Search

Download this Manual
PDF (US Ltr) - 35.1Mb
PDF (A4) - 35.2Mb
Man Pages (TGZ) - 255.8Kb
Man Pages (Zip) - 360.7Kb
Info (Gzip) - 3.4Mb
Info (Zip) - 3.4Mb


Displaying 281 to 290 of 775 total results
https://dev.mysql.com/doc/refman/5.7/en/data-masking-usage.html
General-Purpose Masking Functions mask_inner() and mask_outer() are general-purpose functions that mask parts of arbitrary strings based on position within the string: mask_inner() masks the interior of its string argument, leaving the ends unmasked. Converting the value to a binary string ensures that the function sees an argument of length ... Before using MySQL Enterprise Data Masking and De-Identification, install it according to the instructions provided at ...
https://dev.mysql.com/doc/refman/5.7/en/change-replication-filter.html
Values used with REPLICATION_WILD_TABLE and REPLICATION_WILD_IGNORE_TABLE are string expressions, possibly containing (special) wildcard characters, and so must be quoted. Filters set using this statement differ from those set using the server ...
https://dev.mysql.com/doc/refman/5.7/en/declare-handler.html
SQLSTATE [VALUE] sqlstate_value: A 5-character string literal indicating an SQLSTATE value, such as '42S01' to specify “unknown table”: DECLARE CONTINUE HANDLER FOR SQLSTATE '42S02' BEGIN -- body of handler END; Do not use SQLSTATE values that ...statement handler_action: { CONTINUE | EXIT | UNDO } condition_value: { mysql_error_code | SQLSTATE [VALUE] sqlstate_value | condition_name | SQLWARNING | NOT FOUND | SQLEXCEPTION } The DECLARE ...
https://dev.mysql.com/doc/refman/5.7/en/docker-mysql-more-topics.html
The boolean variables including MYSQL_RANDOM_ROOT_PASSWORD, MYSQL_ONETIME_PASSWORD, MYSQL_ALLOW_EMPTY_PASSWORD, and MYSQL_LOG_CONSOLE are made true by setting them with any strings of nonzero lengths. A MySQL Docker installation is different from a ...
https://dev.mysql.com/doc/refman/5.7/en/replication-gtids-functions.html
This section provides examples of stored functions (see Chapter 23, Stored Objects) which you can create using some of the built-in functions provided by MySQL for use with GTID-based replication, listed here: GTID_SUBSET(): Shows whether one GTID ...
https://dev.mysql.com/doc/refman/5.7/en/replication-howto-masterstatus.html
In that case, the values that you need to use later when specifying the source's log file and position are the empty string ('') and 4. To configure the replica to start the replication process at the correct point, you need to note the source's ...
https://dev.mysql.com/doc/refman/5.7/en/replication-mode-change-online-concepts.html
This section explains these concepts and is essential reading before attempting to modify the replication mode of an online server. This means that fields which display GTID sets, such as gtid_executed, gtid_purged, RECEIVED_TRANSACTION_SET in the ... To be able to safely configure the replication mode of an online server it is important to understand some key concepts of ...
https://dev.mysql.com/doc/refman/5.7/en/upgrading-from-previous-series.html
All credentials are stored in the authentication_string column, including those formerly stored in the Password column. If performing an in-place upgrade to MySQL 5.7.6 or later, run mysql_upgrade as directed by the in-place upgrade procedure to ...
https://dev.mysql.com/doc/refman/5.7/en/validate-password-options-variables.html
The password and user name values are compared as binary strings on a byte-by-byte basis. Assuming that is true, each substring of the password of length 4 up to 100 is compared to the words in the dictionary file. This section describes the ...
https://dev.mysql.com/doc/refman/5.7/en/audit-log-logging-configuration.html
This section describes how to configure audit logging characteristics, such as the file to which the audit log plugin writes events, the format of written events, whether to enable log file compression and encryption, and space management. The ...
Displaying 281 to 290 of 775 total results