Search Results
https://dev.mysql.com/doc/refman/8.4/en/keyring-component-plugin-comparison.html
The MySQL Keyring originally implemented keystore capabilities using server plugins, but began transitioning to use the component infrastructure. This section briefly compares keyring components and plugins to provide an overview of their ...
https://dev.mysql.com/doc/refman/8.4/en/keyring-encrypted-file-component.html
Note component_keyring_encrypted_file is an extension included in MySQL Enterprise Edition, a commercial product. The component_keyring_encrypted_file keyring component stores keyring data in an encrypted, password-protected file local to the ...If ...
https://dev.mysql.com/doc/refman/8.4/en/keyring-file-component.html
The component_keyring_file keyring component stores keyring data in a file local to the server host. Warning For encryption key management, the component_keyring_file and component_keyring_encrypted_file components are not intended as a regulatory ...If the global configuration file indicates use of a local configuration file, the component attempts to read its local configuration file from the data ...
https://dev.mysql.com/doc/refman/8.4/en/miscellaneous-functions.html
There are multiple ways to cause MySQL to accept the query: Alter the table to make name a primary key or a unique NOT NULL column. ON DUPLICATE KEY UPDATE statement, you can use the VALUES(col_name) function in the UPDATE clause to refer to column ...The function return value and type are the same as the return value and type of its argument, but the function result is not checked for the ONLY_FULL_GROUP_BY SQL ...
https://dev.mysql.com/doc/refman/8.4/en/mysql-cluster-backup-using-management-client.html
If used, the backup_id must follow immediately after the START BACKUP keywords, before any other options are used. This function has the form shown here: key = KDF(random_salt, password) The key so generated is then used to encrypt the backup data ... Before starting a backup, make sure that the cluster is properly configured for performing ...
https://dev.mysql.com/doc/refman/8.4/en/mysql-cluster-ndbinfo-tc-time-track-stats.html
Each TC instance tracks latencies for a set of activities it undertakes on behalf of API nodes or other data nodes; these activities include transactions, transaction errors, key reads, key writes, unique index operations, failed key operations of ... The tc_time_track_stats table provides time-tracking information obtained from the DBTC block (TC) instances in the data nodes, through API nodes access ...
https://dev.mysql.com/doc/refman/8.4/en/mysql-cluster-programs-ndb-print-backup-file.html
--backup-key, -K Command-Line Format --backup-key=key Specify the key needed to decrypt an encrypted backup. --backup-key-from-stdin Command-Line Format --backup-key-from-stdin Allow input of the decryption key from standard input, similar to ...
https://dev.mysql.com/doc/refman/8.4/en/mysql-cluster-programs-ndb-redo-log-reader.html
--file-key, -K Command-Line Format --file-key=key Supply file decryption key using stdin, tty, or a my.cnf file. Reads a redo log file, checking it for errors, printing its contents in a human-readable format, or both. ndb_redo_log_reader is ...
https://dev.mysql.com/doc/refman/8.4/en/mysql-cluster-replication-schema.html
ndb_apply_status Table ndb_binlog_index Table ndb_replication Table Replication in NDB Cluster makes use of a number of dedicated tables in the mysql database on each MySQL Server instance acting as an SQL node in both the cluster being replicated ...
https://dev.mysql.com/doc/refman/8.4/en/optimizer-hints.html
The parser recognizes optimizer hint comments after the initial keyword of SELECT, UPDATE, INSERT, REPLACE, and DELETE statements. Table-Level Optimizer Hints Table-level hints affect: Use of the Block Nested-Loop (BNL) and Batched Key Access (BKA) ... One means of control over optimizer strategies is to set the optimizer_switch system variable (see Section 10.9.2, “Switchable ...