Search

Download this Manual
PDF (US Ltr) - 35.1Mb
PDF (A4) - 35.2Mb
Man Pages (TGZ) - 256.4Kb
Man Pages (Zip) - 361.2Kb
Info (Gzip) - 3.4Mb
Info (Zip) - 3.4Mb


Displaying 361 to 370 of 1830 total results
https://dev.mysql.com/doc/refman/5.7/en/mysql-ssl-rsa-setup.html
--uid=name, -v Command-Line Format --uid=name The name of the user who should be the owner of any created files. In the absence of this option, files created by mysql_ssl_rsa_setup are owned by the user who executes it. It works as follows: ... This ...See Section 6.3.3.1, “Creating SSL and RSA Certificates and Keys using ...
https://dev.mysql.com/doc/refman/5.7/en/session-state-tracking.html
The following characteristics are relevant for this purpose: READ ONLY READ WRITE ISOLATION LEVEL WITH CONSISTENT SNAPSHOT Available Session State Trackers To support the session-tracking activities, notification is available for these types of ...A ...
https://dev.mysql.com/doc/refman/5.7/en/keyring-okv-plugin.html
For details, consult the section named Add a KMIP Server in the KeySecure User Guide. The default value is empty, so you must set the variable to name a properly configured directory before the plugin can communicate with the KMIP back end. The ...
https://dev.mysql.com/doc/refman/5.7/en/mysql-cluster-nodes-groups.html
(You should be aware that the number of LDM threads increases with the value of this parameter, but not in a strictly linear fashion, and that there are additional constraints on setting it; see the description of MaxNoOfExecutionThreads for more ...
https://dev.mysql.com/doc/refman/5.7/en/docker-mysql-getting-started.html
Because the MYSQL_ONETIME_PASSWORD option is true by default, after you have connected a mysql client to the server, you must reset the server root password by issuing this statement: mysql> ALTER USER 'root'@'localhost' IDENTIFIED BY 'password'; ...
https://dev.mysql.com/doc/refman/5.7/en/mysql-innodb-cluster-introduction.html
For more information on these technologies, see the user documentation linked in the descriptions. In addition to this user documentation, there is developer documentation for all AdminAPI methods in the MySQL Shell JavaScript API Reference or MySQL ...Advanced users can also take advantage of a multi-primary mode, where all instances are ... This chapter introduces MySQL InnoDB Cluster, which combines MySQL technologies to ...
https://dev.mysql.com/doc/refman/5.7/en/select.html
[WITH ROLLUP]] [HAVING where_condition] [ORDER BY {col_name | expr | position} [ASC | DESC], ...] [LIMIT {[offset,] row_count | row_count OFFSET offset}] [PROCEDURE procedure_name(argument_list)] [into_option] [FOR UPDATE | LOCK IN SHARE MODE] ...
https://dev.mysql.com/doc/refman/5.7/en/group-replication-enterprise-backup.html
The following instructions assume that you are already familiar with how to use MySQL Enterprise Backup to perform a backup; if that is not the case, please review the MySQL Enterprise Backup 4.1 User's Guide, especially Backing Up a Database Server. Connect to the restored server with a mysql client and reset the source and replica information with the following commands: mysql> RESET MASTER;mysql> RESET SLAVE ALL; For the restored server to be able to recover automatically using Group Replication's built-in mechanism for distributed recovery, configure the server's gtid_executed ...
https://dev.mysql.com/doc/refman/5.7/en/replica-logs-status.html
Access to the replica's connection metadata repository file or table should be restricted to the database administrator, because it contains the replication user account name and password for connecting to the source. The metadata in this repository ...Updates to the replica's applier metadata repository table are committed together with the transactions, meaning that the replica's progress information recorded in that repository is always consistent with what has been applied to the database, even in the event of an unexpected server ...
https://dev.mysql.com/doc/refman/5.7/en/encrypted-connections.html
MySQL performs encryption on a per-connection basis, and use of encryption for a given user can be optional or mandatory. For information on how to require users to use encrypted connections, see the discussion of the REQUIRE clause of the CREATE ...
Displaying 361 to 370 of 1830 total results