Search



Search Results
Displaying 3311 to 3320 of 3432 total results
https://dev.mysql.com/doc/refman/8.4/en/performance-schema-startup-configuration.html
It is possible that a plugin installed later may create the instrument, at which time the name is recognized and configured. To use the MySQL Performance Schema, it must be enabled at server startup to enable event collection to occur. To enable or ...
https://dev.mysql.com/doc/refman/8.4/en/performance-schema-thread-pool-tables.html
If the thread pool plugin is loaded but disabled, the tables are not created. The following sections describe the Performance Schema tables associated with the thread pool plugin (see Section 7.6.3, “MySQL Enterprise Thread Pool”). They provide ...
https://dev.mysql.com/doc/refman/8.4/en/perror.html
perror displays the error message for MySQL or operating system error codes. For example, for the ER_WRONG_VALUE_FOR_VAR error, perror understands any of these arguments: 1231, 001231, MY-1231, or MY-001231, or ER_WRONG_VALUE_FOR_VAR. The meaning ...
https://dev.mysql.com/doc/refman/8.4/en/precision-math-rounding.html
This section discusses precision math rounding for the ROUND() function and for inserts into columns with exact-value types (DECIMAL and integer). The ROUND() function rounds differently depending on whether its argument is exact or approximate: ...
https://dev.mysql.com/doc/refman/8.4/en/primary-key-optimization.html
If your table is big and important, but does not have an obvious column or set of columns to use as a primary key, you might create a separate column with auto-increment values to use as the primary key. The primary key for a table represents the ...
https://dev.mysql.com/doc/refman/8.4/en/problems-with-mysql-sock.html
On most versions of Unix, you can protect your /tmp directory so that files can be deleted only by their owners or the superuser (root). Another approach is to change the place where the server creates the Unix socket file. The default location for ...
https://dev.mysql.com/doc/refman/8.4/en/repeat.html
[begin_label:] REPEAT statement_list UNTIL search_condition END REPEAT [end_label] The statement list within a REPEAT statement is repeated until the search_condition expression is true. statement_list consists of one or more statements, each ...
https://dev.mysql.com/doc/refman/8.4/en/replica-connection-thread-states.html
Opening master dump table This state occurs after Creating table from master dump. These thread states occur on a replica server but are associated with connection threads, not with the I/O or SQL threads. Changing master Changing replication ...
https://dev.mysql.com/doc/refman/8.4/en/replication-binlog-encryption-encryption-keys.html
The keyring service handles the creation, retrieval, and deletion of the binary log encryption keys. A server instance only creates and removes keys generated for itself, but it can read keys generated for other instances if they are stored in the ... The binary log encryption keys used to encrypt the file passwords for the log files are 256-bit keys that are generated specifically for each MySQL server instance using MySQL Server's keyring service (see Section 8.4.4, “The MySQL ...
https://dev.mysql.com/doc/refman/8.4/en/replication-configuration.html
This section describes how to configure the different types of replication available in MySQL and includes the setup and configuration required for a replication environment, including step-by-step instructions for creating a new replication ...For ...
Displaying 3311 to 3320 of 3432 total results