Search Results
https://dev.mysql.com/doc/refman/8.4/en/performance-schema-metadata-locks-table.html
When a pending lock request times out (ER_LOCK_WAIT_TIMEOUT), its row status is updated from PENDING to TIMEOUT. The VICTIM, TIMEOUT, and KILLED status values are brief and signify that the lock row is about to be deleted. The value is one of ...
https://dev.mysql.com/doc/connectors/en/connector-j-config-failover.html
A failover happens when connection-related errors occur for an underlying, active connection. The connection errors are, by default, propagated to the client, which has to handle them by, for example, recreating the working objects (Statement, ...
https://dev.mysql.com/doc/connector-j/en/connector-j-config-failover.html
A failover happens when connection-related errors occur for an underlying, active connection. The connection errors are, by default, propagated to the client, which has to handle them by, for example, recreating the working objects (Statement, ...
https://dev.mysql.com/doc/connectors/en/connector-j-source-replica-replication-connection.html
This section describe a number of features of Connector/J's support for replication-aware deployments. Such Connection objects report they are read-only, and isSourceConnection() returns false for them. The Connection tests for available source ...
https://dev.mysql.com/doc/connector-j/en/connector-j-source-replica-replication-connection.html
This section describe a number of features of Connector/J's support for replication-aware deployments. Such Connection objects report they are read-only, and isSourceConnection() returns false for them. The Connection tests for available source ...
https://dev.mysql.com/doc/refman/8.4/en/transport-protocols.html
For programs that use the MySQL client library (for example, mysql and mysqldump), MySQL supports connections to the server based on several transport protocols: TCP/IP, Unix socket file, named pipe, and shared memory. Transport Protocol Selection ...This section describes how to select these protocols, and how they are similar and ...
https://dev.mysql.com/doc/connectors/en/connector-j-reference-using-ssl.html
Connector/J can encrypt all data communicated between the JDBC driver and the server (except for the initial handshake) using SSL. There is a performance penalty for enabling connection encryption, the severity of which depends on multiple factors ...The system works through two Java keystore files: one file contains the certificate information for the server (truststore in the examples below), and another contains the keys and certificate for the client (keystore in the examples ...
https://dev.mysql.com/doc/connector-j/en/connector-j-reference-using-ssl.html
Connector/J can encrypt all data communicated between the JDBC driver and the server (except for the initial handshake) using SSL. There is a performance penalty for enabling connection encryption, the severity of which depends on multiple factors ...The system works through two Java keystore files: one file contains the certificate information for the server (truststore in the examples below), and another contains the keys and certificate for the client (keystore in the examples ...
https://dev.mysql.com/doc/c-api/8.4/en/mysql-real-connect.html
CLIENT_INTERACTIVE: Permit interactive_timeout seconds of inactivity (rather than wait_timeout seconds) before closing the connection. CR_SERVER_LOST If connect_timeout > 0 and it took longer than connect_timeout seconds to connect to the server or ... MYSQL * mysql_real_connect(MYSQL *mysql, const char *host, const char *user, const char *passwd, const char *db, unsigned int port, const char *unix_socket, unsigned long client_flag) Description Note mysql_real_connect() is a synchronous ...
https://dev.mysql.com/doc/refman/8.4/en/group-replication-configuring-ssl-for-recovery.html
Important When using the MySQL communication stack (group_replication_communication_stack=MYSQL) AND secure connections between members (group_replication_ssl_mode is not set to DISABLED), the security settings discussed in this section are applied ...If a remote cloning operation is used as part of distributed recovery, Group Replication automatically configures the clone plugin's SSL options to match your settings for the distributed recovery SSL ...