Search Results
https://dev.mysql.com/doc/refman/8.4/en/identifier-qualifiers.html
An unqualified name is permitted in contexts where interpretation of the name is unambiguous. A qualified name includes at least one qualifier to clarify the interpretive context by overriding a default context or providing missing context. For ...
https://dev.mysql.com/doc/refman/8.4/en/ipv6-local-connections.html
The following procedure shows how to configure MySQL to permit IPv6 connections by clients that connect to the local server using the ::1 local host address. In addition to the CREATE USER statement, you can issue GRANT statements that give ...
https://dev.mysql.com/doc/refman/8.4/en/ipv6-remote-connections.html
The following procedure shows how to configure MySQL to permit IPv6 connections by remote clients. It is similar to the preceding procedure for local clients, but the server and client hosts are distinct and each has its own nonlocal IPv6 address.
https://dev.mysql.com/doc/refman/8.4/en/kerberos-pluggable-authentication.html
No passwords are sent over the network and Kerberos protocol messages are protected against eavesdropping and replay attacks. (In later discussion, this principal name is associated with the MySQL account that authenticates to the MySQL server using ... Note Kerberos pluggable authentication is an extension included in MySQL Enterprise Edition, a commercial ...
https://dev.mysql.com/doc/refman/8.4/en/mysql-cluster-install-windows-source.html
The procedure for doing this is almost identical to the procedure used to compile the standard MySQL Server binaries for Windows, and uses the same tools. Oracle provides precompiled NDB Cluster binaries for Windows which should be adequate for ...
https://dev.mysql.com/doc/refman/8.4/en/mysql-cluster-replication-starting.html
This section outlines the procedure for starting NDB Cluster replication using a single replication channel. It is also possible to use two replication channels, in a manner similar to the procedure described in the next section; the differences ...
https://dev.mysql.com/doc/refman/8.4/en/mysqldump-stored-programs.html
The other options are disabled by default and must be specified explicitly to dump the corresponding objects. To disable any of these options explicitly, use its skip form: --skip-events, --skip-routines, or --skip-triggers.
https://dev.mysql.com/doc/refman/8.4/en/optimizing-myisam-bulk-data-loading.html
Use the following procedure: Execute a FLUSH TABLES statement or a mysqladmin flush-tables command. The main difference between automatic optimization and using the procedure explicitly is that you can let myisamchk allocate much more temporary ...
https://dev.mysql.com/doc/refman/8.4/en/performance-schema-metadata-locks-table.html
Metadata locking applies not just to tables, but also to schemas, stored programs (procedures, functions, triggers, scheduled events), tablespaces, user locks acquired with the GET_LOCK() function (see Section 14.14, “Locking Functions”), and ...
https://dev.mysql.com/doc/refman/8.4/en/precision-math-examples.html
Consider the following stored procedure, which adds .0001 to a variable 1,000 times. This section provides some examples that show precision math query results in MySQL. These examples demonstrate the principles described in Section 14.24.3, ...