Search Results
                    
                    
            https://dev.mysql.com/doc/refman/8.4/en/security-guidelines.html
                                A passphrase containing multiple words is easy to create, remember, and reproduce, and is much more secure than a typical user-selected password consisting of a single modified word or a predictable sequence of characters. MySQL uses security based ... Anyone using MySQL on a computer connected to the Internet should read this section to avoid the most common security ...
                                            
                https://dev.mysql.com/doc/refman/8.4/en/x-plugin-encrypted-connections.html
                                Encryption per connection is optional, but a specific user can be required to use encryption for X Protocol and MySQL Protocol connections by including an appropriate REQUIRE clause in the CREATE USER statement that creates the user. Alternatively, ... This section explains how to configure X Plugin to use encrypted ...
                                            
                https://dev.mysql.com/doc/mysql-enterprise-backup/8.4/en/meb-scheduled-backups.html
                                Outputs from the stderr and stdout streams are redirected to /dev/null/, so they will not invoke other actions on the part of the Cron server (for example, email notifications to the user).  Maintaining a regular backup schedule is an important ...
                                            
                https://dev.mysql.com/doc/mysql-router/9.4/en/mysql-router-installation-docker.html
                                Important You need to either run docker commands with sudo, or create a docker user group, and then add to it any users who want to run docker commands. Other platforms are not supported, and users using these MySQL Docker images on them are doing ... The Docker deployment framework supports easy installation and configuration of MySQL ...
                                            
                https://dev.mysql.com/doc/mysql-ai/9.5/en/mys-ai-aml-prereqs.html
                                The model catalog schema created by the ML_TRAIN procedure incorporates the user name in the schema name (for example, ML_SCHEMA_joesmith), and a period is not a permitted schema name character. MySQL User Names To use AutoML, ensure that the MySQL ... Before You Begin Model and Table Sizes The table used to train a model cannot exceed 10 GB, 100 million rows, or 1017 ...
                                            
                https://dev.mysql.com/doc/connectors/en/connector-odbc-examples-tools-with-crystalreports.html
                                For example, to create a simple crosstab report within Crystal Reports XI, follow these steps: Create a DSN using the Data Sources (ODBC) tool. You can either specify a complete database, including user name and password, or you can build a basic ...
                                            
                https://dev.mysql.com/doc/connector-odbc/en/connector-odbc-examples-tools-with-crystalreports.html
                                For example, to create a simple crosstab report within Crystal Reports XI, follow these steps: Create a DSN using the Data Sources (ODBC) tool. You can either specify a complete database, including user name and password, or you can build a basic ...
                                            
                https://dev.mysql.com/doc/refman/8.4/en/mysql-cluster-limitations-transactions.html
                                When a user-created NDB table is accessed using a unique index, the hidden index table is first read to find the primary key that is then used to read the user-created table. When a row referenced by a unique index in the user-created NDB table is ...Because the MySQL server creates a shadowing ordered index for every unique index created in NDB, this lets the ordered index be read instead, and avoids unique index access ...
                                            
                https://dev.mysql.com/doc/mysql-cluster-manager/8.4/en/mcm-using-import-cluster-procedure.html
                                Create a MySQL user named mcmd on each SQL node, and grant root privileges to the user. Create and configure “target” cluster under MySQL Cluster Manager control Install MySQL Cluster Manager and start mcmd on all hosts with the same system user ...Create and configure in MySQL Cluster Manager a “target” cluster whose configuration matches that of the “wild” ...
                                            
                https://dev.mysql.com/doc/refman/8.4/en/general-thread-states.html
                                After create This occurs when the thread creates a table (including internal temporary tables), at the end of the function that creates the table. This state is used even if the table could not be created due to some error. This state occurs after ... The following list describes thread State values that are associated with general query processing and not more specialized activities such as ...