basic concept¶
The glossary on this page defines the core concepts behind MySQL to help you build a mental model of how MySQL works and understand what the documentation refers to when it uses certain terms.
-  ACID compliance ACID compliance is an acronym for the four words Atomiciy, Consistency, Isolation, and Durability, and is a set of database characteristics consisting of atomicity, consistency, isolation, and durability that ensure efficient completion of database transactions. 
-  ACLs Access Control Lists or ACLs are lists of user permissions that control access to system resources. 
-  Connection Status Metric (connection status metric) The connection state metric is a measure of the number of threads created, connected, and running relative to the database connection limit. 
-  DBaaS (Database as a Service) Database as a Service, Managed Database Service, or DBaaS for short, is a cloud service that allows users to access cloud database systems on a subscription basis without owning a personal cloud data system. 
-E2EE
The English full name is End-to-end encryption, which is end-to-end encryption, or E2EE for short, is a communication system that encrypts messages and message services for everyone, except the user who receives the message and the user who sends the message.
-  Failover Failover is a high availability (HA) mechanism that monitors servers for failure and reroutes traffic or operations to a standby server if the primary server fails. 
-  High Availability High Availability (HA) is an infrastructure design approach focused on reducing downtime and eliminating single points of failure. 
-  Hot Standby Hot standby is the act of listening for when a primary node fails so that a standby node can take its place. 
-  Index vs. Sequential Reads Metric (index and sequential read metrics) The Index vs. Sequential Reads metric graph shows reads using indexes as a proportion of the total reads for all databases (schemas) on the master. 
-  LUKS Disk Encryption (LUKS Disk Encryption) Linux Unified Key Set Disk Encryption (LUKS) is an open source disk encryption specification for Linux storage devices. 
-  Machine Type A machine type is a group of virtualized hardware resources for a virtual machine (VM) instance. 
-  Node Plan (node plan) A node plan, database or cluster configuration is a hardware plan for a node specification. 
-  Operations Throughput Metric The Operational Throughput metric is a measure of the throughput of get, insert, update, and delete operations for all databases on the server. 
-  Point-In-Time-Recovery (recovery point in time) Point-in-time recovery, or PITR for short, ensures that automatic backups are made so that data created in a previous state of the server can be recovered. 
-  Port A port is a communication endpoint for a network connection. A port is identified by the port number used by each transport protocol. 
-  Read-Only Node (read-only node) Read-only nodes are replicas of the cluster master. 
-  SQL Mode SQL mode or sql_mode is a MySQL system variable used to configure the operational characteristics of the MySQL server. 
-  SSL Certificate An SSL certificate is a digital certificate that describes a website's identity. 
-  Standby Node A standby node is a node that is set to be idle while in hot standby mode. 
-  Tag Tags are keywords associated with resources that help manage resource ownership and organize finding and manipulating resources.