Search Results
https://dev.mysql.com/doc/refman/8.4/en/replication-encrypted-connections.html
(ssl_capath is similar but specifies the path name of a directory of CA certificate files.) ssl_cert: The path name of the server public key certificate file. To use an encrypted connection for the transfer of the binary log required during ...
https://dev.mysql.com/doc/refman/8.4/en/replication-options-replica.html
IDEMPOTENT mode causes suppression of duplicate-key and no-key-found errors; STRICT means no such suppression takes place. For storage engines other than NDB, IDEMPOTENT mode should be used only when you are absolutely sure that duplicate-key errors ... This section explains the server options and system variables that apply to replica servers and contains the following: Startup Options for Replica Servers System Variables Used on Replica Servers Specify the options either on the command line or in an option ...
https://dev.mysql.com/doc/refman/8.4/en/show-create-table.html
row *************************** Table: t Create Table: CREATE TABLE `t` ( `id` int NOT NULL AUTO_INCREMENT, `s` char(60) DEFAULT NULL, PRIMARY KEY (`id`) ) ENGINE=InnoDB DEFAULT CHARSET=utf8mb4 COLLATE=utf8mb4_0900_ai_ci SHOW CREATE TABLE displays ... SHOW CREATE TABLE tbl_name Shows the CREATE TABLE statement that creates the named ...
https://dev.mysql.com/doc/c-api/8.4/en/c-api-encrypted-connections.html
MYSQL_OPT_SSL_CERT: The path name of the client public key certificate file. Instead, use mysql_options() to specify specify certificate and key files, encryption ciphers, and so forth. Enforcing an Encrypted Connection mysql_options() options for ... This section describes how C applications use the C API capabilities for encrypted ...
https://dev.mysql.com/doc/mysql-router/9.4/en/mysql-router-configuration-file-syntax.html
For example: [section name] option = value option = value option = value [section name:optional section key] option = value option = value option = value A configuration file section header starts with an opening bracket ([) and ends with a closing ... The configuration file format resembles the traditional INI file format with sections and options, but with a few additional ...
https://dev.mysql.com/doc/mysql-ai/9.5/en/mys-ai-genai-byo-embedding-tables.html
GenAI lets you use tables containing your own vector embedding to run retrieval-augmented generation (RAG) with vector search. The ML_RAG and ML_RAG_TABLE routines let you specify the table column names to use as filters for finding relevant tables ...
https://dev.mysql.com/doc/connectors/en/connector-cpp-authentication.html
To ensure correct account mapping, the client-side Oracle Cloud Infrastructure configuration must contain a fingerprint of the API key to use for authentication (fingerprint entry) and the location of a PEM file with the private part of the API key ...LDAP authentication requires use of a server from a MySQL Enterprise Edition ...
https://dev.mysql.com/doc/internals/en/com-change-user.html
COM_CHANGE_USER changes the user of the current connection and reset the connection state. and others It is followed by the same states as the initial handshake.
https://dev.mysql.com/doc/ndbapi/en/mccj-clusterj-annotation-partitionkey.html
Annotation on a class or member to define the partition key. If annotating a class or interface, either a single column or multiple columns can be specified. If annotating a member, neither column nor columns should be specified.
https://dev.mysql.com/doc/ndbapi/en/ndb-examples-basic-delete.html
This example shows deleting a row from a table already created and populated previously (see Section 2.5.1.2, “NDB API Basic Insertion Example”). It performs the deletion using a single NdbOperation within a transaction, and handles errors ...