bionic (1) mysqlauditgrep.1.gz

Provided by: mysql-utilities_1.6.4-1_all bug

NAME

       mysqlauditgrep - Search an audit log

SYNOPSIS

        mysqlauditgrep [OPTIONS]... AUDIT_LOG_FILE
        mysqlauditgrep --file-stats[--format=FORMAT] AUDIT_LOG_FILE
        mysqlauditgrep --format=FORMAT AUDIT_LOG_FILE
        mysqlauditgrep [--users=USERS] [--start-date=START_DATE] [--end-date=END_DATE]
       [--pattern=PATTERN[--regexp]] [--query-type=QUERY_TYPE] [--event-type=EVENT_TYPE] [--status=STATUS]
       [--format=FORMAT] AUDIT_LOG_FILE

DESCRIPTION

       This utility allows you to search the current or archived audit logs permitting you to display data from
       the audit log file according to the defined search criterion. It also allows you to output the results in
       different formats, namely GRID (default), TAB, CSV, VERTICAL, and RAW (the original XML format).

       This utility allows you to search and filter the returned audit log records by: users (--users), date and
       time ranges (--start-date and --end-date), SQL query types (--query-type), logged event and record types
       (--event-type), status (--status), and matching patterns (--pattern). Any of these search options can be
       combined and used together, with the retrieved records resulting from all options evaluated as an and
       condition (all must be true).

       The --pattern supports two types of pattern matching: standard SQL, used with the SQL LIKE operator (SQL
       patterns), and standard REGEXP (POSIX regular expression patterns).

       This utility always requires an audit log file. The AUDIT_LOG_FILE argument should contain the a full
       path and filename for the audit log file. If not specified, a notification concerning this requirement
       will be printed. If --format is specified without search parameters, all of the records of the audit log
       are displayed in the specified format. Thus, you can use this feature to view the audit log file in the
       supported formats.

       The --file-stats option is not considered a search criteria and is used to display the file statistics of
       a specified audit log. Other search options will be ignored when the --file-stats option is used, except
       the --format option will continue to format the results accordingly.

       To specify the format of the generated results, use one of the following values with the --format option:

       •   GRID (default)

           Display output in grid or table format like that of the mysql client command-line tool.

       •   CSV

           Display output in comma-separated values format.

       •   VERTICAL

           Display output in single-column format like that of the \G command for the mysql client command-line
           tool.

       •   RAW

           Display output results in the original raw format of the audit log records, which is written in XML.
       Standard SQL Pattern Matching.PP The simple patterns defined by the SQL standard enables users to use two
       characters with special meanings: “%” (percent) matches zero or more characters, and “_” (underscore)
       matches exactly one arbitrary character. In standard SQL, these types of patterns are used with the LIKE
       comparison operator, and they are case-insensitive by default. This utility assumes that they are
       case-insensitive.

       For example:

       •   "audit%"

           Match any string that starts with "audit".

       •   "%log%"

           Match any string containing the word "log".

       •   "%_"

           Match any string consisting of one or more characters.

       For documentation about the standard SQL pattern matching syntax, see Pattern Matching[1].  REGEXP
       Pattern Matching (POSIX).PP Standard REGEXP patterns are more powerful than the simple patterns defined
       in the SQL standard. A regular expression is a string of ordinary and special characters specified to
       match other strings. Unlike SQL Patterns, REGEXP patterns are case-sensitive. The REGEXP syntax defines
       the following characters with special meaning:

       •   .

           Match any character.

       •   ^

           Match the beginning of a string.

       •   $

           Match the end of a string.

       •   \

           Match zero or more repetitions of the preceding regular expression.

       •   +

           Match one or more repetitions of the preceding regular expression.

       •   ?

           Match zero or one repetition of the preceding regular expression.

       •   |

           Match either the regular expressions from the left or right of |.

       •   []

           Indicates a set of characters to match.

               Note
               Special characters lose their special meaning inside sets. In particular, the caret symbol (^)
               acquires a different meaning if it is the first character of the set, matching the complementary
               set (i.e., all the characters that are not in the set will be matched).

       •   {m}

           Match m repetitions of the preceding regular expression.

       •   {m,n}

           Match from m to n repetitions of the preceding regular expression.

