Search Results
                    
                    
            https://dev.mysql.com/doc/internals/en/myisammrg-directory.html
                                As with other table handlers, you'll find that the *.c files in the myissammrg directory have counterparts in the myisam directory. In fact, this general description of a myisammrg program is almost always true: The myisammrg function checks an ...
                                            
                https://dev.mysql.com/doc/internals/en/optimizer-index-merge-join-type.html
                                When doing Index Merge, MySQL retrieves rows for each of the keyscans and then runs them through a duplicate elimination procedure. for query: SELECT * FROM t WHERE (goodkey1=c1 OR goodkey1=c2) AND badkey=c3 scan on badkey will be chosen even if ...
                                            A Quick Guide to Using the MySQL SLES Repository :: A Quick Guide to Using the MySQL SLES Repository
                https://dev.mysql.com/doc/mysql-sles-repo-quick-guide/en/index.html
                                MySQL Server Initialization (for MySQL 8.0 and later): When the server is started for the first time, the server is initialized, and the following happens (if the data directory of the server is empty when the initialization process begins): The SSL ... Abstract This is a quick guide for using the MySQL SLES repository to install and upgrade MySQL on SUSE Linux Enterprise Server ...
                                            
                https://dev.mysql.com/doc/mysql-monitor/8.0/en/memory-usage-advisors-ref.html
                                Default frequency 00:05:00 Default auto-close enabled no Key Buffer Size May Not Be Optimal For Key Cache The key cache hit ratio represents the proportion of keys that are being read from the key cache in memory instead of from disk. It is true ...
                                            
                https://dev.mysql.com/doc/refman/8.4/en/group-replication-secure-socket-layer-support-ssl.html
                                The server SSL options that are applied to Group Replication's group communication connections are as follows: Table 20.2 SSL Options Server Configuration Description ssl_key The path name of the SSL private key file in PEM format. ssl_cert The path ... Secure sockets can be used for group communication connections between members of a ...
                                            
                https://dev.mysql.com/doc/refman/8.4/en/keyring-component-plugin-comparison.html
                                 The MySQL Keyring originally implemented keystore capabilities using server plugins, but began transitioning to use the component infrastructure. This section briefly compares keyring components and plugins to provide an overview of their ...
                                            
                https://dev.mysql.com/doc/refman/8.4/en/keyring-encrypted-file-component.html
                                 Note component_keyring_encrypted_file is an extension included in MySQL Enterprise Edition, a commercial product. The component_keyring_encrypted_file keyring component stores keyring data in an encrypted, password-protected file local to the ...If ...
                                            
                https://dev.mysql.com/doc/refman/8.4/en/keyring-file-component.html
                                 The component_keyring_file keyring component stores keyring data in a file local to the server host. Warning For encryption key management, the component_keyring_file and component_keyring_encrypted_file components are not intended as a regulatory ...If the global configuration file indicates use of a local configuration file, the component attempts to read its local configuration file from the data ...
                                            
                https://dev.mysql.com/doc/refman/8.4/en/memory-storage-engine.html
                                MEMORY tables can have up to 64 indexes per table, 16 columns per index and a maximum key length of 3072 bytes. If a MEMORY table hash index has a high degree of key duplication (many index entries containing the same value), updates to the table ...
                                            
                https://dev.mysql.com/doc/refman/8.4/en/mysql-cluster-backup-using-management-client.html
                                If used, the backup_id must follow immediately after the START BACKUP keywords, before any other options are used. This function has the form shown here: key = KDF(random_salt, password) The key so generated is then used to encrypt the backup data ... Before starting a backup, make sure that the cluster is properly configured for performing ...