Since MySQL 5.5, MySQL has supported the utf8mb4
character set. With the character-set defining the
repertoire of characters that can be stored (utf8mb4
can present Unicode characters from U+0000 to
U+10FFFF), a collation defines how sorting order and
comparisons should behave.…
Somebody asked on Freenode. I don’t know why they wanted it. How would you drop all MySQL users who do not have “GRANT ALL ON *.* … WITH GRANT OPTION”? That is, drop any users who have ‘N’ in any of the privilege columns in `mysql`.`user`.
My solution shown below. Did you think of a different approach?
I used SQL to build SQL which built more SQL. Get the list of ‘priv’ columns from information_schema.columns. Build a query that looks for ‘N’ in any of those columns (it feels funny to search for a constant in a list of fields instead of a field in a list of constants, but it’s perfectly legal). Use the results to build the DROP USER statement.
mysql -BNe "SELECT CONCAT('SELECT CONCAT(''DROP USER '', QUOTE(user), ''@'', QUOTE(Host), '';'') FROM mysql.user WHERE ''N'' IN (', GROUP_CONCAT(column_name), ')') FROM information_schema.columns WHERE table_schema = 'mysql' AND …[Read more]
MySQL Connector/Net 7.0.7 is the fourth development release
that expands cross-platform support to Linux and OS X
when using Microsoft’s .NET Core framework. Now,
.NET developers can use the X DevAPI with .NET Core
and Entity Framework Core
(EF Core) 1.0 to create server applications that run on
Windows, Linux and OS X.
We are very excited about this change and really look forward to
your feedback on it!
MySQL Connector/Net 7.0.7 is also the sixth development
release of MySQL Connector/Net to add support for the new X
DevAPI. The X DevAPI enables
application developers to write code that combines the
strengths of the
relational and document models using a modern, NoSQL-like
syntax that
does not assume previous experience writing traditional SQL.
To learn more about how to write applications using the X DevAPI,
see
…
The 2017 MySQL Community Awards event will take place, as usual, in Santa Clara, during the Percona Live Data Performance Conference, April 2017.
The MySQL Community Awards is a community based initiative. The idea is to publicly recognize contributors to the MySQL ecosystem. The entire process of discussing, voting and awarding is controlled by an independent group of community members, typically based of past winners or their representatives, as well as known contributors.
It is a self-appointed, self-declared, self-making-up-the-rules-as-it-goes committee. It is also very aware of the importance of the community; a no-nonsense, non-political, adhering to tradition, self criticizing committee.
The Call for Nominations is open. We are seeking the community’s assistance in nominating candidates in the following categories:
MySQL Community Awards: Community Contributor of the year 2017
…[Read more]Welcome to another post in the series of Percona Live featured session blogs! In these blogs, we’ll highlight some of the session speakers that will be at this year’s Percona Live conference. We’ll also discuss how these sessions can help you improve your database environment. Make sure to read to the end to get a special Percona Live 2017 registration bonus!
In this Percona Live featured session, we’ll meet Evan Elias, Director of Engineering, Tumblr. His session is Automatic MySQL Schema Management with Skeema. Skeema is a new open source CLI tool for managing MySQL schemas and …
[Read more]One of the services our database engineers provide is adding users to MySQL. We have some nice Chef recipes, so all I have to do is update a few files, including adding in the MySQL password hash.
Now, when I added myself, I just logged into MySQL and generated a password hash. But when my SRE (systems reliability engineer) colleague needed to generate a password, he did not have a MySQL system he could login to.
The good news is it’s easy to generate a MySQL password hash. The MySQL password hash is simply a SHA1 hash of a SHA1 hash, with * at the beginning. Which means you do not need a MySQL database to create a MySQL password hash – all you need is a programming language that has a SHA1 function (well, and a concatenate function).
And I found it, of course, on this post at StackExchange (http://unix.stackexchange.com/a/234592/217471). So you don’t have to click through, here is what it says – and I have …
[Read more]In previous blogs (part 1 and part 2), we discussed how to migrate your RDS data into an EC2 instance. In the process, we managed to move our data out of RDS, but we are still running on AWS. If you would like to move your data completely out of Amazon Web Services, there’s a bit more work to do. In today’s blog post, we will show you how it can be done.
Environment introduction
The environment we’ll be working with is pretty similar to what we ended up with on our last post in the series. The only difference is that no cutover happened, as we will use the EC2 …
[Read more]Intro
In my previous blog post I told you to use SSL/TLS to secure your MySQL network connections. So I followed my advice and did enable SSL. Great!
So first let's quickly verify that everything is working.
So you enabled SSL with mysql_ssl_rsa_setup, used a
OpenSSL based build or put ssl-cert,
ssl-key and ssl-ca in the mysqld
section of your /etc/my.cnf and now show global variables
like 'have_SSL'; returns 'YES'.
And you have configured the client with
--ssl-mode=PREFERRED. Now show global status
like 'Ssl_cipher'; indicates the session is indeed
secured.
You could also dump traffic and it looks 'encrypted' (i.e. not readable)...
With SSL enabled everything should be safe isn't it?
The handshake …
[Read more]We are pleased to announce that MySQL Enterprise Monitor 3.3.3 is now available for download on the My Oracle Support (MOS) web site. It will also be available via the Oracle Software Delivery Cloud in a week or so. This is a maintenance release that includes a few new features and fixes a number of bugs. You can find more information on the contents of this release in the change log.
Highlights of MySQL Enterprise Monitor 3.3 include:
- 3.3 introduces a new Enterprise Backup Dashboard that brings deeper integration with MySQL Enterprise Backup. View current backup status, history and archive details by group or instance using MySQL Enterprise Backup Advisor collections from existing mysql.backup_history and mysql.backup_progress table data.
- Backup Group view shows a summary of backup events, details on the last …
We are pleased to announce that MySQL Enterprise Monitor 3.2.7 is nowavailable for download on the My Oracle Support (MOS) web site.This is a maintenance release that includes a few new features and fixes a number of bugs. You canfind more information on the contents of this release in thechange log.
You will find binaries for the new release on My Oracle Support. Choose the "Patches & Updates" tab, and then choose the "Product or Family (Advanced Search)" side tab in the "Patch Search" portlet.
Important: MySQL Enterprise Monitor (MEM) 3.3 offers many significantimprovements over MEM 3.2 and we highly recommend that youconsider upgrading. More information on MEM 3.3 is available here:
- …