       •   ()

           Define a matching group, and matches the regular expression inside the parentheses.

       For example:

       •   "a\*"

           Match a sequence of zero or more a.

       •   "a+"

           Match a sequence of one or more a.

       •   "a?"

           Match zero or one a.

       •   "ab|cd"

           Match ab or cd.

       •   "[axy]"

           Match a, x or y.

       •   "[a-f]"

           Match any character in the range a to f (that is, a, b, c, d, e, or f).

       •   "[^axy]"

           Match any character except a, x or y.

       •   "a{5}"

           Match exactly five copies of a.

       •   "a{2,5}"

           Match from two to five copies of a.

       •   "(abc)+"

           Match one or more repetitions of abc.

       This is a brief overview of regular expressions that can be used to define this type of patterns. The
       full syntax is described in the Python "re" module docs[2], supporting the definition of much more
       complex pattern matching expression.  OPTIONS.PP mysqlauditgrep accepts the following command-line
       options:

       •   --end-date=<END_DATE>

           End date/time to retrieve log entries until the specified date/time range. If not specified or the
           value is 0, all entries to the end of the log are displayed. Accepted formats: "yyyy-mm-ddThh:mm:ss"
           or "yyyy-mm-dd".

       •   --event-type=<EVENT_TYPE>

           Comma-separated list of event types to search in all audit log records matching the specified types.
           Supported values are: Audit, Binlog Dump, Change user, Close stmt, Connect Out, Connect, Create DB,
           Daemon, Debug, Delayed insert, Drop DB, Execute, Fetch, Field List, Init DB, Kill, Long Data,
           NoAudit, Ping, Prepare, Processlist, Query, Quit, Refresh, Register Slave, Reset stmt, Set option,
           Shutdown, Sleep, Statistics, Table Dump, Time.

       •   --file-stats

           Display the audit log file statistics.

       •   --format=FORMAT, -f FORMAT

           Output format to display the resulting data. Supported format values: GRID (default), TAB, CSV,
           VERTICAL and RAW.

       •   --help

           Display a help message and exit.

       •   --license

           Display license information and exit.

       •   --pattern=<PATTERN>, -e <PATTERN>

           Search pattern to retrieve all entries with at least one attribute value matching the specified
           pattern. By default the standard SQL LIKE patterns are used for matching. If the --regexp option is
           set, then REGEXP patterns must be specified for matching.

       •   --query-type=<QUERY_TYPE>

           Comma-separated list of SQL statements/commands to search for and match. Supported values: CREATE,
           ALTER, DROP, TRUNCATE, RENAME, GRANT, REVOKE, SELECT, INSERT, UPDATE, DELETE, COMMIT, SHOW, SET,
           CALL, PREPARE, EXECUTE, DEALLOCATE.

       •   --regexp, --basic-regexp, -G

           Indicates that pattern matching will be performed using a regular expression REGEXP (from the Python
           re module). By default, the simple standard SQL LIKE patterns are used for matching. This affects how
           the value specified by the --pattern option is interpreted.

       •   --start-date=<START_DATE>

           Starting date/time to retrieve log entries from the specified date/time range. If not specified or
           the value is 0, all entries from the start of the log are displayed. Accepted formats:
           yyyy-mm-ddThh:mm:ss or yyyy-mm-dd.

       •   --status=<STATUS>

           Comma-separated list of status values or intervals to search for all audit log records with a
           matching status. Status values are non-negative integers (corresponding to MySQL error codes). Status
           intervals are closed (i.e., include both endpoints) and defined simply using a dash between its
           endpoints. For Example: 1051,1068-1075,1109,1146.

           The --status option is available as of MySQL Utilities 1.2.4 / 1.3.3.

       •   --users=<USERS>, -u <USERS>

           Comma-separated list of user names, to search for their associated log entries. For example:
           "dan,jon,john,paul,philip,stefan".

       •   --verbose, -v

           Specify how much information to display. Use this option multiple times to increase the amount of
           information. For example, -v = verbose, -vv = more verbose, -vvv = debug.

       •   --version

           Display version information and exit.
       NOTES.PP This utility is available as of MySQL Utilities 1.2.0.

       This utility can only be applied to servers with the audit log plugin enabled. And the audit log plugin
       is available as of MySQL Server versions 5.5.28 and 5.6.10.

