User Account Management
User Privileges
Administrative Privileges
Database Access Privileges
Creating and Rename User Account
Drop User Account
Grant Privileges
Revoke Privileges
Routines and Triggers
This document summarizes Frédéric Descamps' journey to add a user to the router_rest_accounts table to authenticate with the MySQL Router REST API. After several failed attempts using generated or external passwords, he learns directly from the MySQL Router development team that the REST API supports using the default MySQL 8.0 authentication string or the modular_crypt_format for password hashes, allowing simple password insertion.
PostgreSQL (or Postgres) began its life in 1986 as POSTGRES, a research project of the University of California at Berkeley.
PostgreSQL isn't just relational, it's object-relational.it's object-relational. This gives it some advantages over other open source SQL databases like MySQL, MariaDB and Firebird.
MySQL uses different storage engines to store, retrieve and index data. The major storage engines are MyISAM, InnoDB, MEMORY, and ARCHIVE. MyISAM uses table-level locking and supports full-text searching but not transactions. InnoDB supports transactions, row-level locking and foreign keys but with more overhead than MyISAM. MEMORY stores data in memory for very fast access but data is lost on server restart. ARCHIVE is for read-only tables to improve performance and reduce storage requirements.
MySQL Database Architectures - MySQL InnoDB ClusterSet 2021-11Kenny Gryp
Oracle's MySQL solutions make it easy to setup various database architectures and achieve high availability with the introduction MySQL InnoDB Cluster and MySQL InnoDB ReplicaSet meeting various high availability requirements. MySQL InnoDB ClusterSet provides a popular disaster recovery solution.
Completely built in-house and supported by Oracle, many enterprises large and small have adopted these solutions into business critical applications.
In this presentation the various database architecture solutions for high availability and disaster recovery will be covered and help you choose the right solutions based on your business requirements.
The document provides an overview of basic concepts related to SQL server databases including database objects, file systems, storage structures, and query processing. It discusses topics like SQL server databases, storage files and file groups, data pages and extents, data organization in heaps vs indexed tables, and how queries are processed through either full table scans or using indexes.
This document discusses AlwaysOn availability technologies in SQL Server 2017, including Failover Cluster Instances (FCI) and Availability Groups (AG). It provides an overview of how FCI and AG work to provide high availability and disaster recovery, including capabilities like multi-subnet support. The document also summarizes new features and enhancements to FCI and AG in SQL Server 2014, 2016 and 2017.
This document introduces MySQL. It begins with a brief history of MySQL and an overview of MySQL products. It then discusses what MySQL is, including that it is a relational database management system, uses structured query language (SQL), and is open source. It describes key features of MySQL like speed, reliability, and cost reductions compared to other databases. It also covers MySQL architecture, clusters, replication, and tools like Workbench.
This document provides an agenda and background information for a presentation on PostgreSQL. The agenda includes topics such as practical use of PostgreSQL, features, replication, and how to get started. The background section discusses the history and development of PostgreSQL, including its origins from INGRES and POSTGRES projects. It also introduces the PostgreSQL Global Development Team.
This document summarizes Frédéric Descamps' journey to add a user to the router_rest_accounts table to authenticate with the MySQL Router REST API. After several failed attempts using generated or external passwords, he learns directly from the MySQL Router development team that the REST API supports using the default MySQL 8.0 authentication string or the modular_crypt_format for password hashes, allowing simple password insertion.
PostgreSQL (or Postgres) began its life in 1986 as POSTGRES, a research project of the University of California at Berkeley.
PostgreSQL isn't just relational, it's object-relational.it's object-relational. This gives it some advantages over other open source SQL databases like MySQL, MariaDB and Firebird.
MySQL uses different storage engines to store, retrieve and index data. The major storage engines are MyISAM, InnoDB, MEMORY, and ARCHIVE. MyISAM uses table-level locking and supports full-text searching but not transactions. InnoDB supports transactions, row-level locking and foreign keys but with more overhead than MyISAM. MEMORY stores data in memory for very fast access but data is lost on server restart. ARCHIVE is for read-only tables to improve performance and reduce storage requirements.
MySQL Database Architectures - MySQL InnoDB ClusterSet 2021-11Kenny Gryp
Oracle's MySQL solutions make it easy to setup various database architectures and achieve high availability with the introduction MySQL InnoDB Cluster and MySQL InnoDB ReplicaSet meeting various high availability requirements. MySQL InnoDB ClusterSet provides a popular disaster recovery solution.
Completely built in-house and supported by Oracle, many enterprises large and small have adopted these solutions into business critical applications.
In this presentation the various database architecture solutions for high availability and disaster recovery will be covered and help you choose the right solutions based on your business requirements.
The document provides an overview of basic concepts related to SQL server databases including database objects, file systems, storage structures, and query processing. It discusses topics like SQL server databases, storage files and file groups, data pages and extents, data organization in heaps vs indexed tables, and how queries are processed through either full table scans or using indexes.
This document discusses AlwaysOn availability technologies in SQL Server 2017, including Failover Cluster Instances (FCI) and Availability Groups (AG). It provides an overview of how FCI and AG work to provide high availability and disaster recovery, including capabilities like multi-subnet support. The document also summarizes new features and enhancements to FCI and AG in SQL Server 2014, 2016 and 2017.
This document introduces MySQL. It begins with a brief history of MySQL and an overview of MySQL products. It then discusses what MySQL is, including that it is a relational database management system, uses structured query language (SQL), and is open source. It describes key features of MySQL like speed, reliability, and cost reductions compared to other databases. It also covers MySQL architecture, clusters, replication, and tools like Workbench.
This document provides an agenda and background information for a presentation on PostgreSQL. The agenda includes topics such as practical use of PostgreSQL, features, replication, and how to get started. The background section discusses the history and development of PostgreSQL, including its origins from INGRES and POSTGRES projects. It also introduces the PostgreSQL Global Development Team.
