Search



Search Results
Displaying 21 to 30 of 1337 total results
https://dev.mysql.com/doc/refman/8.4/en/connecting-using-uri-or-key-value-pairs.html
This section describes use of URI-like connection strings or key-value pairs to specify how to establish connections to the MySQL server, for clients such as MySQL Shell. Parameters specified with key-value pairs use a syntax such as ...For ...
https://dev.mysql.com/doc/refman/8.4/en/replication-binlog-encryption-key-rotation.html
When binary log encryption is enabled, you can rotate the binary log master key at any time while the server is running by issuing ALTER INSTANCE ROTATE BINLOG MASTER KEY. You can rotate the binary log master key on a regular basis to comply with ...The binary log and relay log files are rotated on all ...
https://dev.mysql.com/doc/refman/8.4/en/partitioning-key.html
Partitioning by key is similar to partitioning by hash, except that where hash partitioning employs a user-defined expression, the hashing function for key partitioning is supplied by the MySQL server. PARTITION BY KEY are similar to those for ...
https://dev.mysql.com/doc/refman/8.4/en/multiple-key-caches.html
Note As of MySQL 8.4, the compound-part structured-variable syntax discussed here for referring to multiple MyISAM key caches is deprecated. Shared access to the key cache improves performance but does not eliminate contention among sessions ...Use ...
https://dev.mysql.com/doc/refman/8.4/en/mysql-cluster-programs-ndb-sign-keys.html
Management of TLS keys and certificates in implemented in NDB Cluster as the executable utility program ndb_sign_keys, which can normally be found in the MySQL bin directory. The program performs such functions as creating, signing, and retiring ...
https://dev.mysql.com/doc/refman/8.4/en/keyring-key-types.html
MySQL Keyring supports keys of different types (encryption algorithms) and lengths: The available key types depend on which keyring plugin is installed. The permitted key lengths are subject to multiple factors: General keyring loadable-function ...
https://dev.mysql.com/doc/refman/8.4/en/replication-binlog-encryption-encryption-keys.html
The binary log encryption keys used to encrypt the file passwords for the log files are 256-bit keys that are generated specifically for each MySQL server instance using MySQL Server's keyring service (see Section 8.4.4, “The MySQL Keyring”).
https://dev.mysql.com/doc/mysql-monitor/8.0/en/mem-deployment-change-ssh-host-key.html
The SSH Host key is used to distinguish monitored hosts, there should not be duplicate SSH keys. This section describes how to change the SSH host key for a particular host, eliminating the events and alarms generated when duplicate hosts are ...On ...
https://dev.mysql.com/doc/refman/8.4/en/myisam-key-cache.html
It employs a cache mechanism to keep the most frequently accessed table blocks in memory: For index blocks, a special structure called the key cache (or key buffer) is maintained. This section first describes the basic operation of the MyISAM key ...
https://dev.mysql.com/doc/internals/en/parsing-key-information.html
Many of the index methods pass a byte array named *key that identifies the index entry to be read in a standard format. Your storage engine will need to extract the information stored in the key and translate it into its internal index format to ...
Displaying 21 to 30 of 1337 total results