Search



Search Results
Displaying 2151 to 2160 of 5414 total results
https://dev.mysql.com/doc/heatwave-aws/en/heatwave-aws-iam-policy.html
Identity and Access Management 1.5 Identity and Access Management MySQL HeatWave on AWS integrates with Oracle Cloud Infrastructure (OCI) for identity and access management. MySQL HeatWave on AWS uses predefined OCI Identity and Access Management ...An Administrator in your organization is responsible for adding users to the appropriate ...
https://dev.mysql.com/doc/connector-j/en/connector-j-testing.html
To run the tests, in addition to fulfilling the requirements described in Section 4.3, “Installing from Source”, you must also set the following properties in the build.properties file or through the Ant -D options: com.mysql.cj.testsuite.jvm: ... The Connector/J source code repository or packages that are shipped with source code include an extensive test suite, containing test cases that can be executed ...
https://dev.mysql.com/doc/refman/8.4/en/ansi-diff-foreign-keys.html
MySQL checks foreign key constraints immediately; the check is not deferred to transaction commit. MySQL essentially implements the semantics defined by MATCH SIMPLE, which permits a foreign key to be all or partially NULL. You should expect support ...For example, if you define a RESTRICT type constraint, and there is a child row with several parent rows, InnoDB does not permit the deletion of any of the parent ...
https://dev.mysql.com/doc/refman/8.4/en/connecting-using-dns-srv.html
MySQL supports the use of DNS SRV records for connecting to servers. A client that receives a DNS SRV lookup result attempts to connect to the MySQL server on each of the listed hosts in order of preference, based on the priority and weighting ...
https://dev.mysql.com/doc/refman/8.4/en/encrypted-connections.html
TLS is sometimes referred to as SSL (Secure Sockets Layer) but MySQL does not actually use the SSL protocol for encrypted connections because its encryption is weak (see Section 8.3.2, “Encrypted Connection TLS Protocols and Ciphers”). By ...
https://dev.mysql.com/doc/refman/8.4/en/hash-joins.html
A hash join is used even if any pair of joined tables does not have at least one equi-join condition, as shown here: mysql> EXPLAIN FORMAT=TREE -> SELECT * FROM t1 -> JOIN t2 ON (t1.c1 = t2.c1) -> JOIN t3 ON (t2.c1 < t3.c1)\G ...It is possible to ...
https://dev.mysql.com/doc/refman/8.4/en/multifactor-authentication.html
That is, MySQL account management supports accounts that use 2FA or 3FA, in addition to the existing 1FA support. When a client attempts a connection to the MySQL server using a single-factor account, the server invokes the authentication plugin ...
https://dev.mysql.com/doc/mysql-cluster-manager/8.4/en/mcm-list-packages.html
This can sometimes be empty when a package includes MySQL NDB Cluster installations that are in different locations on different hosts (see next example). The path to the MySQL NDB Cluster installation directory (base directory) on the indicated ...
https://dev.mysql.com/doc/mysql-ai/9.5/en/mys-ai-aml-model-handles.html
mysql> SET @variable = (SELECT model_handle FROM ML_SCHEMA_user1.MODEL_CATALOG ORDER BY build_timestamp DESC LIMIT 1); The following example sets the latest_model variable. mysql> SET @latest_model = (SELECT model_handle FROM ...In the following ...
https://dev.mysql.com/doc/mysql-monitor/8.0/en/performance-advisors-ref.html
However, prepared statements take time to prepare and consume memory in the MySQL server until they are closed. However, prepared statements take time to prepare and consume memory in the MySQL server until they are closed, so it is important to use ...Excessive Disk Temporary Table Usage Detected If the space required to build a temporary table exceeds either tmp_table_size or max_heap_table_size, MySQL creates a disk-based table in the server's tmpdir ...
Displaying 2151 to 2160 of 5414 total results