PDF (US Ltr)
- 43.3Mb
PDF (A4)
- 43.4Mb
Man Pages (TGZ)
- 297.2Kb
Man Pages (Zip)
- 402.4Kb
Info (Gzip)
- 4.3Mb
Info (Zip)
- 4.3Mb
Search Results
https://dev.mysql.com/doc/refman/8.0/en/myisamchk-general-options.html
key_buffer_size is used when you are checking the table with --extend-check or when the keys are repaired by inserting keys row by row into the table (like when doing normal inserts). Repairing through the key buffer is used in the following cases: ... The options described in this section can be used for any type of table maintenance operation performed by ...
https://dev.mysql.com/doc/refman/8.0/en/mysql-cluster-programs-ndb-print-file.html
--file-key-from-stdin Command-Line Format --file-key-from-stdin Introduced 8.0.31-ndb-8.0.31 Type Boolean Default Value FALSE Valid Values TRUE Supply file system encryption or decryption key from stdin. ndb_print_file obtains information from an ...
https://dev.mysql.com/doc/refman/8.0/en/check-table.html
This also calculates a key checksum for the rows and verifies this with a calculated checksum for the keys. EXTENDED Do a full key lookup for all keys for each row. In this case, the AUTO_INCREMENT column changes value according to the rules of ...
https://dev.mysql.com/doc/refman/8.0/en/checking-rpm-signature.html
RPM 4.1 no longer uses your personal GPG keyring (or GPG itself). Rather, RPM maintains a separate keyring because it is a system-wide application and a user's GPG public keyring is a user-specific file. To import the MySQL public key into the RPM ...
https://dev.mysql.com/doc/refman/8.0/en/create-user.html
Encrypted connections can be used, at the client's option, if the client has the proper certificate and key files. CREATE USER 'jeffrey'@'localhost' REQUIRE X509; For accounts with REQUIRE X509, clients must specify the --ssl-key and --ssl-cert ...
https://dev.mysql.com/doc/refman/8.0/en/group-replication-secure-user.html
Also, if you are using caching SHA-2 authentication, you must set up RSA key-pairs on the group members. If the replication user you configure for distributed recovery uses the caching SHA-2 authentication plugin, and you are not using SSL for ...
https://dev.mysql.com/doc/refman/8.0/en/keyring-file-plugin.html
The keyring_file keyring plugin stores keyring data in a file local to the server host. Instead, consider using the component_keyring_file component for storing keyring data (see Section 8.4.4.4, “Using the component_keyring_file File-Based ...As ...
https://dev.mysql.com/doc/refman/8.0/en/myisam-storage-engine.html
All numeric key values are stored with the high byte first to permit better index compression. For the case of a key longer than 250 bytes, a larger key block size than the default of 1024 bytes is used. When rows are inserted in sorted order (as ...
https://dev.mysql.com/doc/refman/8.0/en/table-scan-avoidance.html
This usually happens under the following conditions: The table is so small that it is faster to perform a table scan than to bother with a key lookup. You are using a key with low cardinality (many rows match the key value) through another column.
https://dev.mysql.com/doc/refman/8.0/en/administrative-connection-interface.html
When clients connect to the administrative interface, they should use the same certificate and key files as for ordinary connections on the main interface. When clients connect to the administrative interface, they should use certificate and key ...