This document provides an introduction and overview of PostgreSQL, an open-source object-relational database management system. It discusses that PostgreSQL supports modern SQL features, has free commercial and academic use, and offers performance comparable to other databases while being very reliable with stable code and robust testing. The architecture uses a client-server model to handle concurrent connections and transactions provide atomic, isolated, and durable operations. PostgreSQL also supports user-defined types, inheritance, and other advanced features.
MySQL Group Replication: Handling Network Glitches - Best PracticesFrederic Descamps
The document discusses best practices for handling network glitches in group replication. It recommends checking replication status using Performance Schema and MySQL Shell to diagnose issues. It also suggests adapting group replication settings to faulty networks by increasing timeouts to avoid expels. These adaptations include increasing write concurrency and transaction size limits to handle higher latencies. The document also recommends configuring rejoin attempts and quorum timeout to deal with failures and prevent unstable members from interfering.
Part1 of SQL Tuning Workshop - Understanding the OptimizerMaria Colgan
Part 1 of a 5 part SQL Tuning workshop, This presentation covers the history of the Oracle Optimizer and explains the first thing the Optimizer does when it receives a SQL statements, which is to transform the SQL statement in order to open up additional access paths.
ModSecurity 3.0 and NGINX: Getting StartedNGINX, Inc.
On demand version can be accessed at https://www.nginx.com/resources/webinars/modsecurity-3-0-and-nginx-getting-started/
The long-awaited ModSecurity 3.0 is available now. ModSecurity 3.0 is a complete rewrite of ModSecurity, and is the first version to work natively with NGINX. ModSecurity 3.0 loads into NGINX as a dynamic module.
Watch this webinar to learn:
- A brief history of the ModSecurity project
- How ModSecurity stops Layer 7 attacks
- What’s changed with ModSecurity 3.0 and how it integrates with NGINX
- How to install and configure ModSecurity with both open source NGINX and NGINX Plus
This document provides an introduction and overview of PostgreSQL, including its history, features, installation, usage and SQL capabilities. It describes how to create and manipulate databases, tables, views, and how to insert, query, update and delete data. It also covers transaction management, functions, constraints and other advanced topics.
MySQL 8.0 is the latest Generally Available version of MySQL. This session will help you upgrade from older versions, understand what utilities are available to make the process smoother and also understand what you need to bear in mind with the new version and considerations for possible behavior changes and solutions.
MySQL InnoDB Cluster provides a complete, high-availability solution for MySQL. Learn how with a few easy-to-use Shell commands, how to set up a MySQL database architecture.
PL/SQL is a combination of SQL along with the procedural features of programming languages.
It provides specific syntax for this purpose and supports exactly the same datatypes as SQL.
The document discusses MySQL Shell and how it can help database administrators (DBAs) with common tasks like deploying architectures, preparing upgrades, dumping and loading data, and managing users. MySQL Shell provides tools like the Admin API for configuring MySQL clusters and replicasets, an upgrade checker utility to validate upgrades to MySQL 8.0, and parallel dump and load functionality to backup, migrate, and reset data.
Presentation that I gave as a guest lecture for a summer intensive development course at nod coworking in Dallas, TX. The presentation targets beginning web developers with little, to no experience in databases, SQL, or PostgreSQL. I cover the creation of a database, creating records, reading/querying records, updating records, destroying records, joining tables, and a brief introduction to transactions.
The document discusses MySQL architecture and concepts. It describes the application layer where users interact with the MySQL database. It then explains the logical layer which includes subsystems like the query processor, transaction management, recovery management and storage management that work together to process requests. Key concepts like concurrency control, locks, transactions, storage engines and InnoDB/MyISAM are also overviewed.
MySQL Database Architectures - InnoDB ReplicaSet & ClusterKenny Gryp
This document provides an overview and comparison of MySQL InnoDB Cluster and MySQL InnoDB ReplicaSet. It discusses the components, goals, and features of each solution. MySQL InnoDB Cluster uses Group Replication to provide high availability, automatic failover, and data consistency. MySQL InnoDB ReplicaSet uses asynchronous replication and provides availability and read scaling through manual primary/secondary configuration and failover. Both solutions integrate MySQL Shell, Router, and automatic member provisioning for easy management.
Wars of MySQL Cluster ( InnoDB Cluster VS Galera ) Mydbops
MySQL Clustering over InnoDB engines has grown a lot over the last decade. Galera began working with InnoDB early and then Group Replication came to the environment later, where the features are now rich and robust. This presentation offers a technical comparison of both of them.
The document discusses MySQL and SQL concepts including relational databases, database management systems, and the SQL language. It introduces common SQL statements like SELECT, INSERT, UPDATE, and DELETE and how they are used to query and manipulate data. It also covers topics like database design with tables, keys, and relationships between tables.
Advance Sharding Solution with ProxySQL
ProxySQL is a very powerful platform that allows us to manipulate and manage our connections and queries in a simple but effective way.
Historically MySQL lacks in sharding capability. This significant missing part had often cause developer do implement sharding at application level, or DBA/SA to move on to another solution.
ProxySQL comes with an elegant and simple solution that allow us to implement sharding capability with MySQL without the need to perform significant, or at all, changes in the code.
This brief presentation will illustrate how to successfully configure and use ProxySQL to perform sharding, from very simple approach based on connection user/ip/port, to complicate ones that see the need to read values inside queries.
Deep Dive on Amazon Aurora PostgreSQL Performance Tuning (DAT428-R1) - AWS re...Amazon Web Services
Amazon Aurora offers several options for monitoring and optimizing PostgreSQL database performance. These include Enhanced Monitoring and Performance Insights, an easy-to-use tool for assessing the load on your database and identifying slow-performing queries. In this session, learn how to tune the performance of your Aurora database with PostgreSQL compatibility, whether your application is in development or in production. Please join us for a speaker meet-and-greet following this session at the Speaker Lounge (ARIA East, Level 1, Willow Lounge). The meet-and-greet starts 15 minutes after the session and runs for half an hour.
Mysql is a popular open source database system. It can be downloaded from the mysql website for free. Mysql allows users to create, manipulate and store data in databases. A database contains tables which hold related information. Structured Query Language (SQL) is used to perform operations like querying and manipulating data within MySQL databases. Some common SQL queries include SELECT, INSERT, UPDATE and DELETE.
