Search Results
                    
                    
            https://dev.mysql.com/doc/refman/8.4/en/password-logging.html
                                To guard log files against unwarranted exposure, locate them in a directory that restricts access to the server and the database administrator. If the server logs to tables in the mysql database, grant access to those tables only to the database ...
                                            
                https://dev.mysql.com/doc/refman/8.4/en/replication-implementation.html
                                 Replication is based on the source server keeping track of all changes to its databases (updates, deletes, and so on) in its binary log. The binary log serves as a written record of all events that modify database structure or content (data) from ...Each replica that connects to the source requests a copy of the binary ...
                                            
                https://dev.mysql.com/doc/refman/8.4/en/replication.html
                                 Replication enables data from one MySQL database server (known as a source) to be copied to one or more MySQL database servers (known as replicas). Depending on the configuration, you can replicate all databases, selected databases, or even ...
                                            
                https://dev.mysql.com/doc/refman/8.4/en/rewriter-query-rewrite-plugin-usage.html
                                The plugin determines whether to rewrite statements based on its in-memory cache of rewriting rules, which are loaded from the rewrite_rules table in the query_rewrite database. row *************************** id: 1 pattern: SELECT ? ... To enable ...
                                            
                https://dev.mysql.com/doc/refman/8.4/en/show-triggers.html
                                 SHOW TRIGGERS [{FROM | IN} db_name] [LIKE 'pattern' | WHERE expr] SHOW TRIGGERS lists the triggers currently defined for tables in a database (the default database unless a FROM clause is given). This statement returns results only for databases ...
                                            
                https://dev.mysql.com/doc/refman/8.4/en/stored-routines.html
                                Stored routines can be particularly useful in certain situations: When multiple client applications are written in different languages or work on different platforms, but need to perform the same database operations. In such a setup, applications ...
                                            
                https://dev.mysql.com/doc/mysql-ai/9.5/en/mys-ai-aml-prepare-an-anomaly-detection-model.html
                                mysql> CREATE DATABASE anomaly_data; mysql> USE anomaly_data; Create the table to insert the sample data into. If not already done, create and use the database to store the data. mysql> CREATE DATABASE anomaly_log_data; mysql> USE anomaly_log_data; ... This topic describes how to prepare the data to use for two anomaly detection machine learning models: a semi-supervised anomaly detection model, and an unsupervised anomaly detection model for ...
                                            
                https://dev.mysql.com/doc/mysql-ai/9.5/en/mys-ai-genai-supported-models.html
                                 This topic provides the list of languages that GenAI feature of MySQL AI supports and the embedding models as well as large language models (LLMs) that are available. The quality of the generated text outputs depends on the training and ability of ...
                                            
                https://dev.mysql.com/doc/workbench/en/wb-tables-physical-schemata.html
                                They may be added to an EER Diagram by dragging and dropping them from this palette.  Double-clicking the Add table icon in the Physical Schemas section of the Model Overview tab adds a table with the default name of table1. If a table with this ...
                                            
                https://dev.mysql.com/doc/workbench/en/wb-tutorial-visual-explain-dbt3.html
                                It uses the DBT-3 database and begins with the following simple query example. Use the drop-down list to switch between the visual and tabular representations.  This tutorial describes how to use Explain reports to locate and fix problematic (slow) ...