Search Results
https://dev.mysql.com/doc/refman/8.4/en/replication-binlog-encryption-key-rotation.html
When binary log encryption is enabled, you can rotate the binary log master key at any time while the server is running by issuing ALTER INSTANCE ROTATE BINLOG MASTER KEY. You can rotate the binary log master key on a regular basis to comply with ...
https://dev.mysql.com/doc/mysql-em-plugin/en/myoem-config-metric-binarylogs-category.html
Lists the Binary Logs configuration metrics and provides a brief description of each. Table 7.2 Binary Logs Configuration Metrics NameDescriptionBinlog Cache Size The size of the cache to hold changes to the binary log during a transaction. A ...
https://dev.mysql.com/doc/refman/8.4/en/stored-programs-logging.html
The binary log contains information about SQL statements that modify database contents. This information is stored in the form of “events” that describe the modifications. (Binary log events differ from scheduled event stored objects.) The ...
https://dev.mysql.com/doc/refman/8.4/en/replication-binlog-encryption.html
MySQL binary log files and relay log files can be encrypted, helping to protect these files and the potentially sensitive data contained in them from being misused by outside attackers, and also from unauthorized viewing by users of the operating ...
https://dev.mysql.com/doc/refman/8.4/en/point-in-time-recovery-binlog.html
This section explains the general idea of using the binary log to perform a point-in-time-recovery. The next section, Section 9.5.2, “Point-in-Time Recovery Using Event Positions”, explains the operation in details with an example. Note Many of ...
https://dev.mysql.com/doc/refman/8.4/en/mysqlbinlog-backup.html
By default, mysqlbinlog reads binary log files and displays their contents in text format. This enables you to examine events within the files more easily and to re-execute them (for example, by using the output as input to mysql). mysqlbinlog can ...
https://dev.mysql.com/doc/refman/8.4/en/replication-binlog-encryption-encryption-keys.html
The binary log encryption keys used to encrypt the file passwords for the log files are 256-bit keys that are generated specifically for each MySQL server instance using MySQL Server's keyring service (see Section 8.4.4, “The MySQL Keyring”).
https://dev.mysql.com/doc/refman/8.4/en/replication-howto-masterstatus.html
To configure the replica to start the replication process at the correct point, you need to note the source's current coordinates within its binary log. Warning This procedure uses FLUSH TABLES WITH READ LOCK, which blocks COMMIT operations for ...
https://dev.mysql.com/doc/refman/8.4/en/binlog-replication-configuration-overview.html
This section describes replication between MySQL servers based on the binary log file position method, where the MySQL instance operating as the source (where the database changes take place) writes updates and changes as “events” to the binary ...
https://dev.mysql.com/doc/mysql-shell/9.4/en/mysql-shell-utilities-dump-binlogs.html
This utility dumps binary logs generated since a specific point in time to the given local or remote directory. The starting point can be automatically determined from a previous dump, either by reusing the same output directory or by using the ...