Another MySQL HA Solution for ProxySQL Users, Easy and All Integrated: MySQL ...Frederic Descamps
Interactive Help
Cluster Administration
Topology management
Automatic provisioning
Monitoring
MySQL Shell
Copyright @ 2019 Oracle and/or its affiliates.
32 / 41
MySQL Shell provides the developer and DBA with a
single intuitive, exible, and powerful interface for all
MySQL related tasks!
Database Administration Interface
Open Source -- GPL
Multi-Language: JavaScript, Python, and SQL
Naturally scriptable
Supports Document and Relational models
Exposes full Development and Admin
LinuxFest Northwest 2022 - The Evolution of a MySQL Database SystemFrederic Descamps
At the beginning of a project, the database is just a single MySQL instance (maybe not even running on its own hardware)... but with the evolution of the business requirements, the database must change to also meet the new targets of data loss and uptime. During this session we will follow the journey of a single MySQL server from the simple instance to a High Available Architecture with multi-site Disaster Recovery. We will discover easy manageable native solutions like MySQL InnoDB ReplicaSet, MySQL InnoDB Cluster and MySQL InnoDB ClusterSet. The session is also illustrated with commands and examples.
Southeast Linuxfest -- MySQL User Admin Tips & TricksDave Stokes
This document discusses tips and tricks for MySQL user administration. It covers how MySQL stores user accounts and passwords, and two main ways to create accounts using SQL statements or manipulating grant tables directly. It also discusses user privileges, plugins for authentication, proxy users, and best practices like being stingy with privileges and auditing privileges regularly.
Percona Live 2012PPT:mysql-security-privileges-and-user-managementmysqlops
The document discusses various aspects of MySQL security including:
- Privilege systems that control user access through granting of privileges to databases, tables, and other objects.
- User management features like creating and dropping users, setting passwords, and viewing granted privileges.
- Certain privileges like PROCESS, RELOAD, SHUTDOWN, and SUPER that provide powerful control over the database and should be granted carefully.
This document provides an introduction and overview of PostgreSQL, an open-source object-relational database management system. It discusses that PostgreSQL supports modern SQL features, has free commercial and academic use, and offers performance comparable to other databases while being very reliable with stable code and robust testing. The architecture uses a client-server model to handle concurrent connections and transactions provide atomic, isolated, and durable operations. PostgreSQL also supports user-defined types, inheritance, and other advanced features.
MySQL Group Replication: Handling Network Glitches - Best PracticesFrederic Descamps
The document discusses best practices for handling network glitches in group replication. It recommends checking replication status using Performance Schema and MySQL Shell to diagnose issues. It also suggests adapting group replication settings to faulty networks by increasing timeouts to avoid expels. These adaptations include increasing write concurrency and transaction size limits to handle higher latencies. The document also recommends configuring rejoin attempts and quorum timeout to deal with failures and prevent unstable members from interfering.
Part1 of SQL Tuning Workshop - Understanding the OptimizerMaria Colgan
Part 1 of a 5 part SQL Tuning workshop, This presentation covers the history of the Oracle Optimizer and explains the first thing the Optimizer does when it receives a SQL statements, which is to transform the SQL statement in order to open up additional access paths.
ModSecurity 3.0 and NGINX: Getting StartedNGINX, Inc.
On demand version can be accessed at https://www.nginx.com/resources/webinars/modsecurity-3-0-and-nginx-getting-started/
The long-awaited ModSecurity 3.0 is available now. ModSecurity 3.0 is a complete rewrite of ModSecurity, and is the first version to work natively with NGINX. ModSecurity 3.0 loads into NGINX as a dynamic module.
Watch this webinar to learn:
- A brief history of the ModSecurity project
- How ModSecurity stops Layer 7 attacks
- What’s changed with ModSecurity 3.0 and how it integrates with NGINX
- How to install and configure ModSecurity with both open source NGINX and NGINX Plus
This document provides an introduction and overview of PostgreSQL, including its history, features, installation, usage and SQL capabilities. It describes how to create and manipulate databases, tables, views, and how to insert, query, update and delete data. It also covers transaction management, functions, constraints and other advanced topics.
MySQL 8.0 is the latest Generally Available version of MySQL. This session will help you upgrade from older versions, understand what utilities are available to make the process smoother and also understand what you need to bear in mind with the new version and considerations for possible behavior changes and solutions.
MySQL InnoDB Cluster provides a complete, high-availability solution for MySQL. Learn how with a few easy-to-use Shell commands, how to set up a MySQL database architecture.
PL/SQL is a combination of SQL along with the procedural features of programming languages.
It provides specific syntax for this purpose and supports exactly the same datatypes as SQL.
The document discusses MySQL Shell and how it can help database administrators (DBAs) with common tasks like deploying architectures, preparing upgrades, dumping and loading data, and managing users. MySQL Shell provides tools like the Admin API for configuring MySQL clusters and replicasets, an upgrade checker utility to validate upgrades to MySQL 8.0, and parallel dump and load functionality to backup, migrate, and reset data.
Presentation that I gave as a guest lecture for a summer intensive development course at nod coworking in Dallas, TX. The presentation targets beginning web developers with little, to no experience in databases, SQL, or PostgreSQL. I cover the creation of a database, creating records, reading/querying records, updating records, destroying records, joining tables, and a brief introduction to transactions.
The document discusses MySQL architecture and concepts. It describes the application layer where users interact with the MySQL database. It then explains the logical layer which includes subsystems like the query processor, transaction management, recovery management and storage management that work together to process requests. Key concepts like concurrency control, locks, transactions, storage engines and InnoDB/MyISAM are also overviewed.
MySQL Database Architectures - InnoDB ReplicaSet & ClusterKenny Gryp
This document provides an overview and comparison of MySQL InnoDB Cluster and MySQL InnoDB ReplicaSet. It discusses the components, goals, and features of each solution. MySQL InnoDB Cluster uses Group Replication to provide high availability, automatic failover, and data consistency. MySQL InnoDB ReplicaSet uses asynchronous replication and provides availability and read scaling through manual primary/secondary configuration and failover. Both solutions integrate MySQL Shell, Router, and automatic member provisioning for easy management.
