PDF (US Ltr)
- 43.3Mb
PDF (A4)
- 43.4Mb
Man Pages (TGZ)
- 296.6Kb
Man Pages (Zip)
- 402.0Kb
Info (Gzip)
- 4.3Mb
Info (Zip)
- 4.3Mb
Search Results
https://dev.mysql.com/doc/refman/8.0/en/encryption-functions.html
Their return value is a string that has a character set and collation determined by the character_set_connection and collation_connection system variables. Caution Passwords or other sensitive values supplied as arguments to encryption functions are ...If you want to store these results, use a column with a VARBINARY or BLOB binary string data ...
https://dev.mysql.com/doc/refman/8.0/en/explain.html
{EXPLAIN | DESCRIBE | DESC} tbl_name [col_name | wild] {EXPLAIN | DESCRIBE | DESC} [explain_type] {explainable_stmt | FOR CONNECTION connection_id} {EXPLAIN | DESCRIBE | DESC} ANALYZE [explain_type] select_stmt explain_type: { FORMAT = format_name ...In practice, the DESCRIBE keyword is more often used to obtain information about table structure, whereas EXPLAIN is used to obtain a query execution plan (that is, an explanation of how MySQL would execute a ...
https://dev.mysql.com/doc/refman/8.0/en/grant-tables.html
For example, a user table row with Host and User values of 'h1.example.net' and 'bob' applies to authenticating connections made to the server from the host h1.example.net by a client that specifies a user name of bob. Similarly, a db table row with ... The mysql system database includes several grant tables that contain information about user accounts and the privileges held by ...
https://dev.mysql.com/doc/refman/8.0/en/group-replication-distributed-recovery-fault.html
When the member joining has restarted at the end of the operation, it establishes a connection with a new donor for state transfer from the binary log, which might be a different member from the original donor used for the remote cloning operation.
https://dev.mysql.com/doc/refman/8.0/en/innodb-memcached-replication.html
2013-09-24T13:04:38.639684Z 49 [Note] Replication I/O thread: connected to source 'root@localhost:13000', replication started in log '0.000001' at position 114 Testing the InnoDB memcached Replication Configuration This example demonstrates how to ... Because the daemon_memcached plugin supports the MySQL binary log, source server through the memcached interface can be replicated for backup, balancing intensive read workloads, and high ...
https://dev.mysql.com/doc/refman/8.0/en/ipv6-support.html
Support for IPv6 in MySQL includes these capabilities: MySQL Server can accept TCP/IP connections from clients connecting over IPv6. For example, this command connects over IPv6 to the MySQL server on the local host: $> mysql -h ::1 To use this ...
https://dev.mysql.com/doc/refman/8.0/en/keyring-options.html
Migration always occurs on the local host, so the option always specifies a value for connecting to a local server, such as localhost, 127.0.0.1, ::1, or the local host IP address or host name. --keyring-migration-password[=password] Command-Line ...
https://dev.mysql.com/doc/refman/8.0/en/load-data-local-security.html
In this environment, the client with respect to the MySQL server actually is the Web server, not a remote program being run by users who connect to the Web server. To avoid connecting to untrusted servers, clients can establish a secure connection ... The LOAD DATA statement loads a data file into a ...
https://dev.mysql.com/doc/refman/8.0/en/mysql-cluster-params-api.html
AutoReconnect: Specifies whether an API node should reconnect fully when disconnected from cluster. ConnectBackoffMaxTime: Specifies longest time in milliseconds (~100ms resolution) to allow between connection attempts to any given data node by this ... The listing in this section provides information about parameters used in the [mysqld] and [api] sections of a config.ini file for configuring NDB Cluster SQL nodes and API ...
https://dev.mysql.com/doc/refman/8.0/en/mysql-cluster-security-networking-issues.html
Because network speed and latency have a direct impact on the cluster's efficiency, it is also not advisable to employ SSL or other encryption to network connections between nodes, as such schemes cause slow communications. However, this also means ... In this section, we discuss basic network security issues as they relate to NDB ...