Search Results
https://dev.mysql.com/doc/refman/8.4/en/group-replication-online-upgrade-combining-versions.html
Group Replication is versioned according to the MySQL Server version that the Group Replication plugin was bundled with. For optimal compatibility and performance, all members of a group should run the same version of MySQL Server and therefore of ...For example, if a member is running MySQL 8.4.6 then that is the version of the Group Replication ...For example, if a feature has been deprecated between major versions, ...
https://dev.mysql.com/doc/refman/8.4/en/group-replication-summary.html
When a read/write transaction is ready to commit at the originating server, the server atomically broadcasts the write values (the rows that were changed) and the corresponding write set (the unique identifiers of the rows that were updated). Group ...The communication layer provides a set of guarantees such as atomic message and total order message ...
https://dev.mysql.com/doc/refman/8.4/en/nonpersistible-system-variables.html
For example, put these lines in your server my.cnf file: [mysqld] persist_only_admin_x509_subject="subject-value" The format of the Subject value is the same as used for CREATE USER ... You must perform this step directly on the MySQL server host ...
https://dev.mysql.com/doc/refman/8.4/en/replication-binlog-encryption-encryption-keys.html
The binary log encryption keys used to encrypt the file passwords for the log files are 256-bit keys that are generated specifically for each MySQL server instance using MySQL Server's keyring service (see Section 8.4.4, “The MySQL Keyring”). A ...The keyring service handles the creation, retrieval, and deletion of the binary log encryption ...
https://dev.mysql.com/doc/refman/8.4/en/replication-howto-masterbaseconfig.html
To configure a source to use binary log file position based replication, you must ensure that binary logging is enabled, and establish a unique server ID. Each server within a replication topology must be configured with a unique server ID, which ...This server ID is used to identify individual servers within the replication topology, and must be a positive integer between 1 and ...
https://dev.mysql.com/doc/refman/8.4/en/replication-mode-change-online-disable-gtids.html
This section describes how to disable GTID transactions on servers that are already online. This procedure does not require taking the server offline and is suited to use in production. However, if you have the possibility to take the servers ...
https://dev.mysql.com/doc/refman/8.4/en/socket-pluggable-authentication.html
Alternatively, to load the plugin at runtime, use this statement: INSTALL PLUGIN auth_socket SONAME 'auth_socket.so'; INSTALL PLUGIN loads the plugin immediately, and also registers it in the mysql.plugins system table to cause the server to load it ...To be usable by the server, the plugin library file must be located in the MySQL plugin directory (the directory named by the plugin_dir system ...
https://dev.mysql.com/doc/connectors/en/connector-j-usagenotes-tomcat.html
Next, configure the JNDI DataSource by adding a declaration resource to $CATALINA_HOME/conf/server.xml in the context that defines your web application: <Context ....> ... This sends a ping to the server which then returns a fake result set. The ...
https://dev.mysql.com/doc/connector-j/en/connector-j-usagenotes-tomcat.html
Next, configure the JNDI DataSource by adding a declaration resource to $CATALINA_HOME/conf/server.xml in the context that defines your web application: <Context ....> ... This sends a ping to the server which then returns a fake result set. The ...
https://dev.mysql.com/doc/refman/8.4/en/keyring-oci-component.html
It is possible to query MySQL server for the list of existing keys. No key information is permanently stored in MySQL server local storage. Note The Oracle Cloud Infrastructure Vault keyring component is included in MySQL Enterprise Edition, a ...