Search



Search Results
Displaying 641 to 650 of 1104 total results
https://dev.mysql.com/doc/mysql-monitor/8.0/en/mem-users-created-first-login.html
Note The Monitor Agent communicates both with MySQL Enterprise Service Manager, and with the MySQL server it is monitoring. The Manager user: This user is the administrator of MySQL Enterprise Service Manager. The Agent user: MySQL Enterprise ...
https://dev.mysql.com/doc/mysql-monitor/8.0/en/performance-advisors-ref.html
InnoDB supports compressed tables (COMPRESSED row format) and more efficient BLOB handling (DYNAMIC row format), but both features require support for the latest file format (innodb_file_format=Barracuda). For optimal performance, transactions that ...
https://dev.mysql.com/doc/mysql-monitor/8.0/en/ui-security-advisor-ref.html
A MySQL account is identified by both a username and a host name, which are found in the User and Host columns of the mysql.user table. This section describes the following Security advisors: MySQL Enterprise Audit Plugin MySQL Enterprise Firewall ...
https://dev.mysql.com/doc/mysql-secure-deployment-guide/8.0/en/secure-deployment-audit.html
MySQL Enterprise Audit enables standard, policy-based monitoring and logging of connection and query activity, providing an auditing and compliance solution for applications that are governed by both internal and external regulatory guidelines.
https://dev.mysql.com/doc/mysql-secure-deployment-guide/8.0/en/secure-deployment-configure-authentication.html
If a user named valerie tries the same thing, the plugin finds that the user name and the MySQL user name are both valerie and permits the connection. When a client connects to the MySQL server, the server uses the user name provided by the client ...
https://dev.mysql.com/doc/mysql-secure-deployment-guide/8.0/en/secure-deployment-connect.html
The first method uses the TLS (Transport Layer Security) protocol to establish an encrypted connection. The second method uses RSA key pair-based password exchange over an unencrypted connection. The following procedures assume that mysql clients ...
https://dev.mysql.com/doc/mysql-secure-deployment-guide/8.0/en/secure-deployment-fips.html
MySQL 8.0 supports FIPS (Federal Information Processing Standards) mode, if compiled using OpenSSL, and a FIPS-enabled OpenSSL library and FIPS Object Module are available at runtime. FIPS mode imposes conditions on cryptographic operations such as ...
https://dev.mysql.com/doc/mysql-secure-deployment-guide/8.0/en/secure-deployment-roles-dynamic-privileges.html
This enables assignment of sets of privileges to accounts and provides a convenient alternative to granting individual privileges, both for conceptualizing desired privilege assignments and implementing them. Privilege management is an important ...
https://dev.mysql.com/doc/x-devapi-userguide-shell-js/en/collection-modify.html
The modify(SearchConditionStr) function is for modifying documents in a collection, similar to an UPDATE statement for an SQL database. It takes a search condition string (SearchConditionStr) as a parameter to specify the documents that are to be ...
https://dev.mysql.com/doc/x-devapi-userguide-shell-js/en/crud-operations-overview.html
The following table shows the available CRUD operations for both Collection and Table objects. CRUD operations are available as methods, which operate on Schema objects. The available Schema objects consist of Collection objects containing ...
Displaying 641 to 650 of 1104 total results