Search Results
https://dev.mysql.com/doc/refman/8.4/en/replication-options-reference.html
replica_exec_mode: Allows for switching replication thread between IDEMPOTENT mode (key and some other errors suppressed) and STRICT mode; STRICT mode is default, except for NDB Cluster, where IDEMPOTENT is always used. slave_exec_mode: Allows for ... The following two sections provide basic information about the MySQL command-line options and system variables applicable to replication and the binary ...
https://dev.mysql.com/doc/refman/8.4/en/sys-table-exists.html
Tests whether a given table exists as a regular table, a TEMPORARY table, or a view. If both a temporary and a permanent table exist with the given name, TEMPORARY is returned. Parameters in_db VARCHAR(64): The name of the database in which to ...
https://dev.mysql.com/doc/refman/8.4/en/telemetry-metrics-configuration.html
telemetry.otel_exporter_otlp_metrics_client_key System Variable telemetry.otel_exporter_otlp_metrics_client_key Scope Global Dynamic No SET_VAR Hint Applies No Type String Default Value [none] Client's private key in PEM format. Server ...
https://dev.mysql.com/doc/mysql-enterprise-backup/8.4/en/advanced.encrypted-binlog-relaylog.html
mysqlbackup then copies over from the server the encrypted keyring data file, which contains the replication master key used to encrypt all the passwords for the individual log files, into the meta folder in the backup and names the file keyring_kef. If the server uses a keyring plugin or component other than component_keyring_encrypted_file, mysqlbackup accesses the keyring to obtain the replication master key and uses it to decrypt the individual log files' ...
https://dev.mysql.com/doc/relnotes/mysql-cluster/8.4/en/news-8-4-0.html
NDB Client Programs: In some cases, it was not possible to load cerificates generated using ndb_sign_keys. (Bug #36132430) NDB Client Programs: On Windows hosts, ndb_sign_keys could not locate the ssh program. (Bug #36053948) NDB Client Programs: ...
https://dev.mysql.com/doc/relnotes/connector-j/en/news-9-1-0.html
Functionality Added or Changed Bugs Fixed Functionality Added or Changed When connecting to a server using SSL, the truststore password is now made optional, with a null truststore password taken to mean that there is no need to check the ...
https://dev.mysql.com/doc/mysql-ai/9.5/en/mys-ai-aml-anomaly-detection-logs.html
At least one column must act as the primary key to establish the temporal order of logs. If the primary key column (or columns) is not one of the previous required columns (log data, source of log, or label), then you must use the ... Anomaly ...
https://dev.mysql.com/doc/mysql-ai/9.5/en/mys-ai-aml-training-an-anomaly-detection-model.html
At least one column must act as the primary key to establish the temporal order of logs. If the primary key column (or columns) is not one of the previous required columns (log data, source of log, or label), then you must use the ... After ...
https://dev.mysql.com/doc/mysql-ai/9.5/en/mys-ai-genai-generate-embeddings.html
This section describes how to generate vector embeddings using the ML_EMBED_ROW routine. Vector embeddings are a numerical representation of the text that capture the semantics of the data and relationships to other data. You can pass the text ...
https://dev.mysql.com/doc/mysql-ai/9.5/en/mys-ai-genai-summarize-content.html
One of the key features of MySQL ', 'is its support for stored procedures, which allow developers to create reusable blocks of ', 'code that can be executed multiple times. The following sections in this topic describe how to summarize exiting ...