The glossary on this page defines the core concepts behind MySQL to help you build a mental model of how MySQL works and understand what the documentation refers to when it uses certain terms.
ACID compliance
ACID compliance is an acronym for the four words Atomiciy, Consistency, Isolation, and Durability, and is a set of database characteristics consisting of atomicity, consistency, isolation, and durability that ensure efficient completion of database transactions.
ACLs
Access Control Lists or ACLs are lists of user permissions that control access to system resources.
Connection Status Metric (connection status metric)
The connection state metric is a measure of the number of threads created, connected, and running relative to the database connection limit.
DBaaS (Database as a Service)
Database as a Service, Managed Database Service, or DBaaS for short, is a cloud service that allows users to access cloud database systems on a subscription basis without owning a personal cloud data system.
-E2EE
The English full name is End-to-end encryption, which is end-to-end encryption, or E2EE for short, is a communication system that encrypts messages and message services for everyone, except the user who receives the message and the user who sends the message.
Failover
Failover is a high availability (HA) mechanism that monitors servers for failure and reroutes traffic or operations to a standby server if the primary server fails.
High Availability
High Availability (HA) is an infrastructure design approach focused on reducing downtime and eliminating single points of failure.
Hot Standby
Hot standby is the act of listening for when a primary node fails so that a standby node can take its place.
Index vs. Sequential Reads Metric (index and sequential read metrics)
The Index vs. Sequential Reads metric graph shows reads using indexes as a proportion of the total reads for all databases (schemas) on the master.
LUKS Disk Encryption (LUKS Disk Encryption)
Linux Unified Key Set Disk Encryption (LUKS) is an open source disk encryption specification for Linux storage devices.
Machine Type
A machine type is a group of virtualized hardware resources for a virtual machine (VM) instance.
Node Plan (node plan)
A node plan, database or cluster configuration is a hardware plan for a node specification.
Operations Throughput Metric
The Operational Throughput metric is a measure of the throughput of get, insert, update, and delete operations for all databases on the server.
Point-In-Time-Recovery (recovery point in time)
Point-in-time recovery, or PITR for short, ensures that automatic backups are made so that data created in a previous state of the server can be recovered.
Port
A port is a communication endpoint for a network connection. A port is identified by the port number used by each transport protocol.
Read-Only Node (read-only node)
Read-only nodes are replicas of the cluster master.
SQL Mode
SQL mode or sql_mode is a MySQL system variable used to configure the operational characteristics of the MySQL server.
SSL Certificate
An SSL certificate is a digital certificate that describes a website's identity.
Standby Node
A standby node is a node that is set to be idle while in hot standby mode.
Tag
Tags are keywords associated with resources that help manage resource ownership and organize finding and manipulating resources.