Search Results
https://dev.mysql.com/doc/relnotes/connector-j/en/news-8-0-27.html
It is suitable for use with MySQL Server versions 8.0, 5.7, and 5.6. (WL #14707) The Connector/J test suite has been reworked to run against a single MySQL Server compiled with either yaSSL or OpenSSL; the Ant build properties ... Version 8.0.27 is ...
https://dev.mysql.com/doc/refman/8.4/en/group-replication-responses-failure-expel.html
You can use the group_replication_member_expel_timeout system variable to allow additional time between the creation of a suspicion and the expulsion of the suspect member. You can adjust the cache size limit using the ...A suspicion is created ...
MySQL 8.4 Reference Manual :: 19.2.1.3 Determination of Safe and Unsafe Statements in Binary Logging
https://dev.mysql.com/doc/refman/8.4/en/replication-rbr-safe-unsafe.html
Most system variables are not replicated correctly using the statement-based format. Statements with the following characteristics are considered unsafe: Statements containing system functions that may return a different value on the replica. These ... The “safeness” of a statement in MySQL replication refers to whether the statement and its effects can be replicated correctly using statement-based ...
https://dev.mysql.com/doc/refman/8.4/en/source-ssl-library-configuration.html
To check whether a mysqld server supports encrypted connections, examine the value of the tls_version system variable: mysql> SHOW VARIABLES LIKE 'tls_version'; +---------------+-----------------+ | Variable_name | Value | ...To compile using ... An ...
https://dev.mysql.com/doc/refman/8.4/en/group-replication-understanding-consistency-guarantees.html
In terms of distributed consistency guarantees, either in normal or failure repair operations, Group Replication has always been an eventual consistency system. The events that relate to the consistency of a system can be split into control ...This ...
https://dev.mysql.com/doc/refman/8.4/en/mysql-cluster-programs-ndb-show-tables.html
By default, this includes not only both user-created tables and NDB system tables, but NDB-specific indexes, internal triggers, and NDB Cluster Disk Data objects as well. --connect-retry-delay Command-Line Format --connect-retry-delay=# Type Integer ... ndb_show_tables displays a list of all NDB database objects in the ...
https://dev.mysql.com/doc/ndbapi/en/overview-terminology.html
3 node types are supported: A management (MGM) node is an instance of ndb_mgmd, the NDB Cluster management server daemon. SQL node refers to a mysqld (MySQL Server) process that is connected to the NDB Cluster as an API node. The process of starting ... Abstract This section provides a glossary of terms which are unique to the NDB and MGM APIs, or that have a specialized meaning when applied in the context of either or both of these ...
https://dev.mysql.com/doc/refman/8.4/en/innodb-online-ddl-operations.html
If you create a table without a primary key, InnoDB chooses one for you, which can be the first UNIQUE key defined on NOT NULL columns, or a system-generated key. The rows of an InnoDB table are stored in a clustered index organized based on the ...
https://dev.mysql.com/doc/refman/8.4/en/password-security-user.html
When you run a client program to connect to the MySQL server, it is inadvisable to specify your password in a way that exposes it to discovery by other users. The file can be read later by MySQL client programs to obtain authentication credentials ... MySQL users should use the following guidelines to keep passwords ...
https://dev.mysql.com/doc/connectors/en/connector-j-logging-slf4j.html
Follow these requirements to use a logging framework with SLF4J and Connector/J: In the development environment: Install on your system slf4j-api-x.y.z.jar (available at https://www.slf4j.org/download.html) and add it to the Java classpath. On the ... Besides its default logger com.mysql.cj.log.StandardLogger, which logs to stderr, Connector/J supports the SLF4J logging facade, allowing end users of applications using Connector/J to plug in logging frameworks of their own choices at deployment ...