Wars of MySQL Cluster ( InnoDB Cluster VS Galera ) Mydbops
MySQL Clustering over InnoDB engines has grown a lot over the last decade. Galera began working with InnoDB early and then Group Replication came to the environment later, where the features are now rich and robust. This presentation offers a technical comparison of both of them.
The document discusses MySQL and SQL concepts including relational databases, database management systems, and the SQL language. It introduces common SQL statements like SELECT, INSERT, UPDATE, and DELETE and how they are used to query and manipulate data. It also covers topics like database design with tables, keys, and relationships between tables.
Advance Sharding Solution with ProxySQL
ProxySQL is a very powerful platform that allows us to manipulate and manage our connections and queries in a simple but effective way.
Historically MySQL lacks in sharding capability. This significant missing part had often cause developer do implement sharding at application level, or DBA/SA to move on to another solution.
ProxySQL comes with an elegant and simple solution that allow us to implement sharding capability with MySQL without the need to perform significant, or at all, changes in the code.
This brief presentation will illustrate how to successfully configure and use ProxySQL to perform sharding, from very simple approach based on connection user/ip/port, to complicate ones that see the need to read values inside queries.
Deep Dive on Amazon Aurora PostgreSQL Performance Tuning (DAT428-R1) - AWS re...Amazon Web Services
Amazon Aurora offers several options for monitoring and optimizing PostgreSQL database performance. These include Enhanced Monitoring and Performance Insights, an easy-to-use tool for assessing the load on your database and identifying slow-performing queries. In this session, learn how to tune the performance of your Aurora database with PostgreSQL compatibility, whether your application is in development or in production. Please join us for a speaker meet-and-greet following this session at the Speaker Lounge (ARIA East, Level 1, Willow Lounge). The meet-and-greet starts 15 minutes after the session and runs for half an hour.
Mysql is a popular open source database system. It can be downloaded from the mysql website for free. Mysql allows users to create, manipulate and store data in databases. A database contains tables which hold related information. Structured Query Language (SQL) is used to perform operations like querying and manipulating data within MySQL databases. Some common SQL queries include SELECT, INSERT, UPDATE and DELETE.
Another MySQL HA Solution for ProxySQL Users, Easy and All Integrated: MySQL ...Frederic Descamps
Interactive Help
Cluster Administration
Topology management
Automatic provisioning
Monitoring
MySQL Shell
Copyright @ 2019 Oracle and/or its affiliates.
32 / 41
MySQL Shell provides the developer and DBA with a
single intuitive, exible, and powerful interface for all
MySQL related tasks!
Database Administration Interface
Open Source -- GPL
Multi-Language: JavaScript, Python, and SQL
Naturally scriptable
Supports Document and Relational models
Exposes full Development and Admin
LinuxFest Northwest 2022 - The Evolution of a MySQL Database SystemFrederic Descamps
At the beginning of a project, the database is just a single MySQL instance (maybe not even running on its own hardware)... but with the evolution of the business requirements, the database must change to also meet the new targets of data loss and uptime. During this session we will follow the journey of a single MySQL server from the simple instance to a High Available Architecture with multi-site Disaster Recovery. We will discover easy manageable native solutions like MySQL InnoDB ReplicaSet, MySQL InnoDB Cluster and MySQL InnoDB ClusterSet. The session is also illustrated with commands and examples.
Southeast Linuxfest -- MySQL User Admin Tips & TricksDave Stokes
This document discusses tips and tricks for MySQL user administration. It covers how MySQL stores user accounts and passwords, and two main ways to create accounts using SQL statements or manipulating grant tables directly. It also discusses user privileges, plugins for authentication, proxy users, and best practices like being stingy with privileges and auditing privileges regularly.
Percona Live 2012PPT:mysql-security-privileges-and-user-managementmysqlops
The document discusses various aspects of MySQL security including:
- Privilege systems that control user access through granting of privileges to databases, tables, and other objects.
- User management features like creating and dropping users, setting passwords, and viewing granted privileges.
- Certain privileges like PROCESS, RELOAD, SHUTDOWN, and SUPER that provide powerful control over the database and should be granted carefully.
View, Store Procedure & Function and Trigger in MySQL - ThaiptFramgia Vietnam
MySQL allows users to create views, stored procedures, functions, and triggers. Views are saved SELECT queries that can be executed to query tables or other views. Stored procedures and functions allow application logic to be stored in a database. Triggers automatically run SQL statements in response to changes made to data in a table, such as after insert, update or delete operations. These features help with security, maintenance, and reducing application code. However, they can also increase server overhead.
Percona Live 2012PPT: introduction-to-mysql-replicationmysqlops
This document provides an overview of MySQL replication including:
- Replication enables data from a master database to be replicated to one or more slave databases.
- Binary logs contain all writes and schema changes on the master which are used by slaves to replicate data.
- Setting up replication involves configuring the master to log binary logs, granting replication privileges, and configuring slaves to connect to the master and read binary logs from the specified position.
- Commands like START SLAVE are used to control replication and SHOW SLAVE STATUS displays replication status and lag.
MySQL is an open-source relational database management system that can be installed on Linux and Windows. The document provides step-by-step instructions for installing and configuring MySQL and describes common SQL commands for creating and managing databases, tables, and data. Key MySQL features and administration tasks such as backup, restoration, user and privilege management are also overviewed.
The document provides steps for installing MySQL on Windows, describes basic SQL commands like CREATE, SELECT, INSERT, UPDATE and DELETE. It also covers how to create databases and tables, grant user privileges, and includes examples of various SQL statements.
The document provides an overview of LinkedIn and tips for using the professional networking platform. It discusses why LinkedIn is a useful tool, its key features for personal, professional, and marketing uses. These include building profiles, finding jobs, recruiting employees, advertising and generating leads. Best practices are outlined such as optimizing profiles with relevant keywords, engaging with groups, and keeping ads concise. The presentation aims to help users maximize their LinkedIn experience.