       This utility support both of the existing audit log file formats (old and new). The new audit log format
       is supported as of MySQL Utilities 1.4.3. See The Audit Log File[3], for more information about available
       file formats.

       This utility requires the use of Python version 2.6 or higher, but does not support Python 3.

       Single or double quote characters (respectively, ' or ") can be used around option values. In fact,
       quotes are required to set some options values correctly, such as values with whitespace. For example, to
       specify the event types Create DB and Drop DB for the --event-type option, the following syntax must be
       used: --event-type='Create DB,Drop DB' or --event-type="Create DB,Drop DB".  EXAMPLES.PP To display the
       audit log file statistics and output the results in CSV format, run the following command:

           shell> mysqlauditgrep --file-stats --format=CSV /SERVER/data/audit.log
             #
             # Audit Log File Statistics:
             #
             File,Size,Created,Last Modified
             audit.log,9101,Thu Sep 27 13:33:11 2012,Thu Oct 11 17:40:35 2012
             #
             # Audit Log Startup Entries:
             #
             SERVER_ID,STARTUP_OPTIONS,NAME,TIMESTAMP,MYSQL_VERSION,OS_VERSION,VERSION
             1,/SERVER/sql/mysqld --defaults-file=/SERVER/my.cnf,Audit,2012-09-27T13:33:11,5.5.29-log,x86_64-Linux,1

       To display the audit log entries of specific users, use the following command:

           shell> mysqlauditgrep --users=tester1,tester2 /SERVER/data/audit.log

       To display the audit log file statistics, run the following command:

           shell> mysqlauditgrep --users=tester1,tester2 /SERVER/data/audit.log
             +---------+------------+----------+----------------------+----------------+------------+----------+------------+------------+----------------------------------+
             | STATUS  | SERVER_ID  | NAME     | TIMESTAMP            | CONNECTION_ID  | HOST       | USER     | PRIV_USER  | IP         | SQLTEXT                          |
             +---------+------------+----------+----------------------+----------------+------------+----------+------------+------------+----------------------------------+
             | 0       | 1          | Connect  | 2012-09-28T11:26:50  | 9              | localhost  | root     | tester1    | 127.0.0.1  | None                             |
             | 0       | 1          | Query    | 2012-09-28T11:26:50  | 9              | None       | root     | tester1    | None       | SET @@session.autocommit = OFF   |
             | 0       | 1          | Ping     | 2012-09-28T11:26:50  | 9              | None       | root     | tester1    | None       | None                             |
             | 0       | 1          | Query    | 2012-09-28T11:26:50  | 9              | None       | root     | tester1    | None       | SHOW VARIABLES LIKE 'READ_ONLY'  |
             | 0       | 1          | Query    | 2012-09-28T11:26:50  | 9              | None       | root     | tester1    | None       | COMMIT                           |
             | 0       | 1          | Ping     | 2012-09-28T11:26:50  | 9              | None       | root     | tester1    | None       | None                             |
             | 0       | 1          | Query    | 2012-09-28T11:26:50  | 9              | None       | root     | tester1    | None       | COMMIT                           |
             | 0       | 1          | Quit     | 2012-09-28T11:26:50  | 9              | None       | root     | tester1    | None       | None                             |
             | 0       | 1          | Connect  | 2012-10-10T15:55:55  | 11             | localhost  | tester2  | root       | 127.0.0.1  | None                             |
             | 0       | 1          | Query    | 2012-10-10T15:55:55  | 11             | None       | tester2  | root       | None       | select @@version_comment limit 1 |
             | 0       | 1          | Query    | 2012-10-10T15:56:10  | 11             | None       | tester2  | root       | None       | show databases                   |
             | 1046    | 1          | Query    | 2012-10-10T15:57:26  | 11             | None       | tester2  | root       | None       | show tables test                 |
             | 1046    | 1          | Query    | 2012-10-10T15:57:36  | 11             | None       | tester2  | root       | None       | show tables test                 |
             | 0       | 1          | Query    | 2012-10-10T15:57:51  | 11             | None       | tester2  | root       | None       | show tables in test              |
             | 0       | 1          | Quit     | 2012-10-10T15:57:59  | 11             | None       | tester2  | root       | None       | None                             |
             | 0       | 1          | Connect  | 2012-10-10T17:35:42  | 12             | localhost  | tester2  | root       | 127.0.0.1  | None                             |
             | 0       | 1          | Query    | 2012-10-10T17:35:42  | 12             | None       | tester2  | root       | None       | select @@version_comment limit 1 |
             | 0       | 1          | Quit     | 2012-10-10T17:47:22  | 12             | None       | tester2  | root       | None       | None                             |
             +---------+------------+----------+----------------------+----------------+------------+----------+------------+------------+----------------------------------+

