Search Results
https://dev.mysql.com/doc/refman/8.4/en/password-logging.html
If such statements are logged by the MySQL server as written, passwords in them become visible to anyone with access to the logs. In particular, INSERT or UPDATE statements for the mysql.user system table that refer to literal passwords are logged ... Passwords can be written as plain text in SQL statements such as CREATE USER, GRANT and SET ...
https://dev.mysql.com/doc/refman/8.4/en/install-component.html
[SET variable = expr [, variable = expr] ...] variable: { {GLOBAL | @@GLOBAL.} [component_prefix.]system_var_name | {PERSIST | @@PERSIST.} [component_prefix.]system_var_name } This statement installs one or more components, which become active ...A ...Component names do not include any platform-dependent file name suffix such as .so or ...
https://dev.mysql.com/doc/refman/8.4/en/error-log-priority-based-filtering.html
To affect how log_filter_internal permits or suppresses error, warning, and information events intended for the error log, set the log_error_verbosity and log_error_suppression_list system variables. The log_error_verbosity system variable controls ...log_error_verbosity Value Permitted Message Priorities 1 ERROR 2 ERROR, WARNING 3 ERROR, WARNING, INFORMATION If log_error_verbosity is 2 or greater, the server logs messages about statements that are unsafe for statement-based ...
https://dev.mysql.com/doc/connectors/en/connecting-using-kerberos.html
Client-side Kerberos configurations In order to operate properly with the Kerberos server, Connector/J requires either a system-wide Kerberos configuration, or these local system property settings for the JVM: -Djava.security.krb5.kdc=[the KDC host ... Kerberos is a ticket-based server-client mutual authentication protocol that is supported by the MySQL Server (commercial versions ...Support for Kerberos is implemented by Connector/J using the GSS-API, JAAS API, and JCA API; ...
https://dev.mysql.com/doc/connector-j/en/connecting-using-kerberos.html
Client-side Kerberos configurations In order to operate properly with the Kerberos server, Connector/J requires either a system-wide Kerberos configuration, or these local system property settings for the JVM: -Djava.security.krb5.kdc=[the KDC host ... Kerberos is a ticket-based server-client mutual authentication protocol that is supported by the MySQL Server (commercial versions ...Support for Kerberos is implemented by Connector/J using the GSS-API, JAAS API, and JCA API; ...
https://dev.mysql.com/doc/refman/8.4/en/component-loading.html
The SQL statements for component manipulation affect server operation and the mysql.component system table as follows: INSTALL COMPONENT loads components into the server. The optional SET clause permits setting component system-variable values when ... Components must be loaded into the server before they can be ...While a component is loaded, information about it is available ...
https://dev.mysql.com/doc/refman/8.4/en/packet-too-large.html
Both the client and the server have their own max_allowed_packet variable, so if you want to handle big packets, you must increase this variable both in the client and in the server. For example, to set the variable to 128MB, start the server like ... A communication packet is a single SQL statement sent to the MySQL server, a single row that is sent to the client, or a binary log event sent from a replication source server to a ...
https://dev.mysql.com/doc/refman/8.4/en/access-control.html
For example: SHOW GRANTS FOR 'joe'@'office.example.com'; SHOW GRANTS FOR 'joe'@'home.example.com'; Internally, the server stores privilege information in the grant tables of the mysql system database. MySQL enables the creation of accounts that ...
https://dev.mysql.com/doc/refman/8.4/en/innodb-auto-increment-handling.html
The auto-increment lock mode is configured at startup using the innodb_autoinc_lock_mode variable. innodb_autoinc_lock_mode = 0 (“traditional” lock mode) The traditional lock mode provides the same behavior that existed before the ... InnoDB ...
https://dev.mysql.com/doc/refman/8.4/en/alter-table.html
To force use of the COPY algorithm for an ALTER TABLE operation that would otherwise not use it, specify ALGORITHM=COPY or enable the old_alter_table system variable. For MyISAM tables, you can speed up index re-creation (the slowest part of the ...