Search Results
https://dev.mysql.com/doc/refman/8.4/en/create-table-generated-columns.html
If the expression evaluates to a data type that differs from the declared column type, implicit coercion to the declared type occurs according to the usual MySQL type-conversion rules. If a generated column uses the TIMESTAMP data type, the setting ...Values of a generated column are computed from an expression included in the column ...
https://dev.mysql.com/doc/refman/8.4/en/data-dictionary-object-cache.html
Similar to other cache mechanisms used by MySQL, the dictionary object cache uses an LRU-based eviction strategy to evict least recently used objects from memory. Both caches store table definitions but serve different parts of the MySQL server. The ... The dictionary object cache is a shared global cache that stores previously accessed data dictionary objects in memory to enable object reuse and minimize disk ...
https://dev.mysql.com/doc/refman/8.4/en/data-masking-components-vs-plugin.html
Previously, MySQL enabled masking and de-identification capabilities using a server-side plugin, but transitioned to use the component infrastructure as an alternative implementation. The following table briefly compares MySQL Enterprise Data ...It ...
https://dev.mysql.com/doc/refman/8.4/en/error-log.html
The error log contains a record of mysqld startup and shutdown times. This section discusses how to configure the MySQL server for logging of diagnostic messages to the error log. For example, if mysqld notices that a table needs to be ...For ...
https://dev.mysql.com/doc/refman/8.4/en/explain-for-connection.html
For example, if you are running a statement in one session that is taking a long time to complete, using EXPLAIN FOR CONNECTION in another session may yield useful information about the cause of the delay. To obtain the execution plan for an ...
https://dev.mysql.com/doc/refman/8.4/en/external-locking.html
External locking is used in situations where a single process such as the MySQL server cannot be assumed to be the only process that requires access to tables. If the server is run with external locking enabled, you can use myisamchk at any time for ... External locking is the use of file system locking to manage contention for MyISAM database tables by multiple ...
https://dev.mysql.com/doc/refman/8.4/en/function-optimization.html
MySQL also determines when to evaluate functions based on types of arguments, whether the arguments are table columns or constant values. For example: SELECT * FROM t WHERE partial_key=5 AND some_column=RAND(); If the optimizer can use partial_key ...A function is nondeterministic if, given fixed values for its arguments, it can return different results for different ...
https://dev.mysql.com/doc/refman/8.4/en/group-replication-tuning-recovery.html
The following statement sets the maximum number of attempts to connect to a donor to 5: mysql> SET GLOBAL group_replication_recovery_retry_count= 5; For remote cloning operations, this limit does not apply. Sleep Interval for Connection Attempts For ... Several aspects of Group Replication's distributed recovery process can be configured to suit your ...
https://dev.mysql.com/doc/refman/8.4/en/information-schema-innodb-buffer-page-table.html
ACCESS_TIME An abstract number used to judge the first access time of the page. The INNODB_BUFFER_PAGE table provides information about each page in the InnoDB buffer pool. For related usage information and examples, see Section 17.15.5, “InnoDB ...
https://dev.mysql.com/doc/refman/8.4/en/innodb-deadlock-detection.html
InnoDB is aware of table locks if innodb_table_locks = 1 (the default) and autocommit = 0, and the MySQL layer above it knows about row-level locks. Otherwise, InnoDB cannot detect deadlocks where a table lock set by a MySQL LOCK TABLES statement or ... When deadlock detection is enabled (the default), InnoDB automatically detects transaction deadlocks and rolls back a transaction or transactions to break the ...