       To display the audit log entries for a specific date/time range, use the following command:

           shell> mysqlauditgrep --start-date=2012-09-27T13:33:47 --end-date=2012-09-28 /SERVER/data/audit.log
             +---------+----------------------+--------+----------------+---------------------------------------------------------------------------+
             | STATUS  | TIMESTAMP            | NAME   | CONNECTION_ID  | SQLTEXT                                                                   |
             +---------+----------------------+--------+----------------+---------------------------------------------------------------------------+
             | 0       | 2012-09-27T13:33:47  | Ping   | 7              | None                                                                      |
             | 0       | 2012-09-27T13:33:47  | Query  | 7              | SELECT * FROM INFORMATION_SCHEMA.PLUGINS WHERE PLUGIN_NAME LIKE 'audit%'  |
             | 0       | 2012-09-27T13:33:47  | Query  | 7              | COMMIT                                                                    |
             | 0       | 2012-09-27T13:34:48  | Quit   | 7              | None                                                                      |
             | 0       | 2012-09-27T13:34:48  | Quit   | 8              | None                                                                      |
             +---------+----------------------+--------+----------------+---------------------------------------------------------------------------+

       To display the audit log entries matching a specific SQL LIKE pattern, use the following command:

           shell> mysqlauditgrep --pattern="% = ___"; /SERVER/data/audit.log
             +---------+----------------------+--------+---------------------------------+----------------+
             | STATUS  | TIMESTAMP            | NAME   | SQLTEXT                         | CONNECTION_ID  |
             +---------+----------------------+--------+---------------------------------+----------------+
             | 0       | 2012-09-27T13:33:39  | Query  | SET @@session.autocommit = OFF  | 7              |
             | 0       | 2012-09-27T13:33:39  | Query  | SET @@session.autocommit = OFF  | 8              |
             | 0       | 2012-09-28T11:26:50  | Query  | SET @@session.autocommit = OFF  | 9              |
             | 0       | 2012-09-28T11:26:50  | Query  | SET @@session.autocommit = OFF  | 10             |
             +---------+----------------------+--------+---------------------------------+----------------+

       To display the audit log entries matching a specific REGEXP pattern, use the following command:

           shell> mysqlauditgrep --pattern=".* = ..." --regexp /SERVER/data/audit.log
             +---------+----------------------+--------+---------------------------------+----------------+
             | STATUS  | TIMESTAMP            | NAME   | SQLTEXT                         | CONNECTION_ID  |
             +---------+----------------------+--------+---------------------------------+----------------+
             | 0       | 2012-09-27T13:33:39  | Query  | SET @@session.autocommit = OFF  | 7              |
             | 0       | 2012-09-27T13:33:39  | Query  | SET @@session.autocommit = OFF  | 8              |
             | 0       | 2012-09-28T11:26:50  | Query  | SET @@session.autocommit = OFF  | 9              |
             | 0       | 2012-09-28T11:26:50  | Query  | SET @@session.autocommit = OFF  | 10             |
             +---------+----------------------+--------+---------------------------------+----------------+

       To display the audit log entries of specific query types, use the following command:

