication-encrypted-connections.html
To use an encrypted connection for the transfer of the binary log required during replication, both the source and the replica servers must support encrypted network connections. If either server does not support encrypted connections (because it ...
https://dev.mysql.com/doc/refman/8.4/en/replication-features-create-if-not-exists.html
IF NOT EXISTS statements are replicated: Every CREATE DATABASE IF NOT EXISTS statement is replicated, whether or not the database already exists on the source. Similarly, every CREATE TABLE IF NOT EXISTS statement without a SELECT is replicated, ...
https://dev.mysql.com/doc/refman/8.4/en/replication-features-memory.html
When a replication source server shuts down and restarts, its MEMORY tables become empty. To replicate this effect to replicas, the first time that the source uses a given MEMORY table after startup, it logs an event that notifies replicas that the ...