PDF (US Ltr)
- 43.3Mb
PDF (A4)
- 43.4Mb
Man Pages (TGZ)
- 297.2Kb
Man Pages (Zip)
- 402.4Kb
Info (Gzip)
- 4.3Mb
Info (Zip)
- 4.3Mb
Search Results
https://dev.mysql.com/doc/refman/8.0/en/replication-options-reference.html
replica_checkpoint_period: Update progress status of multithreaded replica and flush relay log info to disk after this number of milliseconds. replica_transaction_retries: Number of times replication SQL thread retries transaction in case it failed ... The following two sections provide basic information about the MySQL command-line options and system variables applicable to replication and the binary ...
https://dev.mysql.com/doc/refman/8.0/en/pluggable-authentication-system-variables.html
The file can be validated to make sure that it is correct and was copied properly using this command: klist -k file_name For information about keytab files, see https://web.mit.edu/kerberos/krb5-latest/doc/basic/keytab_def.html. If FIDO ...The file ...
https://dev.mysql.com/doc/refman/8.0/en/roles.html
To specify mandatory roles at server startup, define mandatory_roles in your server my.cnf file: [mysqld] mandatory_roles='role1,role2@localhost,r3@%.example.com' To set and persist mandatory_roles at runtime, use a statement like this: SET PERSIST ...Like user accounts, roles can have privileges granted to and revoked from ...A user account can be ...
https://dev.mysql.com/doc/refman/8.0/en/password-management.html
Password expiration according to policy is automatic and is based on password age, which for a given account is assessed from the date and time of its most recent password change. The following sections describe these capabilities, except password ...Random password generation, as an alternative to requiring explicit administrator-specified literal ... MySQL supports ...
https://dev.mysql.com/doc/refman/8.0/en/encryption-functions.html
PBKDF2 applies a pseudorandom function to the keying material, and repeats this process a large number of times to produce the key. In addition, if the validate_password.check_user_name system variable is enabled and the password matches the user ...
https://dev.mysql.com/doc/refman/8.0/en/replication-options-source.html
The replication characteristics of these settings differ as follows: With AFTER_SYNC, all clients see the committed transaction at the same time: After it has been acknowledged by the replica and committed to the storage engine on the source. An ...
https://dev.mysql.com/doc/refman/8.0/en/keyring-okv-plugin.html
For example: STANDBY_SERVER=host_ip:port_num,host_ip:port_num,host_ip:port_num,host_ip:port_num Ensure that the list of standby servers is kept short, accurate, and up to date, and servers that are no longer valid are removed. There is a 20-second ...The Key Management Interoperability Protocol (KMIP) enables communication of cryptographic keys between a key management server and its ...
https://dev.mysql.com/doc/refman/8.0/en/faqs-cjk.html
Sometimes people try to insert gbk characters into gb2312, and it works most of the time because gbk is a superset of gb2312. This set of Frequently Asked Questions derives from the experience of MySQL's Support and Development groups in handling ...What problems should I be aware of when working with the Big5 Chinese character set? ...
https://dev.mysql.com/doc/refman/8.0/en/keyring-key-migration.html
The source keystore remains the same before and after the migration (because keys are copied, not moved). If a key to be copied already exists in the destination keystore, an error occurs and the destination keystore is restored to its premigration ... A keyring migration copies keys from one keystore to another, enabling a DBA to switch a MySQL installation to a different ...
https://dev.mysql.com/doc/refman/8.0/en/stored-programs-logging.html
Instead, each reference to a local variable is replaced by this construct for logging purposes: NAME_CONST(var_name, var_value) var_name is the local variable name, and var_value is a constant indicating the value that the variable has at the time ...These events bring databases up to date from the point of the ... The binary log ...