Search



Search Results
Displaying 861 to 870 of 1481 total results
https://dev.mysql.com/doc/internals/en/myisammrg-directory.html
As with other table handlers, you'll find that the *.c files in the myissammrg directory have counterparts in the myisam directory. In fact, this general description of a myisammrg program is almost always true: The myisammrg function checks an ...
https://dev.mysql.com/doc/internals/en/optimizer-index-merge-join-type.html
When doing Index Merge, MySQL retrieves rows for each of the keyscans and then runs them through a duplicate elimination procedure. for query: SELECT * FROM t WHERE (goodkey1=c1 OR goodkey1=c2) AND badkey=c3 scan on badkey will be chosen even if ...
https://dev.mysql.com/doc/mysql-sles-repo-quick-guide/en/index.html
MySQL Server Initialization (for MySQL 8.0 and later): When the server is started for the first time, the server is initialized, and the following happens (if the data directory of the server is empty when the initialization process begins): The SSL ... Abstract This is a quick guide for using the MySQL SLES repository to install and upgrade MySQL on SUSE Linux Enterprise Server ...
https://dev.mysql.com/doc/mysql-monitor/8.0/en/memory-usage-advisors-ref.html
Default frequency 00:05:00 Default auto-close enabled no Key Buffer Size May Not Be Optimal For Key Cache The key cache hit ratio represents the proportion of keys that are being read from the key cache in memory instead of from disk. It is true ...
https://dev.mysql.com/doc/refman/8.4/en/group-replication-secure-socket-layer-support-ssl.html
The server SSL options that are applied to Group Replication's group communication connections are as follows: Table 20.2 SSL Options Server Configuration Description ssl_key The path name of the SSL private key file in PEM format. ssl_cert The path ... Secure sockets can be used for group communication connections between members of a ...
https://dev.mysql.com/doc/refman/8.4/en/keyring-component-plugin-comparison.html
The MySQL Keyring originally implemented keystore capabilities using server plugins, but began transitioning to use the component infrastructure. This section briefly compares keyring components and plugins to provide an overview of their ...
https://dev.mysql.com/doc/refman/8.4/en/keyring-encrypted-file-component.html
Note component_keyring_encrypted_file is an extension included in MySQL Enterprise Edition, a commercial product. The component_keyring_encrypted_file keyring component stores keyring data in an encrypted, password-protected file local to the ...If ...
https://dev.mysql.com/doc/refman/8.4/en/keyring-file-component.html
The component_keyring_file keyring component stores keyring data in a file local to the server host. Warning For encryption key management, the component_keyring_file and component_keyring_encrypted_file components are not intended as a regulatory ...If the global configuration file indicates use of a local configuration file, the component attempts to read its local configuration file from the data ...
https://dev.mysql.com/doc/refman/8.4/en/memory-storage-engine.html
MEMORY tables can have up to 64 indexes per table, 16 columns per index and a maximum key length of 3072 bytes. If a MEMORY table hash index has a high degree of key duplication (many index entries containing the same value), updates to the table ...
https://dev.mysql.com/doc/refman/8.4/en/mysql-cluster-backup-using-management-client.html
If used, the backup_id must follow immediately after the START BACKUP keywords, before any other options are used. This function has the form shown here: key = KDF(random_salt, password) The key so generated is then used to encrypt the backup data ... Before starting a backup, make sure that the cluster is properly configured for performing ...
Displaying 861 to 870 of 1481 total results