Used in a video presentation for the databases security course in Tarbiat Modares University of tehran , reviewing some security aspects of MySQL rdbms .
This document discusses privileges in MySQL databases. It covers the different types of privileges like administrative, database access and other privileges. It describes how privileges can be granted at global, database and table levels. It also explains how to revoke privileges, change passwords, and set resource limits for accounts. The privileges needed to manage user accounts like CREATE USER, DROP USER, GRANT and REVOKE are also outlined.
The document describes the steps to install MySQL on Windows. It begins with downloading the MySQL community server software from the official website. It then outlines 14 steps for the installation process, which includes selecting the setup type, configuring options like the authentication method and root password, configuring the Windows service, and completing the installation. It provides screenshots for some of the installation wizard screens. Once installed, it opens the MySQL shell and Workbench.
The document discusses database views in MySQL. It provides information on creating views using the CREATE VIEW and CREATE OR REPLACE VIEW statements. Views allow simplifying complex queries, limiting data access, and providing extra security. Performance can be impacted when querying views defined on other views. Views also introduce dependency on the underlying tables. Stored procedures in MySQL are also discussed, including their advantages like increased performance and security, and disadvantages like increased memory usage. Triggers are described as stored programs that execute automatically in response to data changes and can be used for auditing and validation. Examples are provided on creating a trigger for auditing table updates and accessing MySQL from Excel.
This document provides an overview of implementing a secure environment for an Azure SQL database. It discusses authentication options like Azure Active Directory authentication and SQL authentication. It also covers encrypting data at rest using Transparent Data Encryption (TDE) and encrypting data in transit. Additionally, it describes configuring firewall rules and private endpoints for network security. The document demonstrates configuring an Active Directory admin, permission chaining, and Always Encrypted for encrypting column values. It also discusses using Azure Key Vault for securely storing encryption keys.
Oracle Data Redaction is a new feature in Oracle Database 12c that enables the protection of data shown to users in real time without requiring changes to applications. It applies redaction at query execution time, so the stored data remains unchanged. Redaction policies are defined that specify what data to redact for which users. The feature is useful but has some limitations, such as not preventing privileged users like DBAs from accessing protected data. It also incurs a small performance overhead for queries against tables with redaction policies.
SQL Server is a relational database management system developed by Microsoft that uses Structured Query Language (SQL) to store, manipulate and retrieve data. It includes several services like the SQL Server Database Engine for managing databases, SQL Server Agent for scheduling tasks, and MSdb for alerts and jobs. There are also system databases like Master, Model and MSdb that maintain metadata and temporary databases like Tempdb. User databases contain application schemas and data. The .mdf file stores core data and the .ldf file tracks transactions. Databases can be moved between servers using backup/restore, detach/attach of database files, or exporting to a SQL script and importing. SQL Server LocalDB is a lightweight version of SQL Express that auto
The document provides information about SQL (Structured Query Language). It defines SQL, describes what it is used for, lists some major RDBMS systems that use SQL, and explains that SQL allows users to query databases using English-like statements. It also discusses SQL basics like data definition language, data manipulation language, data control language, transaction control language, and data query language. Examples of SQL commands are provided for each along with explanations.
common_schema, DBA's framework for MySQLShlomi Noach
An introduction to common_schema, looking at the concepts behind the project and some notable features.
Slides from my talk at Percona Live London, Dec 2012
1. The document discusses various SQL concepts including DCL (Data Control Language), DDL (Data Definition Language), DML (Data Manipulation Language), functions, users, phpMyAdmin, and procedures.
2. Key SQL commands covered include COMMIT, ROLLBACK, GRANT, REVOKE, CREATE, ALTER, DROP, SELECT, INSERT, UPDATE, DELETE.
3. The document also discusses creating, using, and dropping MySQL users, as well as the features and uses of phpMyAdmin for database administration.
Triggers allow applications to monitor and respond to database events. They execute automatically in response to data manipulation language (DML) statements like insert, update, delete or database definition language (DDL) statements like create, alter, drop. Triggers enforce business rules, data integrity, auditing and more. They are defined on tables, views, schemas or databases and specify when they are executed based on events and optional conditions. Triggers can update or insert data, prevent invalid transactions and maintain referential integrity across distributed databases.
MySQL is an open-source relational database management system. The document discusses MySQL including its introduction, development history, installation, features, data types, basic commands like CREATE, SELECT, UPDATE, DELETE. It also covers MySQL constraints. Key points include that MySQL is popular, free, works with many operating systems, supports SQL, and is used by many large websites. It provides details on installing and using basic functions of MySQL.
The document discusses the DCL (data control language) statements in SQL. It covers connection management statements used to connect to and disconnect from databases. It describes transaction management statements like START TRANSACTION, COMMIT, and ROLLBACK used to control transactions. It also covers access control statements like GRANT and REVOKE used to manage user privileges and access to database objects.
MySQL is an open-source relational database management system. The document discusses the introduction to MySQL, its development history, installation, features, data types, basic commands like CREATE, SELECT, UPDATE, DELETE. It also covers MySQL constraints. MySQL is widely used for web applications due to its speed, ease of use and open source nature. It can store and manage large volumes of data across different tables using relationships.
The document discusses controlling user access in a database. It covers creating users and roles, granting and revoking privileges, and managing object and system privileges. The DBA can create users and roles, and grant privileges to access objects and the database. Users can be granted specific privileges on tables, views, and other objects. Privileges can later be revoked from users as needed.
MySQL is an open-source relational database management system. It stores data in separate tables and uses SQL for querying and modifying the data. MySQL has a client-server architecture and supports different storage engines. Common tools for interacting with MySQL include the mysql command line client, mysqldump for backups, and graphical tools like phpMyAdmin.
The document discusses controlling user access in an Oracle database. It covers creating users and roles to manage privileges, using GRANT and REVOKE statements to assign and remove privileges, and creating database links to access data on remote databases. Key topics include granting system and object privileges to users and roles, revoking privileges, and using data dictionary views to check privileges.
