Search



Search Results
Displaying 311 to 320 of 1764 total results
https://dev.mysql.com/doc/relnotes/connector-j/en/news-9-1-0.html
Functionality Added or Changed Bugs Fixed Functionality Added or Changed When connecting to a server using SSL, the truststore password is now made optional, with a null truststore password taken to mean that there is no need to check the ...
https://dev.mysql.com/doc/mysql-router/9.4/en/mysql-router-installation-linux.html
The procedure for installing on Linux depends on your Linux distribution. Uninstalling The procedure for uninstalling MySQL Router on Linux depends on the package you are using. There are binary distributions of MySQL Router available for several ...
https://dev.mysql.com/doc/mysql-shell/9.4/en/mysql-shell-connection-socket.html
Sessions that are still connected in this way can cause the server to hang during the shutdown procedure. If this does happen, exit MySQL Shell and the server will continue with the shutdown procedure. On Unix, MySQL Shell connections default to ...
https://dev.mysql.com/doc/refman/8.4/en/create-table-generated-columns.html
Generated column definitions have this syntax: col_name data_type [GENERATED ALWAYS] AS (expr) [VIRTUAL | STORED] [NOT NULL | NULL] [UNIQUE [KEY]] [[PRIMARY] KEY] [COMMENT 'string'] AS (expr) indicates that the column is generated and defines the ...
https://dev.mysql.com/doc/refman/8.4/en/encryption-functions.html
To avoid exposing these, applications can use stored procedures to encrypt and decrypt values on the server side. If you want to store these results, use a column with a VARBINARY or BLOB binary string data type. If an application stores values from ...This avoids potential problems with trailing space removal or character set conversion that would change data values, such as may occur if you use a nonbinary string data type (CHAR, VARCHAR, ...
https://dev.mysql.com/doc/refman/8.4/en/replication-options-binary-log.html
For details of how stored programs (stored procedures and functions, triggers, and events) are handled when each binary logging format is set, see Section 27.7, “Stored Program Binary Logging”. Where possible, rows stored in the binary log are ... Startup Options Used with Binary Logging System Variables Used with Binary Logging You can use the mysqld options and system variables that are described in this section to affect the operation of the binary log as well as to control which statements are written to the binary ...
https://dev.mysql.com/doc/refman/8.4/en/function-resolution.html
MySQL supports built-in (native) functions, loadable functions, and stored functions. However, for these nonaffected function names, interpretation may vary in expression context: func_name () is interpreted as a built-in function if there is one ...This section describes how the server recognizes whether the name of a built-in function is used as a function call or as an identifier, and how the server determines which function to use in cases when functions of different types exist with a given ...
https://dev.mysql.com/doc/refman/8.4/en/replication-options-replica.html
It does not apply to stored procedures and functions, or events. It does not affect statements that apply only to other database objects, such as stored routines. To filter statements operating on stored routines, use one or more of the ... This ...
https://dev.mysql.com/doc/refman/8.4/en/pam-pluggable-authentication.html
The password must be appropriate for the password store used by the PAM service. Examples: For traditional Unix passwords, the service looks up passwords stored in the /etc/shadow file. For LDAP, the service looks up passwords stored in an LDAP ...
https://dev.mysql.com/doc/mysql-enterprise-backup/8.4/en/glossary.html
These techniques have different characteristics in terms of size and representation of the backup data, and speed (especially speed of the restore operation). backup directory The directory under which the backup data and metadata are stored, ...
Displaying 311 to 320 of 1764 total results