Search



Search Results
Displaying 341 to 350 of 1960 total results
https://dev.mysql.com/doc/refman/8.4/en/group-replication-enterprise-backup.html
For example, on Linux distributions that use systemd: s3> systemctl stop mysqld Preserve the two configuration files in the corrupted server's data directory, auto.cnf and mysqld-auto.cnf (if it exists), by copying them to a safe location outside of ... MySQL Enterprise Backup is a commercially-licensed backup utility for MySQL Server, available with MySQL Enterprise ...
https://dev.mysql.com/doc/refman/8.4/en/mathematical-functions.html
mysql> SELECT ABS(2); -> 2 mysql> SELECT ABS(-32); -> 32 This function is safe to use with BIGINT values. mysql> SELECT MOD(234, 10); -> 4 mysql> SELECT 253 % 7; -> 1 mysql> SELECT MOD(29,9); -> 2 mysql> SELECT 29 MOD 9; -> 2 This function is safe ...ABS(X) Returns the absolute value of X, or NULL if X is ...
https://dev.mysql.com/doc/refman/8.4/en/myisamchk-memory.html
When using --recover or --sort-recover (but not when using --safe-recover), you need space on disk for sorting. If you have a problem with disk space during repair, you can try --safe-recover instead of --recover. myisamchk uses no more memory than ...
https://dev.mysql.com/doc/refman/8.4/en/mysql-config.html
--libs_r Libraries and options required to link with the thread-safe MySQL client library. In MySQL 8.4, all client libraries are thread-safe, so this option need not be used. mysql_config provides you with useful information for compiling your ...
https://dev.mysql.com/doc/refman/8.4/en/preface.html
If you use this software or hardware in dangerous applications, then you shall be responsible to take all appropriate fail-safe, backup, redundancy, and other measures to ensure its safe use. This is the Reference Manual for the MySQL Database ...
https://dev.mysql.com/doc/refman/8.4/en/purge-binary-logs.html
PURGE BINARY LOGS is safe to run while replicas are replicating. To safely purge binary log files, follow this procedure: On each replica, use SHOW REPLICA STATUS to check which log file it is reading. PURGE BINARY LOGS { TO 'log_name' | BEFORE ...
https://dev.mysql.com/doc/refman/8.4/en/recovery-from-backups.html
To not lose them, we would have needed to have the MySQL server store its MySQL binary logs into a safe location (RAID disks, SAN, ...) different from the place where it stores its data files, so that these logs were not on the destroyed disk. Now, ...
https://dev.mysql.com/doc/refman/8.4/en/replication-features-invoked.html
Note Attempting to replicate invoked features using statement-based replication produces the warning Statement is not safe to log in statement format. If you are absolutely certain that the invoked feature's effects are deterministic, you can safely ... Replication of invoked features such as loadable functions and stored programs (stored procedures and functions, triggers, and events) provides the following characteristics: The effects of the feature are always ...
https://dev.mysql.com/doc/relnotes/mysql/8.4/en/preface.html
If you use this software or hardware in dangerous applications, then you shall be responsible to take all appropriate fail-safe, backup, redundancy, and other measures to ensure its safe use. This document contains release notes for the changes in ...
https://dev.mysql.com/doc/mysql-enterprise-backup/8.4/en/preface.html
If you use this software or hardware in dangerous applications, then you shall be responsible to take all appropriate fail-safe, backup, redundancy, and other measures to ensure its safe use. This is the user manual for the MySQL Enterprise Backup ...
Displaying 341 to 350 of 1960 total results