Search Results
https://dev.mysql.com/doc/mysql-secure-deployment-guide/8.0/en/secure-deployment-data-masking.html
As of MySQL 8.0.13, MySQL Enterprise Edition provides data masking and de-identification capabilities, which permit: Transforming existing data to mask it and remove identifying characteristics, such as changing all digits of a credit card number ...
https://dev.mysql.com/doc/heatwave-aws/en/ha-limitations.html
To reduce Query PrivateLink endpoint downtime on failovers or switchovers, configure your application by setting the value of the connect_timeout parameter to a small value (for example, 5 seconds) and by making it retry always upon connection ...
https://dev.mysql.com/doc/connector-j/en/connector-j-support-bug-report.html
Sometimes the error is platform-dependent; in such cases, it is next to impossible for us to fix anything without knowing the operating system and the version number of the platform. Writing a good bug report takes patience, but doing it right the ... The normal place to report bugs is http://bugs.mysql.com/, which is the address for our bugs ...
https://dev.mysql.com/doc/refman/8.4/en/clone-plugin-replication.html
During the cloning operation, both the binary log position (filename, offset) and the gtid_executed GTID set are extracted and transferred from the donor MySQL server instance to the recipient. To initiate replication, the binary logs required for ...In addition to cloning data, a cloning operation extracts replication coordinates from the donor and transfers them to the recipient, which enables using the clone plugin for provisioning Group Replication members and ...
https://dev.mysql.com/doc/refman/8.4/en/innodb-deadlocks-handling.html
It explains how to organize database operations to minimize deadlocks and the subsequent error handling required in applications. You can cope with deadlocks and reduce the likelihood of their occurrence with the following techniques: At any time, ... This section builds on the conceptual information about deadlocks in Section 17.7.5.2, “Deadlock ...
https://dev.mysql.com/doc/refman/8.4/en/pam-pluggable-authentication.html
With this plugin-loading method, the option must be given each time the server starts. For example: mysql> SELECT PLUGIN_NAME, PLUGIN_STATUS FROM INFORMATION_SCHEMA.PLUGINS WHERE PLUGIN_NAME LIKE '%pam%'; +--------------------+---------------+ | ...
https://dev.mysql.com/doc/mysql-enterprise-backup/8.4/en/bugs.backup.html
Hot backups for large databases with heavy writing workloads (say, in the order of gigabytes per minute) can take a very long time to complete due to the huge redo log files that are generated on the server while the backup is running. However, when ... Please refer to the MySQL Enterprise Backup 8.4 Release Notes for a list of fixed bugs for ...
https://dev.mysql.com/doc/mysql-router/9.4/en/router-set-trace.html
end_time: Date and time string denoting the end of the span. session_not_sharable_on_error: Statements such as SET known_variable = 1, unknown_variable = 2 can cause a session state change, although the statement failed. The server responds with an ... MySQL Router supports tracing of statements as they are processed by MySQL Router from client to server and the response to the ...
https://dev.mysql.com/doc/refman/8.4/en/clone-plugin-remote.html
An error is returned if the explicit specification cannot be satisfied. An error is reported if a table or tablespace already exists. A MySQL user on the donor and recipient is required for executing the cloning operation (the “clone user”). The ... The clone plugin supports the following syntax for cloning remote data; that is, cloning data from a remote MySQL server instance (the donor) and transferring it to the MySQL instance where the cloning operation was initiated (the ...
https://dev.mysql.com/doc/internals/en/logging-transactions-preliminary-rules.html
(PR-causality) If statement A is executed before statement B, and B is logged in statement format, and B reads tables that A may modifies, then B shall be logged after A. In particular, changes to N-tables shall be written to the binary log when ...