Search

Download this Manual
PDF (US Ltr) - 43.3Mb
PDF (A4) - 43.4Mb
Man Pages (TGZ) - 297.2Kb
Man Pages (Zip) - 402.4Kb
Info (Gzip) - 4.3Mb
Info (Zip) - 4.3Mb


Displaying 151 to 160 of 1321 total results
https://dev.mysql.com/doc/refman/8.0/en/installing-source-distribution.html
If you have multiple source trees at the same level (for example, to build multiple versions of MySQL), the second strategy can be advantageous. On Windows: $> devenv MySQL.sln /build RelWithDebInfo If you have gotten to the compilation stage, but ... To install MySQL from a standard source distribution: Verify that your system satisfies the tool requirements listed at Section 2.8.2, “Source Installation ...
https://dev.mysql.com/doc/refman/8.0/en/kerberos-pluggable-authentication.html
It is useful in Linux environments where applications have access to Microsoft Active Directory, which has Kerberos enabled by default. Kerberos pluggable authentication provides these capabilities: External authentication: Kerberos authentication ... Note Kerberos pluggable authentication is an extension included in MySQL Enterprise Edition, a commercial ...
https://dev.mysql.com/doc/refman/8.0/en/keyring-functions-general-purpose.html
That is, the value of the CURRENT_USER() function at the time of key manipulation must have the same value as when the key was stored in the keyring. To permit key operations to users who do not have the global EXECUTE privilege or who may not be ...
https://dev.mysql.com/doc/refman/8.0/en/keyring-system-variables.html
If you create the directory manually, it should have a restrictive mode and be accessible only to the account used to run the MySQL server. If this variable is specified in an option file, the file should have a restrictive mode and be accessible ...
https://dev.mysql.com/doc/refman/8.0/en/lock-tables.html
You must have the LOCK TABLES privilege, and the SELECT privilege for each object to be locked. (This is a very convenient way to get backups if you have a file system such as Veritas that can take snapshots in time.) LOCK TABLE is a synonym for ...
https://dev.mysql.com/doc/refman/8.0/en/multifactor-authentication.html
Something you have, such as a security key or smart card. CREATE USER and ALTER USER have syntax enabling multiple authentication methods to be specified for new accounts, and for adding, modifying, or dropping authentication methods for existing ...
https://dev.mysql.com/doc/refman/8.0/en/myisamchk-table-info.html
The value may contain any of the following descriptors: constant All rows have the same value. Packed MySQL tries to pack key values that have a common suffix. For long indexed strings that have similar leftmost parts, this can significantly reduce ... To obtain a description of a MyISAM table or statistics about it, use the commands shown ...
https://dev.mysql.com/doc/refman/8.0/en/mysql-cluster-params-ndbd.html
The listings in this section provide information about parameters used in the [ndbd] or [ndbd default] sections of a config.ini file for configuring NDB Cluster data nodes. For detailed descriptions and other additional information about each of ...
https://dev.mysql.com/doc/refman/8.0/en/mysql-cluster-programs-ndb-blob-tool.html
--check-missing Command-Line Format --check-missing Introduced 8.0.20-ndb-8.0.20 Check for inline parts in NDB Cluster tables which have no corresponding BLOB parts. --check-orphans Command-Line Format --check-orphans Check for BLOB parts in NDB ...
https://dev.mysql.com/doc/refman/8.0/en/mysql-cluster-programs-ndb-config.html
--diff-default Command-Line Format --diff-default Print only configuration parameters that have non-default values. This tool extracts current configuration information for data nodes, SQL nodes, and API nodes from one of a number of sources: an ...
Displaying 151 to 160 of 1321 total results