Search Results
                    
                    
            https://dev.mysql.com/doc/mysql-monitor/8.0/en/mem-ssl-installation.html
                                Checking the Keystore All certificates and keys are stored in the Tomcat keystore. To check the certificates stored in the keystore, run the following command: keytool -keystore $INSTALL_ROOT/apache-tomcat/conf/keystore -list -v Generating Keystore, ... Important The self-signed certificates are generated by the MySQL Enterprise Monitor installation or upgrade process, and are set to expire after 365 ...
                                            
                https://dev.mysql.com/doc/heatwave/en/mys-hw-advisor-syntax.html
                                The fixed_enc key is a fully qualified column name without backticks in the following format: schema_name.tbl_name.col_name. auto_dp: Defines settings for Data Placement, which recommends data placement keys. Advisor only suggests data placement ...
                                            
                https://dev.mysql.com/doc/refman/8.4/en/encrypted-connections.html
                                Certificates rely on asymmetric encryption algorithms that have two encryption keys (a public key and a secret key). Any data encrypted using this public key can be decrypted only using the corresponding secret key, which is held by the owner of the ... With an unencrypted connection between the MySQL client and the server, someone with access to the network could watch all your traffic and inspect the data being sent or received between client and ...
                                            
                https://dev.mysql.com/doc/refman/8.4/en/enterprise-encryption-function-reference.html
                                 MySQL Enterprise Encryption functions are provided by the MySQL component_enterprise_encryption component. 
                                            
                https://dev.mysql.com/doc/refman/8.4/en/federated-usagenotes.html
                                ON DUPLICATE KEY UPDATE statements, but if a duplicate-key violation occurs, the statement fails with an error. The following items indicate features that the FEDERATED storage engine does and does not support: The remote server must be a MySQL ...
                                            
                https://dev.mysql.com/doc/refman/8.4/en/general-thread-states.html
                                Analyzing The thread is calculating a MyISAM table key distributions (for example, for ANALYZE TABLE). manage keys The server is enabling or disabling a table index. Repair with keycache The repair code is using creating keys one by one through the ... The following list describes thread State values that are associated with general query processing and not more specialized activities such as ...
                                            
                https://dev.mysql.com/doc/refman/8.4/en/index-preloading.html
                                 If there are enough blocks in a key cache to hold blocks of an entire index, or at least the blocks corresponding to its nonleaf nodes, it makes sense to preload the key cache with index blocks before starting to use it. Preloading enables you to ...Although the blocks stay in the cache, because there are enough buffers for all of them, they are fetched from disk in random order, and not ...
                                            
                https://dev.mysql.com/doc/refman/8.4/en/information-schema-innodb-foreign-table.html
                                The INNODB_FOREIGN table has these columns: ID The name (not a numeric value) of the foreign key index, preceded by the schema (database) name (for example, test/products_fk). FOR_NAME The name of the child table in this foreign key relationship. 
                                            
                https://dev.mysql.com/doc/refman/8.4/en/merge-table-problems.html
                                MySQL ensures that unique key values remain unique within that MyISAM table, but not over all the underlying tables in the collection. The two key facts are: REPLACE can detect unique key violations only in the underlying table to which it is going ... The following are known problems with MERGE tables: MERGE child tables are locked through the parent ...
                                            
                https://dev.mysql.com/doc/refman/8.4/en/myisamchk-other-options.html
                                 myisamchk supports the following options for actions other than table checks and repairs: --analyze, -a Command-Line Format --analyze Analyze the distribution of key values. To obtain information about the key distribution, use a myisamchk ...This ...