Search Results
https://dev.mysql.com/doc/refman/8.4/en/innodb-migration.html
Techniques for moving or copying InnoDB tables include: Importing Tables MySQL Enterprise Backup Copying Data Files (Cold Backup Method) Restoring from a Logical Backup Importing Tables A table that resides in a file-per-table tablespace can be ...
https://dev.mysql.com/doc/refman/8.4/en/mysql-cluster-install-windows-service.html
To install the management node as a service on Windows, invoke ndb_mgmd.exe from the command line on the machine hosting the management node, using the --install option, as shown here: C:\> C:\mysql\bin\ndb_mgmd.exe --install Installing service 'NDB ...C:\> NET STOP 'NDB Cluster Management Server' The NDB Cluster Management Server service is ... Once you are satisfied that NDB Cluster is running as desired, you can install the management nodes and data nodes as Windows services, so ...
https://dev.mysql.com/doc/connectors/en/connecting-using-kerberos.html
Kerberos is a ticket-based server-client mutual authentication protocol that is supported by the MySQL Server (commercial versions only) . The MySQL user name is then sent to the MySQL server for validation. One of three things may then happen: The ...Kerberos Authentication Workflow The main usage of Kerberos authentication in MySQL is to allow users to create connections without having to specify a user name and password in the connection ...Support for Kerberos is ...
https://dev.mysql.com/doc/connectors/en/connector-j-client-authentication.html
Some MySQL server builds are able to generate SSL keys and certificates for communication encryption, including a certificate and a private key (contained in the client-cert.pem and client-key.pem files), which can be used by any client. With the ...
https://dev.mysql.com/doc/connectors/en/connector-net-programming-authentication-user-plugin.html
/// </summary> /// <remarks>The default implementation does nothing.</remarks> protected virtual void AuthenticationSuccessful() /// <summary> /// This method provides a chance for the plugin to send more data when the server requests so during the ... Advanced users with special security requirements can create their own authentication plugins for MySQL Connector/NET ...
https://dev.mysql.com/doc/connector-net/en/connector-net-programming-authentication-user-plugin.html
/// </summary> /// <remarks>The default implementation does nothing.</remarks> protected virtual void AuthenticationSuccessful() /// <summary> /// This method provides a chance for the plugin to send more data when the server requests so during the ... Advanced users with special security requirements can create their own authentication plugins for MySQL Connector/NET ...
https://dev.mysql.com/doc/connector-j/en/connecting-using-kerberos.html
Kerberos is a ticket-based server-client mutual authentication protocol that is supported by the MySQL Server (commercial versions only) . The MySQL user name is then sent to the MySQL server for validation. One of three things may then happen: The ...Kerberos Authentication Workflow The main usage of Kerberos authentication in MySQL is to allow users to create connections without having to specify a user name and password in the connection ...Support for Kerberos is ...
https://dev.mysql.com/doc/connector-j/en/connector-j-client-authentication.html
Some MySQL server builds are able to generate SSL keys and certificates for communication encryption, including a certificate and a private key (contained in the client-cert.pem and client-key.pem files), which can be used by any client. With the ...
https://dev.mysql.com/doc/refman/8.4/en/group-replication-functions-for-member-actions.html
The functions can also be used on a server that is not part of a group, as long as the Group Replication plugin is installed. In that case, the member actions configuration is not propagated to any other servers. The ... The following functions can ...
https://dev.mysql.com/doc/refman/8.4/en/group-replication-responses-failure-exit.html
This exit action prevents both updates and stale reads (with the exception of reads by client users with the stated privileges), and enables proxy tools such as MySQL Router to recognize that the server is unavailable and redirect client connections. If ABORT_SERVER is the exit action, the instance shuts down ...In order of impact, the exit actions are as follows: If READ_ONLY is the exit action, the instance switches MySQL to super ... The ...