This document provides an overview of administering user security in a database. It covers how to create and manage database user accounts by authenticating users, assigning default tablespaces, granting and revoking privileges, and creating and managing roles. It also discusses how to create and manage profiles to implement standard password security features and control resource usage by users. The predefined SYS and SYSTEM accounts and their privileges are described. Methods for unlocking user accounts, assigning privileges to roles, and assigning roles to users are also summarized.
Similar to MySQL USER MANAGEMENT,ROUTINES & TRIGGERS. (20)
Fueling AI with Great Data with Airbyte WebinarZilliz
This talk will focus on how to collect data from a variety of sources, leveraging this data for RAG and other GenAI use cases, and finally charting your course to productionalization.
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-und-domino-lizenzkostenreduzierung-in-der-welt-von-dlau/
DLAU und die Lizenzen nach dem CCB- und CCX-Modell sind für viele in der HCL-Community seit letztem Jahr ein heißes Thema. Als Notes- oder Domino-Kunde haben Sie vielleicht mit unerwartet hohen Benutzerzahlen und Lizenzgebühren zu kämpfen. Sie fragen sich vielleicht, wie diese neue Art der Lizenzierung funktioniert und welchen Nutzen sie Ihnen bringt. Vor allem wollen Sie sicherlich Ihr Budget einhalten und Kosten sparen, wo immer möglich. Das verstehen wir und wir möchten Ihnen dabei helfen!
Wir erklären Ihnen, wie Sie häufige Konfigurationsprobleme lösen können, die dazu führen können, dass mehr Benutzer gezählt werden als nötig, und wie Sie überflüssige oder ungenutzte Konten identifizieren und entfernen können, um Geld zu sparen. Es gibt auch einige Ansätze, die zu unnötigen Ausgaben führen können, z. B. wenn ein Personendokument anstelle eines Mail-Ins für geteilte Mailboxen verwendet wird. Wir zeigen Ihnen solche Fälle und deren Lösungen. Und natürlich erklären wir Ihnen das neue Lizenzmodell.
Nehmen Sie an diesem Webinar teil, bei dem HCL-Ambassador Marc Thomas und Gastredner Franz Walder Ihnen diese neue Welt näherbringen. Es vermittelt Ihnen die Tools und das Know-how, um den Überblick zu bewahren. Sie werden in der Lage sein, Ihre Kosten durch eine optimierte Domino-Konfiguration zu reduzieren und auch in Zukunft gering zu halten.
Diese Themen werden behandelt
- Reduzierung der Lizenzkosten durch Auffinden und Beheben von Fehlkonfigurationen und überflüssigen Konten
- Wie funktionieren CCB- und CCX-Lizenzen wirklich?
- Verstehen des DLAU-Tools und wie man es am besten nutzt
- Tipps für häufige Problembereiche, wie z. B. Team-Postfächer, Funktions-/Testbenutzer usw.
- Praxisbeispiele und Best Practices zum sofortigen Umsetzen
Introduction of Cybersecurity with OSS at Code Europe 2024Hiroshi SHIBATA
I develop the Ruby programming language, RubyGems, and Bundler, which are package managers for Ruby. Today, I will introduce how to enhance the security of your application using open-source software (OSS) examples from Ruby and RubyGems.
The first topic is CVE (Common Vulnerabilities and Exposures). I have published CVEs many times. But what exactly is a CVE? I'll provide a basic understanding of CVEs and explain how to detect and handle vulnerabilities in OSS.
Next, let's discuss package managers. Package managers play a critical role in the OSS ecosystem. I'll explain how to manage library dependencies in your application.
I'll share insights into how the Ruby and RubyGems core team works to keep our ecosystem safe. By the end of this talk, you'll have a better understanding of how to safeguard your code.
Digital Banking in the Cloud: How Citizens Bank Unlocked Their MainframePrecisely
Inconsistent user experience and siloed data, high costs, and changing customer expectations – Citizens Bank was experiencing these challenges while it was attempting to deliver a superior digital banking experience for its clients. Its core banking applications run on the mainframe and Citizens was using legacy utilities to get the critical mainframe data to feed customer-facing channels, like call centers, web, and mobile. Ultimately, this led to higher operating costs (MIPS), delayed response times, and longer time to market.
Ever-changing customer expectations demand more modern digital experiences, and the bank needed to find a solution that could provide real-time data to its customer channels with low latency and operating costs. Join this session to learn how Citizens is leveraging Precisely to replicate mainframe data to its customer channels and deliver on their “modern digital bank” experiences.
Generating privacy-protected synthetic data using Secludy and MilvusZilliz
During this demo, the founders of Secludy will demonstrate how their system utilizes Milvus to store and manipulate embeddings for generating privacy-protected synthetic data. Their approach not only maintains the confidentiality of the original data but also enhances the utility and scalability of LLMs under privacy constraints. Attendees, including machine learning engineers, data scientists, and data managers, will witness first-hand how Secludy's integration with Milvus empowers organizations to harness the power of LLMs securely and efficiently.
Conversational agents, or chatbots, are increasingly used to access all sorts of services using natural language. While open-domain chatbots - like ChatGPT - can converse on any topic, task-oriented chatbots - the focus of this paper - are designed for specific tasks, like booking a flight, obtaining customer support, or setting an appointment. Like any other software, task-oriented chatbots need to be properly tested, usually by defining and executing test scenarios (i.e., sequences of user-chatbot interactions). However, there is currently a lack of methods to quantify the completeness and strength of such test scenarios, which can lead to low-quality tests, and hence to buggy chatbots.
To fill this gap, we propose adapting mutation testing (MuT) for task-oriented chatbots. To this end, we introduce a set of mutation operators that emulate faults in chatbot designs, an architecture that enables MuT on chatbots built using heterogeneous technologies, and a practical realisation as an Eclipse plugin. Moreover, we evaluate the applicability, effectiveness and efficiency of our approach on open-source chatbots, with promising results.
