The Vitess 5.0 Documentationas master . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 176 User Guides . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 201 User and Permission Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . shards. The keyspace ID itself is computed using a function of some column in your data, such as the user ID. Vitess allows you to choose from a variety of functions (vindexes) to perform this mapping. This0 码力 | 206 页 | 875.06 KB | 1 年前3
The Vitess 6.0 Documentationas master . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 168 User Guides . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 201 User and Permission Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . shards. The keyspace ID itself is computed using a function of some column in your data, such as the user ID. Vitess allows you to choose from a variety of functions (vindexes) to perform this mapping. This0 码力 | 210 页 | 846.79 KB | 1 年前3
The Vitess 7.0 Documentationas master . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 204 User Guides . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 245 User and Permission Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . a root node. The root node produces the final results of the query and delivers the results to the user. Observing Execution Plans Cached execution plans can be observed at the VTGate level by browsing0 码力 | 254 页 | 949.63 KB | 1 年前3
The Vitess 11.0 Documentation. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 123 User-facing DROP TABLE lifecycle . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . master . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 307 13 User Guides . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . commerce keyspace . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 344 User Management and Authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .0 码力 | 481 页 | 3.14 MB | 1 年前3
The Vitess 10.0 Documentation
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 112 7 User-facing DROP TABLE lifecycle . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . as master . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 285 User Guides . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . commerce keyspace . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 322 User Management and Authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .0 码力 | 455 页 | 3.07 MB | 1 年前3
The Vitess 8.0 DocumentationTABLE 70 Vitess table lifecycle 70 Lifecycle subsets and configuration 71 Automated lifecycle 71 User-facing DROP TABLE lifecycle 71 Tablet throttler . . . . . . . . . . . . . . . . . . . . . . . . as master . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 225 User Guides . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 225 description: User guides covering advanced configuration concepts . . . . . . . . . . . . . . . . . . . . . . . . .0 码力 | 331 页 | 1.35 MB | 1 年前3
The Vitess 9.0 Documentation. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 102 User-facing DROP TABLE lifecycle . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . as master . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 266 User Guides . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . commerce keyspace . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 303 User Management and Authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .0 码力 | 417 页 | 2.96 MB | 1 年前3
The Vitess 12.0 Documentationas primary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 329 User Guides . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . commerce keyspace . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 386 User Management and Authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 420 description: User guides for features in older version of Vitess . . . . . . . . . . . . . . . . . . . . . . . . .0 码力 | 534 页 | 3.32 MB | 1 年前3
Vitess security auditfunctions”. These two issues allowed a malicious user to create a resource that would then subsequently disallow other operations for other users. For example, a user could create a malicious shard that would The issues were more significant for Vitess deployments that include the VTAdmin component, since a user with the lowest level of privileges in VTAdmin could cause denial of service for all other users in can. VTAdmin consists of two components: 1. A web interface - VTAdmin-web 2. A server - VTAdmin-api 5 Vitess Security Audit, 2023 The web interface connects to the server which in turn forwards the0 码力 | 41 页 | 1.10 MB | 1 年前3
Pentest-Report Vitess 02.2019analyzed for common vulnerabilities like SQL injection or XSS. However, in all encountered cases the user-input was found to be correctly sanitized, in particular due to the Angular framework’s proper handling the secure premise is that the attacker would need to obtain the hashes contained in the user-table prior to the attack. A minor issue was filed as VIT-01- 001 to describe the exact circumstances endpoints allow execution of the SQL statements either as the Database administrator or the Application user. The testers sought to escalate the privilege level in a futile attempt to execute commands as root0 码力 | 9 页 | 155.02 KB | 1 年前3
共 12 条
- 1
- 2













