Search Results
https://dev.mysql.com/doc/heatwave-aws/en/heatwave-aws-relnotes.html
In the event of a failure of the primary instance, its function is taken up by one of the secondary instances, so that you do not have to reconfigure your application. It provides integrated and automated generative AI with in-database large ...
https://dev.mysql.com/doc/connector-j/en/connector-j-config-failover.html
However, this does not mean the client does not have to deal with the exception that triggered the server switch. Note that for the driver, each call to a Statement.execute*() method increments the query execution counter; therefore, when calls are ...A failover happens when connection-related errors occur for an underlying, active ...
https://dev.mysql.com/doc/connector-j/en/connector-j-installing-source.html
To install MySQL Connector/J from source, make sure that you have the following software on your system: Tip It is suggested that the latest versions available for the following software be used for compiling Connector/J; otherwise, some features ...
https://dev.mysql.com/doc/refman/8.4/en/account-names.html
These tables have User and Host columns to store the account name. User names and host names have certain special values or wildcard conventions, as described following. These characters have the same meaning as for pattern-matching operations ...
https://dev.mysql.com/doc/refman/8.4/en/audit-log-filtering.html
Filter rules have the capability of blocking (aborting) execution of qualifying events, in addition to existing capabilities for event logging. Accounts created with the SYSTEM_USER privilege have the AUDIT_ABORT_EXEMPT privilege assigned ... Note ...
https://dev.mysql.com/doc/refman/8.4/en/backup-methods.html
Also, even if the server is not actively updating data, InnoDB may still have modified data cached in memory and not flushed to disk.) For an example of this backup method, refer to the export and import example in Section 15.2.6, “IMPORT TABLE ...
https://dev.mysql.com/doc/refman/8.4/en/binary-log.html
It also contains events for statements that potentially could have made changes (for example, a DELETE which matched no rows), unless row-based logging is used. To keep track of which binary log files have been used, mysqld also creates a binary log ... The binary log contains “events” that describe database changes such as table creation operations or changes to table ...
https://dev.mysql.com/doc/refman/8.4/en/blob.html
These correspond to the four BLOB types and have the same maximum lengths and storage requirements. They have the binary character set and collation, and comparison and sorting are based on the numeric values of the bytes in column values. They have ... A BLOB is a binary large object that can hold a variable amount of ...
https://dev.mysql.com/doc/refman/8.4/en/built-in-function-reference.html
The following table lists each built-in (native) function and operator and provides a short description of each one. For a table listing functions that are loadable at runtime, see Section 14.2, “Loadable Function Reference”. ->> Return value ...
https://dev.mysql.com/doc/refman/8.4/en/caching-sha2-pluggable-authentication.html
The caching_sha2_password plugin has these advantages, compared to the deprecated sha256_password plugin: On the server side, an in-memory cache enables faster reauthentication of users who have connected previously when they connect again. The ...