Search



Search Results
Displaying 891 to 900 of 2117 total results
https://dev.mysql.com/doc/relnotes/mysql-operator/en/news-9-2-0-2.2.3.html
Bugs Fixed Using initDB.clone in an InnoDBCluster specification to provision (clone) a new MySQL server from a MySQL server not managed by MySQL Operator for Kubernetes would fail, as the source server did not have the "localroot" user that is ...
https://dev.mysql.com/doc/connector-j/en/connector-j-binary-installation.html
The various MysqlDataSource classes support the following parameters (through standard set mutators): user password serverName databaseName port . Obtaining and Using the Binary Distribution Packages Different types of binary distribution packages ...
https://dev.mysql.com/doc/connector-j/en/connector-j-connp-props-connection.html
connectionAttributes A comma-delimited list of user-defined "key:value" pairs, in addition to standard MySQL-defined "key:value" pairs, to be passed to MySQL Server for display as connection attributes in the 'PERFORMANCE_SCHEMA' tables ...Example ...
https://dev.mysql.com/doc/refman/8.4/en/assignment-operators.html
Causes the user variable on the left hand side of the operator to take on the value to its right. Section 11.4, “User-Defined Variables”, explains why you should avoid doing this. Within a SET statement, = is treated as an assignment operator ...
https://dev.mysql.com/doc/refman/8.4/en/audit-log-elements.html
Tables in the mysql system database provide persistent storage of filter and user account data, unless you set the audit_log_database system variable at server startup to specify a different database. The AUDIT_ADMIN privilege enable users to ...
https://dev.mysql.com/doc/refman/8.4/en/create-server.html
CREATE SERVER server_name FOREIGN DATA WRAPPER wrapper_name OPTIONS (option [, option] ...) option: { HOST character-literal | DATABASE character-literal | USER character-literal | PASSWORD character-literal | SOCKET character-literal | OWNER ...
https://dev.mysql.com/doc/refman/8.4/en/data-masking-component-usage.html
Before using MySQL Enterprise Data Masking and De-Identification, install it according to the instructions provided at Section 8.5.2.1, “MySQL Enterprise Data Masking and De-Identification Component Installation”. To use MySQL Enterprise Data ...
https://dev.mysql.com/doc/refman/8.4/en/encryption-functions.html
The derived key is used to encrypt and decrypt the data, and it remains in the MySQL Server instance and is not accessible to users. The derived key is used to encrypt and decrypt the data, and it remains in the MySQL Server instance and is not ...
https://dev.mysql.com/doc/refman/8.4/en/expressions.html
This section lists the grammar rules that expressions must follow in MySQL and provides additional information about the types of terms that may appear in expressions. Expression Syntax Expression Term Notes Temporal Intervals Expression Syntax The ...
https://dev.mysql.com/doc/refman/8.4/en/extensions-to-ansi.html
Some SQL servers provide the same functionality but call this User space. Functions and operators To make it easier for users who migrate from other SQL environments, MySQL Server supports aliases for many functions. MySQL Server supports some ...
Displaying 891 to 900 of 2117 total results