PDF (US Ltr)
- 35.0Mb
PDF (A4)
- 35.1Mb
Man Pages (TGZ)
- 254.9Kb
Man Pages (Zip)
- 359.9Kb
Info (Gzip)
- 3.4Mb
Info (Zip)
- 3.4Mb
Search Results
https://dev.mysql.com/doc/refman/5.7/en/keyring-aws-plugin.html
To configure keyring_aws, you must obtain a secret access key that provides credentials for communicating with AWS KMS and write it to a configuration file: Create an AWS KMS account. Use the AWS KMS account to create a customer master key (CMK) ID.
https://dev.mysql.com/doc/refman/5.7/en/keywords.html
Reserved words are permitted as identifiers if you quote them as described in Section 9.2, “Schema Object Names”: mysql> CREATE TABLE interval (begin INT, end INT); ERROR 1064 (42000): You have an error in your SQL syntax ... Certain keywords, ...
https://dev.mysql.com/doc/refman/5.7/en/performance-schema-quick-start.html
| events_stages_current | | events_stages_history | | events_stages_history_long | | events_stages_summary_by_account_by_event_name | | events_stages_summary_by_host_by_event_name | | events_stages_summary_by_thread_by_event_name | | ...For example, ... This section briefly introduces the Performance Schema with examples that show how to use ...
https://dev.mysql.com/doc/refman/5.7/en/postinstallation.html
When you are ready to create additional user accounts, you can find information on the MySQL access control system and account management in Section 6.2, “Access Control and Account Management”. This section discusses tasks that you should ...
https://dev.mysql.com/doc/refman/5.7/en/backup-strategy-example.html
Information about this recovery process is conveyed to the user through the MySQL error log. You should include such options as necessary to enable client programs to connect to the MySQL server. Assume that data is stored in the InnoDB storage ...
https://dev.mysql.com/doc/refman/5.7/en/charset-connection.html
Thus, users can configure the locale in their environment for use by MySQL clients. C applications can use character set autodetection based on the OS setting by invoking mysql_options() as follows before connecting to the server: ... A ...
https://dev.mysql.com/doc/refman/5.7/en/checking-gpg-signature.html
Another method of verifying the integrity and authenticity of a package is to use cryptographic signatures. This is more reliable than using MD5 checksums, but requires more work. GnuPG is an Open Source alternative to the well-known Pretty Good ...
https://dev.mysql.com/doc/refman/5.7/en/checking-rpm-signature.html
Rather, RPM maintains a separate keyring because it is a system-wide application and a user's GPG public keyring is a user-specific file. RPM 4.1 no longer uses your personal GPG keyring (or GPG itself). To import the MySQL public key into the RPM ...
https://dev.mysql.com/doc/refman/5.7/en/dba-dtrace-server.html
Global information, that is, the connection ID and user/host and where relevant the query string, is provided at key levels (connection-start, command-start, query-start, and query-exec-start). Additional Resources For more information on DTrace and ... Support for DTrace is deprecated in MySQL 5.7 and is removed in MySQL ...
https://dev.mysql.com/doc/refman/5.7/en/execute.html
If the prepared statement contains any parameter markers, you must supply a USING clause that lists user variables containing the values to be bound to the parameters. Parameter values can be supplied only by user variables, and the USING clause ...