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsDianaGray10
Join us to learn how UiPath Apps can directly and easily interact with prebuilt connectors via Integration Service--including Salesforce, ServiceNow, Open GenAI, and more.
The best part is you can achieve this without building a custom workflow! Say goodbye to the hassle of using separate automations to call APIs. By seamlessly integrating within App Studio, you can now easily streamline your workflow, while gaining direct access to our Connector Catalog of popular applications.
We’ll discuss and demo the benefits of UiPath Apps and connectors including:
Creating a compelling user experience for any software, without the limitations of APIs.
Accelerating the app creation process, saving time and effort
Enjoying high-performance CRUD (create, read, update, delete) operations, for
seamless data management.
Speakers:
Russell Alfeche, Technology Leader, RPA at qBotic and UiPath MVP
Charlie Greenberg, host
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...Alex Pruden
Folding is a recent technique for building efficient recursive SNARKs. Several elegant folding protocols have been proposed, such as Nova, Supernova, Hypernova, Protostar, and others. However, all of them rely on an additively homomorphic commitment scheme based on discrete log, and are therefore not post-quantum secure. In this work we present LatticeFold, the first lattice-based folding protocol based on the Module SIS problem. This folding protocol naturally leads to an efficient recursive lattice-based SNARK and an efficient PCD scheme. LatticeFold supports folding low-degree relations, such as R1CS, as well as high-degree relations, such as CCS. The key challenge is to construct a secure folding protocol that works with the Ajtai commitment scheme. The difficulty, is ensuring that extracted witnesses are low norm through many rounds of folding. We present a novel technique using the sumcheck protocol to ensure that extracted witnesses are always low norm no matter how many rounds of folding are used. Our evaluation of the final proof system suggests that it is as performant as Hypernova, while providing post-quantum security.
Paper Link: https://eprint.iacr.org/2024/257
What is an RPA CoE? Session 1 – CoE VisionDianaGray10
In the first session, we will review the organization's vision and how this has an impact on the COE Structure.
Topics covered:
• The role of a steering committee
• How do the organization’s priorities determine CoE Structure?
Speaker:
Chris Bolin, Senior Intelligent Automation Architect Anika Systems
HCL Notes and Domino License Cost Reduction in the World of DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-and-domino-license-cost-reduction-in-the-world-of-dlau/
The introduction of DLAU and the CCB & CCX licensing model caused quite a stir in the HCL community. As a Notes and Domino customer, you may have faced challenges with unexpected user counts and license costs. You probably have questions on how this new licensing approach works and how to benefit from it. Most importantly, you likely have budget constraints and want to save money where possible. Don’t worry, we can help with all of this!
We’ll show you how to fix common misconfigurations that cause higher-than-expected user counts, and how to identify accounts which you can deactivate to save money. There are also frequent patterns that can cause unnecessary cost, like using a person document instead of a mail-in for shared mailboxes. We’ll provide examples and solutions for those as well. And naturally we’ll explain the new licensing model.
Join HCL Ambassador Marc Thomas in this webinar with a special guest appearance from Franz Walder. It will give you the tools and know-how to stay on top of what is going on with Domino licensing. You will be able lower your cost through an optimized configuration and keep it low going forward.
These topics will be covered
- Reducing license cost by finding and fixing misconfigurations and superfluous accounts
- How do CCB and CCX licenses really work?
- Understanding the DLAU tool and how to best utilize it
- Tips for common problem areas, like team mailboxes, functional/test users, etc
- Practical examples and best practices to implement right away
Main news related to the CCS TSI 2023 (2023/1695)Jakub Marek
An English 🇬🇧 translation of a presentation to the speech I gave about the main changes brought by CCS TSI 2023 at the biggest Czech conference on Communications and signalling systems on Railways, which was held in Clarion Hotel Olomouc from 7th to 9th November 2023 (konferenceszt.cz). Attended by around 500 participants and 200 on-line followers.
The original Czech 🇨🇿 version of the presentation can be found here: https://www.slideshare.net/slideshow/hlavni-novinky-souvisejici-s-ccs-tsi-2023-2023-1695/269688092 .
The videorecording (in Czech) from the presentation is available here: https://youtu.be/WzjJWm4IyPk?si=SImb06tuXGb30BEH .
Programming Foundation Models with DSPy - Meetup SlidesZilliz
Prompting language models is hard, while programming language models is easy. In this talk, I will discuss the state-of-the-art framework DSPy for programming foundation models with its powerful optimizers and runtime constraint system.
Discover top-tier mobile app development services, offering innovative solutions for iOS and Android. Enhance your business with custom, user-friendly mobile applications.
In the realm of cybersecurity, offensive security practices act as a critical shield. By simulating real-world attacks in a controlled environment, these techniques expose vulnerabilities before malicious actors can exploit them. This proactive approach allows manufacturers to identify and fix weaknesses, significantly enhancing system security.
This presentation delves into the development of a system designed to mimic Galileo's Open Service signal using software-defined radio (SDR) technology. We'll begin with a foundational overview of both Global Navigation Satellite Systems (GNSS) and the intricacies of digital signal processing.
The presentation culminates in a live demonstration. We'll showcase the manipulation of Galileo's Open Service pilot signal, simulating an attack on various software and hardware systems. This practical demonstration serves to highlight the potential consequences of unaddressed vulnerabilities, emphasizing the importance of offensive security practices in safeguarding critical infrastructure.
2. AJENDA
User Account Management
User Privileges
Administrative Privileges
Database Access Privileges
Creating and Rename User Account
Drop User Account
Grant Privileges
Revoke Privileges
Routines and Triggers
2 out of 22
3. USER MANAGEMENT
To manage MySQL account for clients that connect to MySQL server
to access databases.
* The grant tables used to store account information.
* The SQL statements used for account management.
3 out of 22
4. USER ACCOUNT MANAGEMENT
In mysql the concept of account is combined with two things: a
user name and a host name.
When you connect to the server, it checks only the user name that
you specify, but also from what host you are connecting.
Format: ‘user_name’@ ‘host_name’
Ex: ‘rose’@‘localhost’
Account management statements such as CREATE
USER,GRANT,REVOKE OR SET PASSWORD.
