Search



Search Results
Displaying 161 to 170 of 441 total results
https://dev.mysql.com/doc/refman/8.4/en/encrypted-connection-protocols-ciphers.html
MySQL supports multiple TLS protocols and ciphers, and enables configuring which protocols and ciphers to permit for encrypted connections. It is also possible to determine which protocol and cipher the current session uses. Supported TLS Protocols ...
https://dev.mysql.com/doc/mysql-enterprise-backup/8.4/en/backup-commands-restore.html
The restore operations restores the data files from a backup to their original locations on the database server, or to other desired locations. Normally, the restoration process requires the database server to be already shut down (or, at least not ...
https://dev.mysql.com/doc/mysql-enterprise-backup/8.4/en/meb-encryption.html
In order to enhance security for backed up data, MySQL Enterprise Backup provides encryption for single-file backups. The encryption can also be applied when creating a partial, compressed, or incremental single-file backups, and for streaming ...
https://dev.mysql.com/doc/workbench/en/wb-sql-editor-snippets.html
The Snippets secondary tab includes built-in, local, and shared custom snippets. The My Snippets option stores custom snippets in a file under the MySQL Workbench user's configuration directory. Using Snippets Snippets can be inserted into the SQL ...
https://dev.mysql.com/doc/mysql-installer/en/MySQLInstallerConsole.html
MySQLInstallerConsole.exe provides command-line functionality that is similar to MySQL Installer. This reference includes: MySQL Product Names Command Syntax Command Actions The console is installed when MySQL Installer is initially executed and ...
https://dev.mysql.com/doc/refman/8.4/en/identifier-qualifiers.html
An unqualified name is permitted in contexts where interpretation of the name is unambiguous. A qualified name includes at least one qualifier to clarify the interpretive context by overriding a default context or providing missing context. For ...
https://dev.mysql.com/doc/refman/8.4/en/keyring-component-installation.html
Keyring service consumers require that a keyring component or plugin be installed: To use a keyring component, begin with the instructions here. To use a keyring plugin instead, begin with Section 8.4.4.3, “Keyring Plugin Installation”. If you ...
https://dev.mysql.com/doc/refman/8.4/en/myisampack.html
When the table is used later, the server reads into memory the information needed to decompress columns. This results in much better performance when accessing individual rows, because you only have to uncompress exactly one row. MySQL uses mmap() ...
https://dev.mysql.com/doc/refman/8.4/en/optimizer-hints.html
One means of control over optimizer strategies is to set the optimizer_switch system variable (see Section 10.9.2, “Switchable Optimizations”). Changes to this variable affect execution of all subsequent queries; to affect one query differently ...
https://dev.mysql.com/doc/refman/8.4/en/performance-schema-error-log-table.html
Of the logs the MySQL server maintains, one is the error log to which it writes diagnostic messages (see Section 7.4.2, “The Error Log”). Typically, the server writes diagnostics to a file on the server host or to a system log service.
Displaying 161 to 170 of 441 total results