PDF (US Ltr)
- 43.2Mb
PDF (A4)
- 43.3Mb
Man Pages (TGZ)
- 296.4Kb
Man Pages (Zip)
- 401.7Kb
Info (Gzip)
- 4.3Mb
Info (Zip)
- 4.3Mb
Search Results
https://dev.mysql.com/doc/refman/8.0/en/using-encrypted-connections.html
To reconfigure the TLS context at runtime, use this procedure: Set each TLS context-related system variable that should be changed to its new value. The members of each pair of system and status variables may have different values temporarily due to ... Several configuration parameters are available to indicate whether to use encrypted connections, and to specify the appropriate certificate and key ...
https://dev.mysql.com/doc/refman/8.0/en/windows-symbolic-links.html
Use of database symlinks on Windows is similar to their use on Unix, although the procedure for setting up the link differs. On Windows, symbolic links can be used for database directories. This enables you to put a database directory at a ...
https://dev.mysql.com/doc/refman/8.0/en/replication-options-replica.html
It does not apply to stored procedures and functions, or events. It does not affect statements that apply only to other database objects, such as stored routines. To filter statements operating on stored routines, use one or more of the ... This ...
https://dev.mysql.com/doc/refman/8.0/en/create-table-generated-columns.html
Generated column definitions have this syntax: col_name data_type [GENERATED ALWAYS] AS (expr) [VIRTUAL | STORED] [NOT NULL | NULL] [UNIQUE [KEY]] [[PRIMARY] KEY] [COMMENT 'string'] AS (expr) indicates that the column is generated and defines the ...
https://dev.mysql.com/doc/refman/8.0/en/encryption-functions.html
To avoid exposing these, applications can use stored procedures to encrypt and decrypt values on the server side. If you want to store these results, use a column with a VARBINARY or BLOB binary string data type. If an application stores values from ...This avoids potential problems with trailing space removal or character set conversion that would change data values, such as may occur if you use a nonbinary string data type (CHAR, VARCHAR, ...
https://dev.mysql.com/doc/refman/8.0/en/replication-options-binary-log.html
For details of how stored programs (stored procedures and functions, triggers, and events) are handled when each binary logging format is set, see Section 27.7, “Stored Program Binary Logging”. Where possible, rows stored in the binary log are ... Startup Options Used with Binary Logging System Variables Used with Binary Logging You can use the mysqld options and system variables that are described in this section to affect the operation of the binary log as well as to control which statements are written to the binary ...
https://dev.mysql.com/doc/refman/8.0/en/function-resolution.html
MySQL supports built-in (native) functions, loadable functions, and stored functions. However, for these nonaffected function names, interpretation may vary in expression context: func_name () is interpreted as a built-in function if there is one ...This section describes how the server recognizes whether the name of a built-in function is used as a function call or as an identifier, and how the server determines which function to use in cases when functions of different types exist with a given ...
https://dev.mysql.com/doc/refman/8.0/en/pam-pluggable-authentication.html
The password must be appropriate for the password store used by the PAM service. Examples: For traditional Unix passwords, the service looks up passwords stored in the /etc/shadow file. For LDAP, the service looks up passwords stored in an LDAP ...
https://dev.mysql.com/doc/refman/8.0/en/create-view.html
If the DEFINER clause is present, the privileges required depend on the user value, as discussed in Section 27.6, “Stored Object Access Control”. Within a stored program, the SELECT statement cannot refer to program parameters or local variables. This same principle applies to options such as ALL, DISTINCT, or SQL_SMALL_RESULT that follow the SELECT keyword, and to clauses such as INTO, FOR UPDATE, FOR SHARE, LOCK IN SHARE MODE, and ...
https://dev.mysql.com/doc/refman/8.0/en/tuning-trace-purging.html
Thus, if a statement contains substatements (such as invoking stored procedures, stored functions, or triggers), the topmost statement and substatements each generate one trace, but at the end of execution, the trace for only the last substatement ...Such a SET statement has the following effects: All traces previously stored are cleared from ...A user who wants to see the trace of a different substatement can enable or disable tracing for the ...