4 out of 22
5. USER PRIVILEGES
It mean a special advantages is given to an user account like
select,insert,update,delete etc at different levels.
Two types of privileges, one is administrative privileges and
other is database privileges.
Administrative privileges access the account in mysql.
Database privilege control to access the data stored in
databases.
5 out of 22
8. CREATING & RENAME USER ACCOUNT
CREATE USER creates a new account and optionally assign it a
password.
It does not grant any privileges.
Syntax:
CREATE USER ‘USER_NAME’ @ ‘HOST_NAME’ IDENTIFIED BY
‘PASSWORD’;
-Ex: create user ‘rose’@ ‘localhost’ identified by ‘stem123’;
8 out of 22
9. CREATING & RENAME USER ACCOUNT
The above statement creates an account for rose@localhost and
assign the account a password of “stem123”.
Alternatively we can give GRANT to create the account and grant it
privileges at the same time.
-Ex: Grant all on *.* to ‘rose’@ ‘localhost’ identified by ‘stem123’;
To rename the user account use this statement as RENAME USER.
9 out of 22
10. CREATING & RENAME USER ACCOUNT
Syntax:
RENAME USER ‘old_user_name’@ ‘old_host_name’ To
‘new_user_name’@ ‘old_host_name’;
Ex: Rename user ‘rose’@ ‘localhost’ to ‘flower’@ ‘localhost’;
To check the created user in MySQL by using Select command.
Syntax:
SELECT USER,HOST FROM MYSQL.USER;
It will show the list of user with hostname in the user account.
10 out of 22
11. CREATING & RENAME USER ACCOUNT
How to set password for a user and change the password for a user.
Syntax:
SET PASSWORD for [‘USER_NAME’@ ‘HOST_NAME’]=PASSWORD(‘12345’);
After change the password to get update in that user account we
need to do flush privileges to get update.
Syntax:
FLUSH PRIVILEGES;
11 out of 22
12. DROP USER ACCOUNT
It deletes all records for the account from any grant table in which
they exist.
It revokes all privileges for an existing account and then removes
the account.
To revoke the privileges without removing the account itself, use
the revoke statement.
Syntax:
DROP USER ‘user_name’@ ‘host_name’;
Ex: drop user ‘flower’@ ‘localhost’;
12 out of 22
13. GRANT PRIVILEGES
It is use to give the authority for the mysql user accounts
databases.
To see grant privileges in an account.
Syntax: SHOW GRANTS;
Grant privileges can exists in different levels.
13 out of 22
14. GRANT PRIVILEGES
1)Global levels:
Any privileges can be granted globally. Global privileges are
quite powerful and are normally granted only administrative
accounts. Applied to all databases on a given server.
Syntax: GRANT ALL ON *.* to ‘user’@‘host_name’
Ex: grant all on *.* to ‘rose’@‘localhost’;
In this we can do insert, delete,update,etc in global level
statement.
14 out of 22
15. GRANT PRIVILEGES
2)Database level:
Some privileges are granted for specific databases:
ALTER,CREATE,CREATE TEMPORARY TABLES,CREATE VIEW,
DELETE, DROP, GRANT, OPTION,INDEX,INSERT,LOCK TABLES,
SELECT,SHOW VIEW AND UPDATE. A database level privileges
applies for all tables and stores routines in the databases.
Syntax: GRANT ALL ON DATABASE_NAME .* to ‘USER’@
‘HOST_NAME’;
Ex: grant all on redrose.* to ‘rose’@‘localhost’;
15 out of 22
16. GRANT PRIVILEGES
3)Table level:
Some privileges granted for specific tables:
ALTER,CREATE,DELETE,DROP,GRANT,OPTION,INDEX,INSERT,SELEC
T AND UPDATE. A table-level privilege applies to specific table in a
database.
Syntax: GRANT ALL ON DB_NAME.TABLE_NAME to ‘USER’@‘HOST_NAME’;
Ex: grant all on redrose.price to ‘rose’@‘localhost’;
16 out of 22
17. GRANT PRIVILEGES
4)Column level:
Some privileges granted for specific table columns:
INSERT,SELECT AND UPDATE.
Syntax: GRANT ALL ON DB_NAME.TBLE_NAME.COLUMN_NAME TO
‘USER’@‘HOST_NAME’;
Ex: grant all on redrose.price.low to ‘rose’@ ‘localhost’;
5)Routine level:
Some privileges can be granted for specific stored routines:
EXECUTE,ALTER,ROUTINE AND GRANT OPTION.
17 out of 22
18. REVOKE PRIVILEGES
It enables system administrators to revoke privileges from MySQL
accounts(Break the rules and regulations that given by GRANT to the
user account).
Syntax: REVOKE privilege_type [(column_list)] ,[priv_type
[(column_list)]]...ON [object_type] privilege_level FROM user [‘user’]
Ex: revoke all privileges, grant option from‘rose’@‘localhost’;
18 out of 22
19. ROUTINES AND TRIGGERS
Routines (otherwise known as stored procedures and stored
functions).
When used in conjunction with each other MySQL stored procedures
and triggers will provide a database that all but runs itself.
A MySQL stored procedure is a block of code stored on the server
will normally carry out a series of SQL statements.
19 out of 22
20. ROUTINES AND TRIGGERS
This is particularly useful because:
client applications need to know nothing about the structure or the
content of a database - they just need to know how to run any
MySQL stored procedures
any changes in procedures can be made via the stored procedures -
those changes will automatically be used by client applications
without the need to modify the applications
A stored procedure can only be run by some one or something and
that's where the MySQL trigger is used.
20 out of 22
21. ROUTINES AND TRIGGERS
A MySQL trigger is a piece of code that fires whenever something
happens to a table, and that something can be one of three table
events.
Delete - the trigger fires if something is deleted from table.
Insert - the trigger fires if something is inserted into the table.
Update - the trigger fires if the table is updated.
There is a further refinement as well - the trigger may be fired:
Before the event occurs.
After the event occurs.
21 out of 22