           shell> mysqlauditgrep --query-type=show,SET /SERVER/data/audit.log
             +---------+----------------------+--------+-------------------------------------------------+----------------+
             | STATUS  | TIMESTAMP            | NAME   | SQLTEXT                                         | CONNECTION_ID  |
             +---------+----------------------+--------+-------------------------------------------------+----------------+
             | 0       | 2012-09-27T13:33:39  | Query  | SET NAMES 'latin1' COLLATE 'latin1_swedish_ci'  | 7              |
             | 0       | 2012-09-27T13:33:39  | Query  | SET @@session.autocommit = OFF                  | 7              |
             | 0       | 2012-09-27T13:33:39  | Query  | SHOW VARIABLES LIKE 'READ_ONLY'                 | 7              |
             | 0       | 2012-09-27T13:33:39  | Query  | SHOW VARIABLES LIKE 'datadir'                   | 7              |
             | 0       | 2012-09-27T13:33:39  | Query  | SHOW VARIABLES LIKE 'basedir'                   | 7              |
             | 0       | 2012-09-27T13:33:39  | Query  | SET NAMES 'latin1' COLLATE 'latin1_swedish_ci'  | 8              |
             | 0       | 2012-09-27T13:33:39  | Query  | SET @@session.autocommit = OFF                  | 8              |
             | 0       | 2012-09-27T13:33:39  | Query  | SHOW VARIABLES LIKE 'READ_ONLY'                 | 8              |
             | 0       | 2012-09-27T13:33:39  | Query  | SHOW VARIABLES LIKE 'basedir'                   | 8              |
             | 0       | 2012-09-28T11:26:50  | Query  | SET NAMES 'latin1' COLLATE 'latin1_swedish_ci'  | 9              |
             | 0       | 2012-09-28T11:26:50  | Query  | SET @@session.autocommit = OFF                  | 9              |
             | 0       | 2012-09-28T11:26:50  | Query  | SHOW VARIABLES LIKE 'READ_ONLY'                 | 9              |
             | 0       | 2012-09-28T11:26:50  | Query  | SET NAMES 'latin1' COLLATE 'latin1_swedish_ci'  | 10             |
             | 0       | 2012-09-28T11:26:50  | Query  | SET @@session.autocommit = OFF                  | 10             |
             | 0       | 2012-09-28T11:26:50  | Query  | SHOW VARIABLES LIKE 'READ_ONLY'                 | 10             |
             | 0       | 2012-09-28T11:26:50  | Query  | SET @@GLOBAL.audit_log_flush = ON               | 10             |
             | 0       | 2012-09-28T11:26:50  | Query  | SHOW VARIABLES LIKE 'audit_log_policy'          | 10             |
             | 0       | 2012-09-28T11:26:50  | Query  | SHOW VARIABLES LIKE 'audit_log_rotate_on_size'  | 10             |
             | 0       | 2012-10-10T15:56:10  | Query  | show databases                                  | 11             |
             | 1046    | 2012-10-10T15:57:26  | Query  | show tables test                                | 11             |
             | 1046    | 2012-10-10T15:57:36  | Query  | show tables test                                | 11             |
             | 0       | 2012-10-10T15:57:51  | Query  | show tables in test                             | 11             |
             +---------+----------------------+--------+-------------------------------------------------+----------------+

       To display the audit log entries of specific event types, use the following command:

           shell> mysqlauditgrep --event-type="Ping,Connect" /SERVER/data/audit.log
             +---------+----------+----------------------+----------------+------------+---------+------------+------------+
             | STATUS  | NAME     | TIMESTAMP            | CONNECTION_ID  | HOST       | USER    | PRIV_USER  | IP         |
             +---------+----------+----------------------+----------------+------------+---------+------------+------------+
             | 0       | Connect  | 2012-09-27T13:33:39  | 7              | localhost  | root    | root       | 127.0.0.1  |
             | 0       | Ping     | 2012-09-27T13:33:39  | 7              | None       | None    | None       | None       |
             | 0       | Ping     | 2012-09-27T13:33:39  | 7              | None       | None    | None       | None       |
             | 0       | Ping     | 2012-09-27T13:33:39  | 7              | None       | None    | None       | None       |
             | 0       | Ping     | 2012-09-27T13:33:39  | 7              | None       | None    | None       | None       |
             | 0       | Connect  | 2012-09-27T13:33:39  | 8              | localhost  | root    | root       | 127.0.0.1  |
             | 0       | Ping     | 2012-09-27T13:33:39  | 8              | None       | None    | None       | None       |
             | 0       | Ping     | 2012-09-27T13:33:39  | 8              | None       | None    | None       | None       |
             | 0       | Ping     | 2012-09-27T13:33:47  | 7              | None       | None    | None       | None       |
             | 0       | Connect  | 2012-09-28T11:26:50  | 9              | localhost  | root    | tester     | 127.0.0.1  |
             | 0       | Ping     | 2012-09-28T11:26:50  | 9              | None       | None    | None       | None       |
             | 0       | Ping     | 2012-09-28T11:26:50  | 9              | None       | None    | None       | None       |
             | 0       | Connect  | 2012-09-28T11:26:50  | 10             | localhost  | root    | root       | 127.0.0.1  |
             | 0       | Ping     | 2012-09-28T11:26:50  | 10             | None       | None    | None       | None       |
             | 0       | Ping     | 2012-09-28T11:26:50  | 10             | None       | None    | None       | None       |
             | 0       | Ping     | 2012-09-28T11:26:50  | 10             | None       | None    | None       | None       |
             | 0       | Ping     | 2012-09-28T11:26:50  | 10             | None       | None    | None       | None       |
             | 0       | Ping     | 2012-09-28T11:26:50  | 10             | None       | None    | None       | None       |
             | 0       | Connect  | 2012-10-10T15:55:55  | 11             | localhost  | tester  | root       | 127.0.0.1  |
             | 0       | Connect  | 2012-10-10T17:35:42  | 12             | localhost  | tester  | root       | 127.0.0.1  |
             +---------+----------+----------------------+----------------+------------+---------+------------+------------+

