PDF (US Ltr)
- 43.3Mb
PDF (A4)
- 43.4Mb
Man Pages (TGZ)
- 297.2Kb
Man Pages (Zip)
- 402.4Kb
Info (Gzip)
- 4.3Mb
Info (Zip)
- 4.3Mb
Search Results
https://dev.mysql.com/doc/refman/8.0/en/clone-plugin-remote.html
mysql> SELECT FILE_NAME FROM INFORMATION_SCHEMA.FILES; Plugins that are active on the donor, including any keyring plugin, must also be active on the recipient. To configure the recipient MySQL server instance to use an encrypted connection: Make ...
https://dev.mysql.com/doc/refman/8.0/en/fido-pluggable-authentication.html
FIDO pluggable authentication provides these capabilities: FIDO enables authentication to MySQL Server using devices such as smart cards, security keys, and biometric readers. When device registration has been performed for the account, the server ... Note FIDO pluggable authentication is an extension included in MySQL Enterprise Edition, a commercial ...
https://dev.mysql.com/doc/refman/8.0/en/innodb-limits.html
The index key prefix length limit is 3072 bytes for InnoDB tables that use DYNAMIC or COMPRESSED row format. The index key prefix length limit is 767 bytes for InnoDB tables that use the REDUNDANT or COMPACT row format. Attempting to use an index ...
https://dev.mysql.com/doc/refman/8.0/en/json-modification-functions.html
JSON_MERGE_PATCH(json_doc, json_doc[, json_doc] ...) Performs an RFC 7396 compliant merge of two or more JSON documents and returns the merged result, without preserving members having duplicate keys. If both arguments are objects, the result of the ... The functions in this section modify JSON values and return the ...
https://dev.mysql.com/doc/refman/8.0/en/keyring-encrypted-file-plugin.html
Note The keyring_encrypted_file plugin is an extension included in MySQL Enterprise Edition, a commercial product. The keyring_encrypted_file keyring plugin stores keyring data in an encrypted, password-protected file local to the server host. As ...
https://dev.mysql.com/doc/refman/8.0/en/midpoint-insertion.html
By default, the key cache management system uses a simple LRU strategy for choosing key cache blocks to be evicted, but it also supports a more sophisticated method called the midpoint insertion strategy. The division point between two parts is not ...When using the midpoint insertion strategy, the LRU chain is divided into two parts: a hot sublist and a warm ...
https://dev.mysql.com/doc/refman/8.0/en/pluggable-authentication-system-variables.html
authentication_kerberos_service_key_tab Command-Line Format --authentication-kerberos-service-key-tab=file_name Introduced 8.0.26 System Variable authentication_kerberos_service_key_tab Scope Global Dynamic No SET_VAR Hint Applies No Type File name ...If FIDO authentication is attempted and this value is not the one expected by the FIDO device, the device assumes that it is not talking to the correct server and an error ...
https://dev.mysql.com/doc/refman/8.0/en/group-replication-secure-socket-layer-support-ssl.html
The server SSL options that are applied to Group Replication's group communication connections are as follows: Table 20.2 SSL Options Server Configuration Description ssl_key The path name of the SSL private key file in PEM format. ssl_cert The path ... Secure sockets can be used for group communication connections between members of a ...
https://dev.mysql.com/doc/refman/8.0/en/innodb-memcached-dml.html
These operations are guaranteed to only affect one row when issued through the memcached interface, because the key is unique within the table. key refers to the column listed under key_columns, and val refers to the column listed under ...
https://dev.mysql.com/doc/refman/8.0/en/keyring-component-plugin-comparison.html
The MySQL Keyring originally implemented keystore capabilities using server plugins, but began transitioning to use the component infrastructure in MySQL 8.0.24. This section briefly compares keyring components and plugins to provide an overview of ...