Search Results
https://dev.mysql.com/doc/refman/8.4/en/replication-privilege-checks.html
By default, MySQL replication (including Group Replication) does not carry out privilege checks when transactions that were already accepted by another server are applied on a replica or group member. MySQL then checks each transaction against the ...You can create a user account with the appropriate privileges to apply the transactions that are normally replicated on a channel, and specify this as the PRIVILEGE_CHECKS_USER account for the replication applier, using a CHANGE REPLICATION SOURCE TO ...
https://dev.mysql.com/doc/refman/8.4/en/shutdown.html
SHUTDOWN provides an SQL-level interface to the same functionality available using the mysqladmin shutdown command. A successful SHUTDOWN sequence consists of checking the privileges, validating the arguments, and sending an OK packet to the client.
https://dev.mysql.com/doc/refman/8.4/en/start-replica.html
Important The password that you set using START REPLICA is masked when it is written to MySQL Server’s logs, Performance Schema tables, and SHOW PROCESSLIST statements. If you are using the UNTIL clause to do this, start the replica with ...] ...
https://dev.mysql.com/doc/refman/8.4/en/version-tokens-elements.html
A set of loadable functions provides an SQL-level API for manipulating and inspecting the list of server version tokens maintained by the plugin. Version Tokens is based on a plugin library that implements these elements: A server-side plugin named ...Otherwise, the plugin returns an error to the client and the statement ...
https://dev.mysql.com/doc/mysql-enterprise-backup/8.4/en/connection-options.html
When mysqlbackup creates a backup, it sends SQL commands to a MySQL server using a database server connection. The way to create a connection is similar to what is described in Connecting to the MySQL Server Using Command Options of the MySQL 8.4 ...If none of the algorithms specified by --compression-algorithms are permitted by the server, connection to the server will not be ...
https://dev.mysql.com/doc/connectors/en/connector-j-connp-props-prepared-statements.html
Default Value true Since Version 3.1.12 useServerPrepStmts Use server-side prepared statements if the server supports them? The server may limit the number of prepared statements with 'max_prepared_stmt_count' or disable them altogether. In case of ...Default Value false Since Version 3.1.0 useStreamLengthsInPrepStmts Honor stream length parameter in 'PreparedStatement/ResultSet.set*Stream()' method calls? Default Value true Since Version ...
https://dev.mysql.com/doc/connectors/en/connector-j-connp-props-x-protocol-and-x-devapi.html
"lz4_message"; consult the description for the MySQL global variable 'mysqlx_compression_algorithms' for a list of supported and enabled algorithms), that defines the order and which algorithms will be attempted when negotiating connection ...If the ...Default Value PLAIN Since Version 8.0.8 xdevapi.compression X DevAPI-specific network traffic ...
https://dev.mysql.com/doc/connectors/en/connector-net-connections-errors.html
The following code example shows how to manage the response of an application based on the actual error: C# Example MySql.Data.MySqlClient.MySqlConnection conn; string myConnectionString; myConnectionString = "server=127.0.0.1;uid=root;" + ...This ...
https://dev.mysql.com/doc/connector-net/en/connector-net-connections-errors.html
The following code example shows how to manage the response of an application based on the actual error: C# Example MySql.Data.MySqlClient.MySqlConnection conn; string myConnectionString; myConnectionString = "server=127.0.0.1;uid=root;" + ...This ...
https://dev.mysql.com/doc/internals/en/authentication-method-mismatch.html
Doing so will always lead to method missmatch and the following authentication method switch request from server. If authentication method missmatch happens, server sends to client the Authentication Method Switch Request Packet which contains the ...Note The missmatch can happen even if client and server used the same authentication method in the initial handshake, but this method was different from the method M required by the user ...