       To display the audit log entries with a specific status, use the following command:

           shell> mysqlauditgrep --status=1100-1199,1046 /SERVER/data/audit.log
             +---------+----------------------+--------+---------------------------------------------------------------------+----------------+
             | STATUS  | TIMESTAMP            | NAME   | SQLTEXT                                                             | CONNECTION_ID  |
             +---------+----------------------+--------+---------------------------------------------------------------------+----------------+
             | 1046    | 2012-10-10T15:57:26  | Query  | show tables test                                                    | 11             |
             | 1046    | 2012-10-10T15:57:36  | Query  | show tables test                                                    | 11             |
             | 1146    | 2012-10-10T17:44:55  | Query  | select * from test.employees where salary > 500 and salary < 1000   | 12             |
             | 1046    | 2012-10-10T17:47:17  | Query  | select * from test_encoding where value = '<>"&'                    | 12             |
             +---------+----------------------+--------+---------------------------------------------------------------------+----------------+

           Note
           You can view all successful commands with --status=0, and all unsuccessful commands with
           --status=1-9999.

       To display the audit log entries matching several search criteria, use the following command:

           shell> mysqlauditgrep --users=root --start-date=0 --end-date=2012-10-10 --event-type=Query \
                  --query-type=SET --status=0 --pattern="%audit_log%" /SERVER/data/audit.log
             +---------+------------+--------+----------------------+----------------+-------+------------+------------------------------------+
             | STATUS  | SERVER_ID  | NAME   | TIMESTAMP            | CONNECTION_ID  | USER  | PRIV_USER  | SQLTEXT                            |
             +---------+------------+--------+----------------------+----------------+-------+------------+------------------------------------+
             | 0       | 1          | Query  | 2012-09-28T11:26:50  | 10             | root  | root       | SET @@GLOBAL.audit_log_flush = ON  |
             +---------+------------+--------+----------------------+----------------+-------+------------+------------------------------------+

       PERMISSIONS REQUIRED.PP The user must have permissions to read the audit log file(s) on disk.

       Copyright © 2006, 2016, Oracle and/or its affiliates. All rights reserved.

       This documentation is free software; you can redistribute it and/or modify it only under the terms of the
       GNU General Public License as published by the Free Software Foundation; version 2 of the License.

       This documentation is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without
       even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General
       Public License for more details.

       You should have received a copy of the GNU General Public License along with the program; if not, write
       to the Free Software Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA or see
       http://www.gnu.org/licenses/.

NOTES

        1. Pattern Matching
           http://dev.mysql.com/doc/refman/5.7/en/pattern-matching.html

        2. Python "re" module docs
           http://docs.python.org/2/library/re.html

        3. The Audit Log File
           http://dev.mysql.com/doc/refman/5.7/en/audit-log-file.html

SEE ALSO

       For more information, please refer to the MySQL Utilities and Fabric documentation, which is available
       online at http://dev.mysql.com/doc/index-utils-fabric.html

AUTHOR

       Oracle Corporation (http://dev.mysql.com/).