Search Results
https://dev.mysql.com/doc/refman/8.4/en/replication-howto-repuser.html
Important To connect to the source using a user account that authenticates with the caching_sha2_password plugin, you must either set up a secure connection as described in Section 19.3.1, “Setting Up Replication to Use Encrypted Connections”, ... Each replica connects to the source using a MySQL user name and password, so there must be a user account on the source that the replica can use to ...
https://dev.mysql.com/doc/refman/8.4/en/replication-options-source.html
This section describes the server options and system variables that you can use on replication source servers. You can specify the options either on the command line or in an option file. On the source and each replica, you must set the server_id ...
https://dev.mysql.com/doc/refman/8.4/en/select.html
For example: SELECT CONCAT(last_name,', ',first_name) AS full_name FROM mytable ORDER BY full_name; The AS keyword is optional when aliasing a select_expr with an identifier. You can use SET max_seeks_for_key=value as an alternative way to force ...
https://dev.mysql.com/doc/refman/8.4/en/semijoins-antijoins.html
Assuming that class_num is a primary key in the class table, duplicate suppression is possible by using SELECT DISTINCT, but it is inefficient to generate all matching rows first only to eliminate duplicates later. A semijoin is a preparation-time ...
https://dev.mysql.com/doc/refman/8.4/en/source-configuration-options.html
OFF WITH_NDB_TLS_SEARCH_PATH Default path used by NDB programs to search for TLS certificate and key files. charset_name may be one of binary, armscii8, ascii, big5, cp1250, cp1251, cp1256, cp1257, cp850, cp852, cp866, cp932, dec8, eucjpms, euckr, ... The CMake program provides a great deal of control over how you configure a MySQL source ...
https://dev.mysql.com/doc/refman/8.4/en/trigger-syntax.html
It also includes clauses that specify the trigger action time, the triggering event, and what to do when the trigger activates: The keyword BEFORE indicates the trigger action time. The keyword INSERT indicates the trigger event; that is, the type ... To create a trigger or drop a trigger, use the CREATE TRIGGER or DROP TRIGGER statement, described in Section 15.1.22, “CREATE TRIGGER Statement”, and Section 15.1.34, “DROP TRIGGER ...
https://dev.mysql.com/doc/refman/8.4/en/using-spatial-indexes.html
The optimizer investigates whether available spatial indexes can be involved in the search for queries that use a function such as MBRContains() or MBRWithin() in the WHERE clause. The following query finds all objects that are in the given ...
https://dev.mysql.com/doc/refman/8.4/en/x-plugin-encrypted-connections.html
For example, X Plugin can have SSL key, certificate, and certificate authority files that differ from those used for MySQL Server. This section explains how to configure X Plugin to use encrypted connections. To enable configuring support for ...
https://dev.mysql.com/doc/mysql-enterprise-backup/8.4/en/backup-encrypted-innodb-options.html
The following is the command-line option for working with encrypted InnoDB tables and binary/relay logs: --encrypt-password[=STRING] Command-Line Format --encrypt-password=STRING Type String The user-supplied password by which mysqlbackup encrypts ... MySQL Enterprise Backup supports encrypted InnoDB tablespaces and encrypted binary/relay ...
https://dev.mysql.com/doc/mysql-enterprise-backup/8.4/en/backup-performance.html
Because the primary key columns are included in each InnoDB secondary index, it wastes space to define primary keys composed of numerous or lengthy columns, or multiple secondary indexes with different permutations of the same columns. This section ...