Search

Download this Manual
PDF (US Ltr) - 35.1Mb
PDF (A4) - 35.2Mb
Man Pages (TGZ) - 256.4Kb
Man Pages (Zip) - 361.2Kb
Info (Gzip) - 3.4Mb
Info (Zip) - 3.4Mb


Displaying 321 to 330 of 1830 total results
https://dev.mysql.com/doc/refman/5.7/en/x-plugin-encrypted-connections.html
Encryption per connection is optional, but a specific user can be required to use encryption for X Protocol and MySQL Protocol connections by including an appropriate REQUIRE clause in the CREATE USER statement that creates the user. Alternatively, ...To enable configuring support for encrypted connections, X Plugin has mysqlx_ssl_xxx system variables, which can have different values from the ssl_xxx system variables used with MySQL ...
https://dev.mysql.com/doc/refman/5.7/en/information-schema-introduction.html
For example, Oracle Database users are familiar with querying tables in the Oracle data dictionary. INFORMATION_SCHEMA and Privileges For most INFORMATION_SCHEMA tables, each MySQL user has the right to access them, but can see only the rows in the ... INFORMATION_SCHEMA provides access to database metadata, information about the MySQL server such as the name of a database or table, the data type of a column, or access ...
https://dev.mysql.com/doc/refman/5.7/en/audit-log-installation.html
To remove it, execute the following statements: DROP TABLE IF EXISTS mysql.audit_log_user; DROP TABLE IF EXISTS mysql.audit_log_filter; UNINSTALL PLUGIN audit_log; DROP FUNCTION audit_log_filter_set_filter; DROP FUNCTION ...As of MySQL 5.7.23, for ...For general information about installing plugins, see Section 5.5.1, “Installing and Uninstalling ... This section describes how to install or uninstall MySQL Enterprise Audit, which is implemented using the ...
https://dev.mysql.com/doc/refman/5.7/en/innodb-memcached-porting-mysql.html
If you are using lookup values that contain spaces, transform or hash them into values without spaces before using them as keys in calls to add(), set(), get(), and so on. For example, prepend the table name, or the database name and the table name, ...If there is a short numeric primary key column in an InnoDB table, use it as the unique lookup key for memcached by converting the integer to a string ... Consider these aspects of memcached applications when adapting an existing MySQL schema or ...
https://dev.mysql.com/doc/refman/5.7/en/sys-user-summary-by-file-io.html
Rows for which the USER column in the underlying Performance Schema table is NULL are assumed to be for background threads and are reported with a host name of background. ios The total number of file I/O events for the user. io_latency The total ...
https://dev.mysql.com/doc/refman/5.7/en/keyring-options.html
--keyring-migration-user=user_name Command-Line Format --keyring-migration-user=user_name Introduced 5.7.21 Type String The user name of the MySQL account used for connecting to the running server that is currently using one of the key migration ...
https://dev.mysql.com/doc/refman/5.7/en/mysql-cluster-replication-schema.html
This table can be updated by the user to perform filtering by database or table. In order not to make it necessary to insert a row in the ndb_replication table for each and every combination of database, table, and SQL node in your replication ...
https://dev.mysql.com/doc/refman/5.7/en/enterprise-encryption-usage.html
SET @ciphertext = asymmetric_encrypt(@algo, 'My secret text', @pub); SET @plaintext = asymmetric_decrypt(@algo, @ciphertext, @priv); In either case, the algorithm specified for the encryption and decryption functions must match that used to generate ... To use MySQL Enterprise Encryption in applications, invoke the functions that are appropriate for the operations you wish to ...
https://dev.mysql.com/doc/refman/5.7/en/rewriter-query-rewrite-plugin-reference.html
The plugin communicates information to users by setting the table's message column. Users communicate with the plugin by modifying the set of rules stored in this table. The function is intended to be invoked by the stored procedure, not directly by ...Unless that procedure has been called following the most recent table modification, the table contents do not necessarily correspond to the set of rules the plugin is ...
https://dev.mysql.com/doc/refman/5.7/en/audit-log-legacy-filtering.html
Example: To enable audit logging only for the user1 and user2 local host accounts, set the audit_log_include_accounts system variable like this: SET GLOBAL audit_log_include_accounts = 'user1@localhost,user2@localhost'; Only one of ...The value for ...For example, to log all statement events but only failed connection events, use these settings: SET GLOBAL audit_log_statement_policy = ALL; SET GLOBAL audit_log_connection_policy = ERRORS; Another policy system variable, audit_log_policy, is available but does not afford as much control as audit_log_connection_policy and ...
Displaying 321 to 330 of 1830 total results