x27;t rely on the current
behaviour.
Since you probably need to make a copy anyway, I wouldn't bother to worry
about what DBI may or may not do after a connection is closed. Seems much
safer to just assume that DBI owns the hash, and whatever you want needs to
be copied out.
- J
rying to do, it may be enough that the logs
(including the delete statements) end up on the slave. If your queries
against the no-deletes version are trivial, you may be able to just pipe the
log output through grep.
- James Moore
-
> -Original Message-
> From: Siim Einfeldt aka Itpunk [mailto:[EMAIL PROTECTED]]
> Sent: 17 February 2001 14:25
> To: [EMAIL PROTECTED]; [EMAIL PROTECTED];
> [EMAIL PROTECTED]; [EMAIL PROTECTED]; [EMAIL PROTECTED];
> [EMAIL PROTECTED]; [EMAIL PROTECTED]
> Subject: [PHP] Creative solution
Please read and forward.
-Original Message-
From: James [mailto:[EMAIL PROTECTED]]
Sent: 14 February 2001 21:39
To: Young, Stuart; Raf; Nicky Gosney; Nick;
[EMAIL PROTECTED]; John Boddy; Iain; Green, Karen; Darren S;
Andy; [EMAIL PROTECTED]
Subject: FW: CSETI Announcement - Urgent Disclos
Hi:
Check This!
-
Before posting, please check:
http://www.mysql.com/manual.php (the manual)
http://lists.mysql.com/ (the list archive)
To request this thread, e-mail <[EMAIL PROTECTED]>
To unsubscribe, e-m