Search



Search Results
Displaying 541 to 550 of 884 total results
https://dev.mysql.com/doc/refman/8.4/en/mysql-server-side-help.html
To make a more specific request, please type 'help <item>', where <item> is one of the following topics: REPAIR TABLE REPEAT FUNCTION REPEAT LOOP REPLACE REPLACE FUNCTION . mysql> help search_string If you provide an argument to the help command, ...
https://dev.mysql.com/doc/refman/8.4/en/performance-schema-system-variables.html
Thereafter, when the server sees other statements with the same digest value, it determines whether to use the new statement to replace the current sample statement (that is, whether to resample). Resampling based on age: If the ...The Performance ...
https://dev.mysql.com/doc/refman/8.4/en/persisted-system-variables.html
qualifier: SET PERSIST max_connections = 1000; SET @@PERSIST.max_connections = 1000; Like SET GLOBAL, SET PERSIST sets the global variable runtime value, but also writes the variable setting to the mysqld-auto.cnf file (replacing any existing ...
https://dev.mysql.com/doc/refman/8.4/en/replication-gtids-assign-anon.html
Important A replica set up with ASSIGN_GTIDS_TO_ANONYMOUS_TRANSACTIONS on any channel cannot be promoted to replace the replication source server in the event that failover is required, and a backup taken from the replica cannot be used to restore ... You can set up replication channels to assign a GTID to replicated transactions that do not already have ...
https://dev.mysql.com/doc/refman/8.4/en/replication-gtids-auto-positioning.html
GTIDs replace the file-offset pairs previously required to determine points for starting, stopping, or resuming the flow of data between source and replica. The correct approach to recover from this situation is for the replica to replicate the ...
https://dev.mysql.com/doc/refman/8.4/en/security-plugins.html
Data masking hides sensitive information by replacing real values with substitutes. MySQL Enterprise Data Masking and De-Identification functions enable masking existing data using several methods such as obfuscation (removing identifying ... MySQL ...
https://dev.mysql.com/doc/refman/8.4/en/select.html
FOR SHARE is a replacement for LOCK IN SHARE MODE, but LOCK IN SHARE MODE remains available for backward compatibility. Such a table produces a single row, is read during the optimization phase of query execution, and references to its columns are ... SELECT [ALL | DISTINCT | DISTINCTROW ] [HIGH_PRIORITY] [STRAIGHT_JOIN] [SQL_SMALL_RESULT] [SQL_BIG_RESULT] [SQL_BUFFER_RESULT] [SQL_NO_CACHE] [SQL_CALC_FOUND_ROWS] select_expr [, select_expr] ...
https://dev.mysql.com/doc/refman/8.4/en/set-variable.html
If a SET statement is issued for a sensitive system variable, the query is rewritten to replace the value with “<redacted>” before it is logged to the general log and audit log. Like SET GLOBAL, SET PERSIST sets the global variable runtime ...
https://dev.mysql.com/doc/refman/8.4/en/shared-key-cache.html
Multiple sessions can initiate requests that result in cache block replacements, as long as they do not interfere with each other (that is, as long as they need different index blocks, and thus cause different cache blocks to be replaced). Threads ...
https://dev.mysql.com/doc/refman/8.4/en/string-functions-charset.html
The same applies for INSTR(), LCASE(), LOWER(), LTRIM(), MID(), REPEAT(), REPLACE(), REVERSE(), RIGHT(), RPAD(), RTRIM(), SOUNDEX(), SUBSTRING(), TRIM(), UCASE(), and UPPER(). Note The REPLACE() function, unlike all other functions, always ignores ... MySQL has many operators and functions that return a ...
Displaying 541 to 550 of 884 total results