Search Results
https://dev.mysql.com/doc/refman/8.4/en/performance-schema-statement-summary-tables.html
The FIRST_SEEN and LAST_SEEN columns are initialized with the current time. If the row is created, the FIRST_SEEN and LAST_SEEN columns are initialized with the current time. The Performance Schema maintains tables for collecting current and recent ...
https://dev.mysql.com/doc/refman/8.4/en/performance-schema-statement-tables.html
Statement events occur at a high level of the event hierarchy. Within the event hierarchy, wait events nest within stage events, which nest within statement events, which nest within transaction events. These tables store statement events: ...
https://dev.mysql.com/doc/refman/8.4/en/performance-schema-status-monitoring.html
If the instrument can be allocated, it can be used for initializing instrumented mutex instances. A value of Performance_schema_mutex_instances_lost greater than 0 can happen when the code initializes more mutexes at runtime than were allocated for ...Names for these variables have several forms: Performance_schema_xxx_classes_lost indicates how many instruments of type xxx could not be ...
https://dev.mysql.com/doc/refman/8.4/en/performance-schema-tp-thread-group-state-table.html
CONNECT_THREAD_COUNT The number of threads that are processing or waiting to process connection initialization and authentication. These are the initial statements for transactions that have not started, so they also represent queued transactions.
https://dev.mysql.com/doc/refman/8.4/en/performance-schema-transaction-tables.html
Transactions and Nested Events The parent of a transaction event is the event that initiated the transaction. In general, a transaction is the top-level parent to all events initiated during the transaction, including statements that explicitly end ...Within the event hierarchy, wait events nest within stage events, which nest within statement events, which nest within transaction ...
https://dev.mysql.com/doc/refman/8.4/en/privileges-provided.html
For routines that fall within the scope at which the privilege is granted and for which the user is not the user named as the routine DEFINER, also enables access to routine properties other than the routine definition. For routines that fall within ... The privileges granted to a MySQL account determine which operations the account can ...
https://dev.mysql.com/doc/refman/8.4/en/replica-logs-relaylog.html
If a replica uses the default host-based relay log file names, changing a replica's host name after replication has been set up can cause replication to fail with the errors Failed to open the relay log and Could not find target log during relay log ... The relay log, like the binary log, consists of a set of numbered files containing events that describe database changes, and an index file that contains the names of all used relay log ...
https://dev.mysql.com/doc/refman/8.4/en/replica-logs-status.html
A warning message is issued if mysqld is unable to initialize the tables for the replication metadata repositories, but the replica is allowed to continue starting. A replica server creates two replication metadata repositories, the connection ...
https://dev.mysql.com/doc/refman/8.4/en/replication-binlog-encryption-key-rotation.html
If a retained binary log file or relay log file cannot be initialized for re-encryption, the relevant binary log encryption keys are not deleted in case the files can be recovered in the future. For example, this might be the case if a file listed ... When binary log encryption is enabled, you can rotate the binary log master key at any time while the server is running by issuing ALTER INSTANCE ROTATE BINLOG MASTER ...
https://dev.mysql.com/doc/refman/8.4/en/replication-binlog-encryption-scope.html
Because the temporary files are volatile and tied to a single process, they are encrypted using single-tier encryption, using a randomly generated file password and initialization vector that exist only in memory and are never stored on disk or in ...Existing binary log files and relay log files that were present on the server when you started encryption are not ...