Search

Download this Manual
PDF (US Ltr) - 43.3Mb
PDF (A4) - 43.4Mb
Man Pages (TGZ) - 297.2Kb
Man Pages (Zip) - 402.5Kb
Info (Gzip) - 4.3Mb
Info (Zip) - 4.3Mb


Displaying 421 to 430 of 861 total results
https://dev.mysql.com/doc/refman/8.0/en/roles.html
Even with this safeguard, it is better to avoid granting the SYSTEM_USER privilege through a role in order to guard against the possibility of privilege escalation. To restore modification privileges to the role, simply re-grant them: GRANT INSERT, ...Like user accounts, roles can have privileges granted to and revoked from ...
https://dev.mysql.com/doc/refman/8.0/en/show-grants.html
SHOW GRANTS [FOR user_or_role [USING role [, role] ...]] user_or_role: { user (see Section 8.2.4, “Specifying Account Names”) | role (see Section 8.2.5, “Specifying Role Names”. } This statement displays the privileges and roles that are ...
https://dev.mysql.com/doc/refman/8.0/en/triggers.html
Some uses for triggers are to perform checks of values to be inserted into a table or to perform calculations on values involved in an update. A trigger is defined to activate when a statement inserts, updates, or deletes rows in the associated ...
https://dev.mysql.com/doc/refman/8.0/en/view-check-option.html
The WITH CHECK OPTION clause can be given for an updatable view to prevent inserts to rows for which the WHERE clause in the select_statement is not true. It also prevents updates to rows for which the WHERE clause is true but the update would ...
https://dev.mysql.com/doc/refman/8.0/en/communication-errors.html
If a transfer goes in burst-pause-burst-pause mode, you are experiencing a Linux duplex syndrome. Switch the duplex mode for both your network card and hub/switch to either full duplex or to half duplex and test the results to determine the best ...
https://dev.mysql.com/doc/refman/8.0/en/constraint-invalid-data.html
It is possible to alter this behavior to be more forgiving of invalid values, such that the server coerces them to valid ones for data entry, by disabling strict SQL mode (see Section 7.1.11, “Server SQL Modes”), but this is not recommended. By ...
https://dev.mysql.com/doc/refman/8.0/en/faqs-tablespace-encryption.html
It uses Electronic Codebook (ECB) block encryption mode for tablespace key encryption and Cipher Block Chaining (CBC) block encryption mode for data encryption. Is data decrypted for users who are authorized to see it? A.17.2. What are the ...
https://dev.mysql.com/doc/refman/8.0/en/firewall.html
For a given account, the firewall can operate in recording, protecting, or detecting mode, for training in the accepted statement patterns, active protection against unacceptable statements, or passive detection of unacceptable statements. The ...
https://dev.mysql.com/doc/refman/8.0/en/fractional-seconds.html
MySQL has fractional seconds support for TIME, DATETIME, and TIMESTAMP values, with up to microseconds (6 digits) precision: To define a column that includes a fractional seconds part, use the syntax type_name(fsp), where type_name is TIME, ...
https://dev.mysql.com/doc/refman/8.0/en/fulltext-query-expansion.html
Blind query expansion (also known as automatic relevance feedback) is enabled by adding WITH QUERY EXPANSION or IN NATURAL LANGUAGE MODE WITH QUERY EXPANSION following the search phrase. The following example shows this difference: mysql> SELECT * ... Full-text search supports query expansion (and in particular, its variant “blind query ...
Displaying 421 to 430 of 861 total results