PDF (US Ltr)
- 43.3Mb
PDF (A4)
- 43.4Mb
Man Pages (TGZ)
- 297.2Kb
Man Pages (Zip)
- 402.4Kb
Info (Gzip)
- 4.3Mb
Info (Zip)
- 4.3Mb
Search Results
https://dev.mysql.com/doc/refman/8.0/en/mysql-cluster-programs-ndb-print-backup-file.html
--backup-key, -K Command-Line Format --backup-key=key Introduced 8.0.31-ndb-8.0.31 Specify the key needed to decrypt an encrypted backup. --backup-key-from-stdin Command-Line Format --backup-key-from-stdin Introduced 8.0.31-ndb-8.0.31 Allow input of ...This can be any of the files (.Data, .ctl, or .log file) found in a cluster backup ...
https://dev.mysql.com/doc/refman/8.0/en/mysql-cluster-tde-implementation.html
The secrets file contains a Node Master Key (NMK), a key used later to encrypt the different file types used for persistence. cac256e18b2ddf6b5ef82d99a72f18e864b78453cc7fa40bfaf0c40b91122d18 The per-node key hierarchy can be represented as follows: ... For NDB Transparent Data Encryption (TDE), data nodes encrypt user data at rest, with security provided by a password (file system password), which is used to encrypt and decrypt a secrets file on each data ...
https://dev.mysql.com/doc/refman/8.0/en/myisamchk-general-options.html
key_buffer_size is used when you are checking the table with --extend-check or when the keys are repaired by inserting keys row by row into the table (like when doing normal inserts). Repairing through the key buffer is used in the following cases: ... The options described in this section can be used for any type of table maintenance operation performed by ...
https://dev.mysql.com/doc/refman/8.0/en/mysql-cluster-programs-ndb-print-file.html
--file-key-from-stdin Command-Line Format --file-key-from-stdin Introduced 8.0.31-ndb-8.0.31 Type Boolean Default Value FALSE Valid Values TRUE Supply file system encryption or decryption key from stdin. ndb_print_file obtains information from an ...
https://dev.mysql.com/doc/refman/8.0/en/check-table.html
This also calculates a key checksum for the rows and verifies this with a calculated checksum for the keys. EXTENDED Do a full key lookup for all keys for each row. In this case, the AUTO_INCREMENT column changes value according to the rules of ...
https://dev.mysql.com/doc/refman/8.0/en/checking-rpm-signature.html
RPM 4.1 no longer uses your personal GPG keyring (or GPG itself). Rather, RPM maintains a separate keyring because it is a system-wide application and a user's GPG public keyring is a user-specific file. To import the MySQL public key into the RPM ...
https://dev.mysql.com/doc/refman/8.0/en/create-user.html
Encrypted connections can be used, at the client's option, if the client has the proper certificate and key files. CREATE USER 'jeffrey'@'localhost' REQUIRE X509; For accounts with REQUIRE X509, clients must specify the --ssl-key and --ssl-cert ...
https://dev.mysql.com/doc/refman/8.0/en/group-replication-secure-user.html
Also, if you are using caching SHA-2 authentication, you must set up RSA key-pairs on the group members. If the replication user you configure for distributed recovery uses the caching SHA-2 authentication plugin, and you are not using SSL for ...
https://dev.mysql.com/doc/refman/8.0/en/keyring-file-plugin.html
The keyring_file keyring plugin stores keyring data in a file local to the server host. Instead, consider using the component_keyring_file component for storing keyring data (see Section 8.4.4.4, “Using the component_keyring_file File-Based ...As ...
https://dev.mysql.com/doc/refman/8.0/en/myisam-storage-engine.html
All numeric key values are stored with the high byte first to permit better index compression. For the case of a key longer than 250 bytes, a larger key block size than the default of 1024 bytes is used. When rows are inserted in sorted order (as ...