Search



Search Results
Displaying 261 to 270 of 1337 total results
https://dev.mysql.com/doc/refman/8.4/en/converting-tables-to-innodb.html
These keywords are important to allow multiple sessions to read and write InnoDB tables concurrently, providing substantial scalability benefits in write-heavy workloads. When you convert MyISAM tables that are large, frequently accessed, and hold ... If you have MyISAM tables that you want to convert to InnoDB for better reliability and scalability, review the following guidelines and tips before ...
https://dev.mysql.com/doc/refman/8.4/en/keyring-aws-plugin.html
Note The keyring_aws plugin is an extension included in MySQL Enterprise Edition, a commercial product. The keyring_aws keyring plugin communicates with the Amazon Web Services Key Management Service (AWS KMS) as a back end for key generation and ...(Its value can be changed at runtime if desired using SET GLOBAL.) If necessary, create the directory in which the configuration file should be ...
https://dev.mysql.com/doc/refman/8.4/en/myisamchk-table-info.html
Possible values are crashed, open, changed, analyzed, optimized keys, and sorted index pages. Auto increment key, Last value The key number associated the table's AUTO_INCREMENT column, and the most recently generated value for this column. Keyfile ... To obtain a description of a MyISAM table or statistics about it, use the commands shown ...
https://dev.mysql.com/doc/refman/8.4/en/mysqlslap.html
--auto-generate-sql-guid-primary Command-Line Format --auto-generate-sql-guid-primary Type Boolean Default Value FALSE Add a GUID-based primary key to automatically generated tables. --auto-generate-sql-load-type=type Command-Line Format ...
https://dev.mysql.com/doc/refman/8.4/en/range-optimization.html
Additionally, for BTREE indexes, comparison of a key part with a constant value is a range condition when using the >, <, >=, <=, BETWEEN, !=, or <> operators, or LIKE comparisons if the argument to LIKE is a constant string that does not start with ... The range access method uses a single index to retrieve a subset of table rows that are contained within one or several index value ...
https://dev.mysql.com/doc/refman/8.4/en/replication-options-binary-log.html
To use encryption, a keyring plugin must be installed and configured to supply MySQL Server's keyring service. For instructions to do this, see Section 8.4.4, “The MySQL Keyring”. Any supported keyring plugin can be used to store binary log ...
https://dev.mysql.com/doc/ndbapi/en/ndb-ndb.html
(See Section 2.3.25, “The NdbTransaction Class”.) Types The Ndb class does not define any public typesbut does define three data structures, which are listed here: EventBuffermemoryUsage Key_part_ptr PartitionSpec. Ndb::computeHash() Description ... This section provides information about the Ndb class, which models the NDB kernel; it is the primary class of the NDB ...
https://dev.mysql.com/doc/refman/8.4/en/mysqlimport.html
--get-server-public-key Command-Line Format --get-server-public-key Type Boolean Request from the server the public key required for RSA key pair-based password exchange. For that plugin, the server does not send the public key unless requested. If ... The mysqlimport client provides a command-line interface to the LOAD DATA SQL ...
https://dev.mysql.com/doc/mysql-router/9.4/en/mysql-router-conf-options.html
Default value: /run/mysqlrouter master-key-writer Command-Line Format --master-key-writer file_path Type String Script that reads the master key from STDIN. master-key-reader Command-Line Format --master-key-reader file_path Type String Script that ... When started, MySQL Router reads a list of configuration files that together make up the configuration of the ...
https://dev.mysql.com/doc/refman/8.4/en/enterprise-encryption-usage.html
The following general considerations apply when choosing key lengths and encryption algorithms: The strength of encryption for private and public keys increases with the key size, but the time for key generation increases as well. Use the public key ... To use MySQL Enterprise Encryption in applications, invoke the functions that are appropriate for the operations you wish to ...
Displaying 261 to 270 of 1337 total results