--- hide: - toc --- # basic concept The glossary on this page defines the core concepts behind MySQL to help you build a mental model of how MySQL works and understand what the documentation refers to when it uses certain terms. - ACID compliance ACID compliance is an acronym for the four words Atomiciy, Consistency, Isolation, and Durability, and is a set of database characteristics consisting of atomicity, consistency, isolation, and durability that ensure efficient completion of database transactions. - ACLs Access Control Lists or ACLs are lists of user permissions that control access to system resources. - Connection Status Metric (connection status metric) The connection state metric is a measure of the number of threads created, connected, and running relative to the database connection limit. - DBaaS (Database as a Service) Database as a Service, Managed Database Service, or DBaaS for short, is a cloud service that allows users to access cloud database systems on a subscription basis without owning a personal cloud data system. -E2EE The English full name is End-to-end encryption, which is end-to-end encryption, or E2EE for short, is a communication system that encrypts messages and message services for everyone, except the user who receives the message and the user who sends the message. - Failover Failover is a high availability (HA) mechanism that monitors servers for failure and reroutes traffic or operations to a standby server if the primary server fails. - High Availability High Availability (HA) is an infrastructure design approach focused on reducing downtime and eliminating single points of failure. - Hot Standby Hot standby is the act of listening for when a primary node fails so that a standby node can take its place. - Index vs. Sequential Reads Metric (index and sequential read metrics) The Index vs. Sequential Reads metric graph shows reads using indexes as a proportion of the total reads for all databases (schemas) on the master. - LUKS Disk Encryption (LUKS Disk Encryption) Linux Unified Key Set Disk Encryption (LUKS) is an open source disk encryption specification for Linux storage devices. - Machine Type A machine type is a group of virtualized hardware resources for a virtual machine (VM) instance. - Node Plan (node ​​plan) A node plan, database or cluster configuration is a hardware plan for a node specification. - Operations Throughput Metric The Operational Throughput metric is a measure of the throughput of get, insert, update, and delete operations for all databases on the server. - Point-In-Time-Recovery (recovery point in time) Point-in-time recovery, or PITR for short, ensures that automatic backups are made so that data created in a previous state of the server can be recovered. - Port A port is a communication endpoint for a network connection. A port is identified by the port number used by each transport protocol. - Read-Only Node (read-only node) Read-only nodes are replicas of the cluster master. - SQL Mode SQL mode or sql_mode is a MySQL system variable used to configure the operational characteristics of the MySQL server. - SSL Certificate An SSL certificate is a digital certificate that describes a website's identity. - Standby Node A standby node is a node that is set to be idle while in hot standby mode. - Tag Tags are keywords associated with resources that help manage resource ownership and organize finding and manipulating resources.