Search Results
https://dev.mysql.com/doc/refman/8.4/en/perror.html
perror displays the error message for MySQL or operating system error codes. For example, for the ER_WRONG_VALUE_FOR_VAR error, perror understands any of these arguments: 1231, 001231, MY-1231, or MY-001231, or ER_WRONG_VALUE_FOR_VAR. The meaning ...
https://dev.mysql.com/doc/refman/8.4/en/precision-math-rounding.html
This section discusses precision math rounding for the ROUND() function and for inserts into columns with exact-value types (DECIMAL and integer). The ROUND() function rounds differently depending on whether its argument is exact or approximate: ...
https://dev.mysql.com/doc/refman/8.4/en/primary-key-optimization.html
If your table is big and important, but does not have an obvious column or set of columns to use as a primary key, you might create a separate column with auto-increment values to use as the primary key. The primary key for a table represents the ...
https://dev.mysql.com/doc/refman/8.4/en/problems-with-mysql-sock.html
On most versions of Unix, you can protect your /tmp directory so that files can be deleted only by their owners or the superuser (root). Another approach is to change the place where the server creates the Unix socket file. The default location for ...
https://dev.mysql.com/doc/refman/8.4/en/repeat.html
[begin_label:] REPEAT statement_list UNTIL search_condition END REPEAT [end_label] The statement list within a REPEAT statement is repeated until the search_condition expression is true. statement_list consists of one or more statements, each ...
https://dev.mysql.com/doc/refman/8.4/en/replica-connection-thread-states.html
Opening master dump table This state occurs after Creating table from master dump. These thread states occur on a replica server but are associated with connection threads, not with the I/O or SQL threads. Changing master Changing replication ...
https://dev.mysql.com/doc/refman/8.4/en/replication-binlog-encryption-encryption-keys.html
The keyring service handles the creation, retrieval, and deletion of the binary log encryption keys. A server instance only creates and removes keys generated for itself, but it can read keys generated for other instances if they are stored in the ... The binary log encryption keys used to encrypt the file passwords for the log files are 256-bit keys that are generated specifically for each MySQL server instance using MySQL Server's keyring service (see Section 8.4.4, “The MySQL ...
https://dev.mysql.com/doc/refman/8.4/en/replication-configuration.html
This section describes how to configure the different types of replication available in MySQL and includes the setup and configuration required for a replication environment, including step-by-step instructions for creating a new replication ...For ...
https://dev.mysql.com/doc/refman/8.4/en/replication-features-memory.html
A change in max_heap_table_size takes effect for MEMORY tables that are created or updated using ALTER TABLE ... When a replication source server shuts down and restarts, its MEMORY tables become empty. To replicate this effect to replicas, the ...
https://dev.mysql.com/doc/refman/8.4/en/replication-features-partitioning.html
To avoid stopping replication or creating inconsistencies between the source and replica, always ensure that a table on the source and the corresponding replicated table on the replica are partitioned in the same way. Replication is supported ...