Search Results
https://dev.mysql.com/doc/refman/8.4/en/request-access.html
For example, if you want to execute mysqladmin shutdown but your user table row does not grant the SHUTDOWN privilege to you, the server denies access without even checking the db table. The Host and User columns are matched to the connecting user's ... After the server accepts a connection, it enters Stage 2 of access ...
https://dev.mysql.com/doc/heatwave/en/mys-hw-pre-authenticated-requests.html
Before You Begin Review the following: Additional MySQL HeatWave Lakehouse Requirements MySQL HeatWave Lakehouse Privileges Supported File Formats PAR Privileges To create pre-authenticated requests to access Object Storage resources, you require ...
https://dev.mysql.com/doc/refman/8.4/en/server-system-variables.html
The MySQL server maintains many system variables that affect its operation. Some variables are read-only, and their values are determined by the system environment, by how MySQL is installed on the system, or possibly by the options used to compile ...Most system variables can be set at server startup using options on the command line or in an option ...
https://dev.mysql.com/doc/refman/8.4/en/upgrade-best-practices.html
MySQL supports upgrading between minor versions (within an LTS series) and to the next major version (across an LTS series). Decide on Upgrade Type There are three main ways to upgrade MySQL; read the associated documentation to determine which ...
https://dev.mysql.com/doc/refman/8.4/en/glossary.html
These terms are commonly used in information about the MySQL database server. Files with this extension are always included in backups produced by the mysqlbackup command of the MySQL Enterprise Backup product. Files with this extension are always ...These properties are all desirable in a database system, and are all closely tied to the notion of a ...
https://dev.mysql.com/doc/mysql-monitor/8.0/en/mem-access-control-best-practice-ref.html
As each organization has a different way of implementing their MySQL installations and monitoring, the scenarios described are general guidelines. The roles involved in each scenario are as follows: Database Administrator (DBA): responsible for the ... This chapter describes some best practices for setting up your access control ...
https://dev.mysql.com/doc/refman/8.4/en/innodb-best-practices.html
Run the server with the --sql_mode=NO_ENGINE_SUBSTITUTION option to prevent tables from being created with storage engines that you do not want to use. Specify a primary key for every table using the most frequently queried column or columns, or an ...
https://dev.mysql.com/doc/refman/8.4/en/mysql-cluster-ndbd-definition.html
(For example, 100K means 100 × 1024 = 102400.) Parameter names and values are case-insensitive, unless used in a MySQL Server my.cnf or my.ini file, in which case they are case-sensitive. The transporter's group number can be based on which ... The ...
https://dev.mysql.com/doc/mysql-errors/8.4/en/server-error-reference.html
The MySQL server writes some error messages to its error log, and sends others to client programs. See Chapter 4, Global Error Message Reference Error number: 1002; Symbol: ER_NO; SQLSTATE: HY000 Message: NO Used in the construction of other ...
https://dev.mysql.com/doc/mysql-monitor/8.0/en/mem-delete-inventory.html
This section describes how to delete information on assets, and groups of assets, from MySQL Enterprise Monitor's inventory, using the curl utility on the command line. The delete process removes all record of an asset or group of assets from the ...Important Deleting assets from the inventory does not delete or uninstall assets from their installed ...