Search Results
https://dev.mysql.com/doc/refman/8.4/en/perl-installation.html
For example, to unpack and build a DBI distribution, use a procedure such as this: Unpack the distribution into the current directory: $> gunzip < DBI-VERSION.tar.gz | tar xvf - This command creates a directory named DBI-VERSION. MySQL Perl support ...
https://dev.mysql.com/doc/refman/8.4/en/plugin-loading.html
To uninstall a plugin that currently is loaded at server startup with a plugin-loading option, use this procedure. Server plugins must be loaded into the server before they can be used. It is also possible to control the activation state of loaded ...
https://dev.mysql.com/doc/refman/8.4/en/purge-binary-logs.html
To safely purge binary log files, follow this procedure: On each replica, use SHOW REPLICA STATUS to check which log file it is reading. PURGE BINARY LOGS { TO 'log_name' | BEFORE datetime_expr } The binary log is a set of files that contain ...
https://dev.mysql.com/doc/refman/8.4/en/repeat.html
[begin_label:] REPEAT statement_list UNTIL search_condition END REPEAT [end_label] The statement list within a REPEAT statement is repeated until the search_condition expression is true. statement_list consists of one or more statements, each ...
https://dev.mysql.com/doc/refman/8.4/en/replication-bugs.html
If you have a “phantom” problem (one that you cannot duplicate at will), use the following procedure: Verify that no user error is involved. When you have determined that there is no user error involved, and replication still either does not ...
https://dev.mysql.com/doc/refman/8.4/en/replication-encrypted-connections.html
The connection procedure negotiates the use of the highest TLS version that both the source and the replica permit. To use an encrypted connection for the transfer of the binary log required during replication, both the source and the replica ...
https://dev.mysql.com/doc/refman/8.4/en/replication-features-current-user.html
In some cases, such as statements that change passwords, the function reference is expanded before it is written to the binary log, so that the statement includes the user name. For all other cases, the name of the current user on the source is ...
https://dev.mysql.com/doc/refman/8.4/en/replication-privilege-checks-recover.html
Follow this procedure to recover from the error: Identify the replicated event that caused the error and verify whether or not the event is expected and from a trusted source. If a privilege check against the PRIVILEGE_CHECKS_USER account fails, ...
https://dev.mysql.com/doc/refman/8.4/en/replication-problems.html
If you have followed the instructions but your replication setup is not working, the first thing to do is check the error log for messages. Many users have lost time by not doing this soon enough after encountering problems. If you cannot tell from ...
https://dev.mysql.com/doc/refman/8.4/en/replication-solutions.html
For information on using replication in a backup environment, including notes on the setup, backup procedure, and files to back up, see Section 19.4.1, “Using Replication for Backups”. Replication can be used in many different environments for ...