Search Results
                    
                    
            https://dev.mysql.com/doc/mysql-monitor/8.0/en/mem-users-created-first-login.html
                                Note The Monitor Agent communicates both with MySQL Enterprise Service Manager, and with the MySQL server it is monitoring.  The Manager user: This user is the administrator of MySQL Enterprise Service Manager. The Agent user: MySQL Enterprise ...
                                            
                https://dev.mysql.com/doc/mysql-monitor/8.0/en/performance-advisors-ref.html
                                InnoDB supports compressed tables (COMPRESSED row format) and more efficient BLOB handling (DYNAMIC row format), but both features require support for the latest file format (innodb_file_format=Barracuda). For optimal performance, transactions that ...
                                            
                https://dev.mysql.com/doc/mysql-monitor/8.0/en/ui-security-advisor-ref.html
                                A MySQL account is identified by both a username and a host name, which are found in the User and Host columns of the mysql.user table.  This section describes the following Security advisors: MySQL Enterprise Audit Plugin MySQL Enterprise Firewall ...
                                            
                https://dev.mysql.com/doc/mysql-secure-deployment-guide/8.0/en/secure-deployment-audit.html
                                 MySQL Enterprise Audit enables standard, policy-based monitoring and logging of connection and query activity, providing an auditing and compliance solution for applications that are governed by both internal and external regulatory guidelines. 
                                            
                https://dev.mysql.com/doc/mysql-secure-deployment-guide/8.0/en/secure-deployment-configure-authentication.html
                                If a user named valerie tries the same thing, the plugin finds that the user name and the MySQL user name are both valerie and permits the connection.  When a client connects to the MySQL server, the server uses the user name provided by the client ...
                                            
                https://dev.mysql.com/doc/mysql-secure-deployment-guide/8.0/en/secure-deployment-connect.html
                                The first method uses the TLS (Transport Layer Security) protocol to establish an encrypted connection. The second method uses RSA key pair-based password exchange over an unencrypted connection. The following procedures assume that mysql clients ...
                                            
                https://dev.mysql.com/doc/mysql-secure-deployment-guide/8.0/en/secure-deployment-fips.html
                                 MySQL 8.0 supports FIPS (Federal Information Processing Standards) mode, if compiled using OpenSSL, and a FIPS-enabled OpenSSL library and FIPS Object Module are available at runtime. FIPS mode imposes conditions on cryptographic operations such as ...
                                            
                https://dev.mysql.com/doc/mysql-secure-deployment-guide/8.0/en/secure-deployment-roles-dynamic-privileges.html
                                This enables assignment of sets of privileges to accounts and provides a convenient alternative to granting individual privileges, both for conceptualizing desired privilege assignments and implementing them.  Privilege management is an important ...
                                            
                https://dev.mysql.com/doc/x-devapi-userguide-shell-js/en/collection-modify.html
                                 The modify(SearchConditionStr) function is for modifying documents in a collection, similar to an UPDATE statement for an SQL database. It takes a search condition string (SearchConditionStr) as a parameter to specify the documents that are to be ...
                                            
                https://dev.mysql.com/doc/x-devapi-userguide-shell-js/en/crud-operations-overview.html
                                The following table shows the available CRUD operations for both Collection and Table objects.  CRUD operations are available as methods, which operate on Schema objects. The available Schema objects consist of Collection objects containing ...