Search Results
https://dev.mysql.com/doc/refman/8.4/en/pluggable-storage.html
MySQL Server uses a pluggable storage engine architecture that enables storage engines to be loaded into and unloaded from a running MySQL server. Plugging in a Storage Engine Before a storage engine can be used, the storage engine plugin shared ...
https://dev.mysql.com/doc/refman/8.4/en/problems-with-float.html
For DECIMAL columns, MySQL performs operations with a precision of 65 decimal digits, which should solve most common inaccuracy problems. An implication of the preceding issues is that if you attempt to create a replica by dumping table contents ...
https://dev.mysql.com/doc/refman/8.4/en/programs-development.html
This section describes some utilities that you may find useful when developing MySQL programs. Check the source code of any of the standard MySQL clients to see how to do this. Several other language interfaces to MySQL are based on the C client ...
https://dev.mysql.com/doc/refman/8.4/en/recovery-from-backups.html
The full backup file is just a set of SQL statements, so restoring it is very easy: $> mysql < backup_sunday_1_PM.sql At this point, the data is restored to its state as of Sunday 1 p.m.. To not lose them, we would have needed to have the MySQL ...
https://dev.mysql.com/doc/refman/8.4/en/replication-administration-pausing.html
You can stop and start replication on the replica using the STOP REPLICA and START REPLICA statements. The I/O (receiver) thread continues to read events from the source but they are not executed. This makes it easier for the replica to catch up ...
https://dev.mysql.com/doc/refman/8.4/en/replication-binlog-encryption-encryption-keys.html
The binary log encryption keys used to encrypt the file passwords for the log files are 256-bit keys that are generated specifically for each MySQL server instance using MySQL Server's keyring service (see Section 8.4.4, “The MySQL Keyring”).
https://dev.mysql.com/doc/refman/8.4/en/replication-encrypted-connections.html
For more information on setting up a server and client for encrypted connections, see Section 8.3.1, “Configuring MySQL to Use Encrypted Connections”. The protocols, ciphers, and ciphersuites that you can specify in these lists depend on the SSL ... To use an encrypted connection for the transfer of the binary log required during replication, both the source and the replica servers must support encrypted network ...
https://dev.mysql.com/doc/refman/8.4/en/replication-features-triggers.html
Multiple triggers are not supported in versions earlier than MySQL 5.7. If you upgrade servers in a replication topology that use a version earlier than MySQL 5.7, upgrade the replicas first and then upgrade the source. If an upgraded replication ...
https://dev.mysql.com/doc/refman/8.4/en/replication-multi-source-adding-gtid-master.html
These steps assume you have enabled GTIDs for transactions on the sources using gtid_mode=ON, created a replication user, ensured that the replica is using TABLE based replication applier metadata repositories, and provisioned the replica with data ...
MySQL 8.4 Reference Manual :: 19.2.1.3 Determination of Safe and Unsafe Statements in Binary Logging
https://dev.mysql.com/doc/refman/8.4/en/replication-rbr-safe-unsafe.html
The “safeness” of a statement in MySQL replication refers to whether the statement and its effects can be replicated correctly using statement-based format. This plugin may behave differently on different MySQL servers; therefore, statements ...