https://dev.mysql.com/keyring-okv-plugin.html
Some pertinent information sources: Oracle Key Vault site Oracle Key Vault documentation In Oracle Key Vault terminology, clients that use Oracle Key Vault to store and retrieve security objects are called endpoints. To communicate with Oracle Key ... Note The keyring_okv plugin is an extension included in MySQL Enterprise Edition, a commercial ...
https://dev.mysql.com/local-variable-scope.html
Prepared statement scope is the current session, not the stored program, so the statement could be executed after the program ends, at which point the variables would no longer be in scope. The scope of a local variable is the BEGIN ... The ...
https://dev.mysql.com/locale-support.html
The lc_time_names value does not affect the result from FORMAT(), but this function takes an optional third parameter that enables a locale to be specified to be used for the result number's decimal point, thousands separator, and grouping between ... The locale indicated by the lc_time_names system variable controls the language used to display day and month names and ...
https://dev.mysql.com/locking-functions.html
For example, if the statement fails part way through and rolls back, locks acquired up to the point of failure will still exist. While held by one session, other sessions cannot obtain a lock of the same name. Returns 1 if the lock was obtained ...
https://dev.mysql.com/log-file-maintenance.html
At this point, you can make a backup of mysql.log.old, mysql-slow.log.old, and err.log.old, then remove them from disk. As described in Section 5.4, “MySQL Server Logs”, MySQL Server can create several different log files to help you see what ...
https://dev.mysql.com/log-status-table.html
The log_status table informs the online backup which point it should copy up to in the master's binary log and gtid_executed record, and the relay log for each replication channel. It also provides relevant information for individual storage ... The ...
https://dev.mysql.com/midpoint-insertion.html
By default, the key cache management system uses a simple LRU strategy for choosing key cache blocks to be evicted, but it also supports a more sophisticated method called the midpoint insertion strategy. When using the midpoint insertion strategy, ...key_cache_division_limit is a component of structured key cache variables, so its value is a parameter that can be set per ...
https://dev.mysql.com/multiple-server-clients.html
On Unix, set the MYSQL_UNIX_PORT and MYSQL_TCP_PORT environment variables to point to the Unix socket file and TCP/IP port number before you start your clients. Start the client with --protocol=TCP to connect using TCP/IP, --protocol=SOCKET to ...
https://dev.mysql.com/mutex-instances-table.html
The setup_instruments table lists the name of the instrumentation point, with the prefix wait/synch/mutex/. The mutex_instances table lists all the mutexes seen by the Performance Schema while the server executes. A mutex is a synchronization ...
https://dev.mysql.com/myisam-check.html
It does a check-read of every key for each row to verify that they indeed point to the correct row. To check a MyISAM table, use the following commands: myisamchk tbl_name This finds 99.99% of all errors. What it cannot find is corruption that ...