PDF (US Ltr)
- 43.3Mb
PDF (A4)
- 43.4Mb
Man Pages (TGZ)
- 297.2Kb
Man Pages (Zip)
- 402.4Kb
Info (Gzip)
- 4.3Mb
Info (Zip)
- 4.3Mb
Search Results
https://dev.mysql.com/doc/refman/8.0/en/replication-binlog-encryption-encryption-keys.html
The binary log master key is used to encrypt each new log file's file password, which is a randomly generated 32-byte file password specific to the log file that is used to encrypt the file data. The file data is encrypted using AES-CTR (AES Counter ... The binary log encryption keys used to encrypt the file passwords for the log files are 256-bit keys that are generated specifically for each MySQL server instance using MySQL Server's keyring service (see Section 8.4.4, “The MySQL ...
https://dev.mysql.com/doc/refman/8.0/en/reloading-delimited-text-dumps.html
For backups produced with mysqldump --tab, each table is represented in the output directory by an .sql file containing the CREATE TABLE statement for the table, and a .txt file containing the table data. To reload a table, first change location ...
https://dev.mysql.com/doc/refman/8.0/en/mysql-installer-workflow.html
This does not apply to files and directories for specific products, such as the MySQL server data directory in %ProgramData% that is owned by SYSTEM. This includes defining custom file paths for the error log, general log, slow query log (including ...Note Full permissions are granted to the user executing MySQL Installer to all generated files, such as ...Unlike the initial ...
https://dev.mysql.com/doc/refman/8.0/en/clone-plugin-replication.html
To initiate replication, the binary logs required for the recipient to catch up to the donor must not be purged between the time that the data is cloned and the time that replication is started. Note that if the settings master_info_repository=FILE ...In addition to cloning data, a cloning operation extracts replication coordinates from the donor and transfers them to the recipient, which enables using the clone plugin for provisioning Group Replication members and ...
https://dev.mysql.com/doc/refman/8.0/en/mysql-cluster-online-operations.html
For ALGORITHM=COPY, the mysqld NDB Cluster handler performs the following actions: Tells the data nodes to create an empty copy of the table, and to make the required schema changes to this copy. Tells the data nodes to drop the original table and ...NDB Cluster handles COPY and INPLACE as described in the next few ... MySQL NDB ...
https://dev.mysql.com/doc/refman/8.0/en/keyring-aws-plugin.html
For example, use these lines in the server my.cnf file, adjusting the .so suffix and file locations for your platform as necessary: [mysqld] early-plugin-load=keyring_aws.so ...The keyring_aws_conf_file and keyring_aws_data_file system variables ...
https://dev.mysql.com/doc/refman/8.0/en/keyring-hashicorp-plugin.html
Plugin-specific configuration includes preparation of the certificate and key files needed for connecting to HashiCorp Vault, as well as configuring HashiCorp Vault itself. A typical setup includes a set of certificate and key files: company.crt: A ... Note The keyring_hashicorp plugin is an extension included in MySQL Enterprise Edition, a commercial ...
https://dev.mysql.com/doc/refman/8.0/en/bug-reports.html
If you encounter an error with InnoDB tables, restart the server and see whether the problem persists, or whether the error affected only cached data in memory. If the problem occurs during compilation, include the exact error messages and also a ...
https://dev.mysql.com/doc/refman/8.0/en/information-schema-table-reference.html
The following table summarizes all available INFORMATION_SCHEMA tables. For greater detail, see the individual table descriptions. Table 28.1 INFORMATION_SCHEMA Tables Table Name Description Introduced Deprecated ADMINISTRABLE_ROLE_AUTHORIZATIONS ...
https://dev.mysql.com/doc/refman/8.0/en/point-in-time-recovery-binlog.html
To restore data from the binary log, you must know the name and location of the current binary log files. By default, the server creates binary log files in the data directory, but a path name can be specified with the --log-bin option to place the ...The source of information for point-in-time recovery is the set of binary log files generated subsequent to the full backup ...Viewing log ...