The MySQL Server has many different names and has been around for decades. Some people simply call it “MySQL,” some refer to it as “the MySQL daemon,” and others still elect to simply combine the two and call it “mysqld” (short for “MySQL daemon”). Regardless, the fact remains that it is both extremely popular and used in almost every industry we can think of. People working with the server generally use it to support software solutions on the web, but its use cases vary from industry to industry thanks to its high availability, performance including data storage and security.
Here you can read about how to Set Up MySQL 8 Replication with Linux Nodes:
- High availability: When supporting educational, hospitality, or financial services, the high availability features of MySQL are paramount. Since the daemon has a plethora of load balancers that can be implemented (ProxySQL, MaxScale, HAProxy, and the like), it plays a crucial role in ensuring the uptime of the infrastructure in high schools, universities, and other educational institutions.
- Performance: When behind a highly technical organization, the daemon is used in all kinds of scenarios and can push the performance of an application backing a business to the max. That’s the reason MySQL has documentation behind it in the first place-highly technical people can always direct their staff there to learn how, why, and when MySQL behaves the way it does.
- Simplicity: Finally, there are use cases where the daemon is there just to have some data inside of it. In such a case, people running a service that’s backed by MySQL may not know a lot of things about it, may not care enough to learn, or both-it’s good as long as it works.
The Science Behind the Daemon
The core reason the MySQL daemon exists is to let us “get under the hood” of MySQL and run commands as if we’re inside of the database via the CLI:
To see everything it can do, we launch it with the
To see all mysqld options in a nice format, invoke
The above command will let us see everything the daemon can do, from usage options to variables: everything’s here.
How Does the Configuration Work?
The daemon allows us to see everything our MySQL instance is built on, but to properly understand everything that we have to handle, we must look into the configuration itself. The MySQL configuration file is located in the
/var/lib/mysql/ directory on Linux and inside of the MySQL version folder on Windows, and it’s called either
my.ini, respectively. The contents of the file are pretty much the same on both operating systems, though there are slightly more comments on the Windows version of the file. An example can be seen below:
The file contains every setting that is displayed by the daemon, ranging from settings relevant to the MySQL client itself to SQL modes. All of these options can be also set at runtime by using parameters beginning by “–“: we can make MySQL run in an ANSI mode by specifying
mysqld --ansiwe can specify the amount of I/O threads available for use by specifying their number (#) in
The configuration works this way because it contains the parameters (sometimes also called variables) which then interact with the daemon, and consequently alter how the daemon (MySQL) functions as a whole.
Configuring Mysqld for Storage and Security
A lot of parameters impact how MySQL functions. Some of the more interesting ones alter its functionality as an ecosystem, some allow MySQL to remain stable, and some lesser-known ones have less impact. Of the parameters affecting storage and security,
secure_file_priv impacts both and deserves a mention.
secure_file_priv and Other Mysqld Parameters
One of the most popular parameters is the
secure_file_priv variable. This parameter controls where MySQL is allowed to ingest data when the
LOAD DATA INFILE statement is being used. The default value for MySQL on Windows is the
This variable is important because it puts a restraint on which directories can contain data that is eligible for inclusion in your MySQL database instance. If we load data into MySQL from the wrong directory, we will see a message outlining that we should choose a different folder:
ERROR 1290 (HY000): The MySQL server is running with the --secure-file-priv option so it cannot execute this statement.
Configure Mysqld for Big Data
secure_file_priv is not alone. We have a lot of other variables to choose from, including, but not limited to:
log-isam=filenamevariable, which is useful if we want to log all changes relevant to MyISAM into one file
innodb-data-home-dirparameter, which makes it possible for us to change the default home directory for files related to the InnoDB storage engine
innodb-ft-total-cache-sizeparameter, which gives us the ability to adjust the size of the full-text index cache to use TEXT type data most efficiently in MySQL
In our big data and MySQL post (linked above), we cover how to configure the buffer pool size, buffer pool instances, and level of ACID compliance so that MySQL can handle the maximum amount of data.
Configure the MySQL Daemon for High Security
The last example we will cover in this post is encryption. There are hundreds of mysqld spanning hundreds of use cases. If you really want to dive deep, consider taking a look at the list of parameters provided by MySQL.
In this SSL post, we cover how to modify parameters such as the following to support securely connecting to MySQL:
With the server configured, you can use the SSL options in a MySQL client to be sure your connection is encrypted!
mysqld, the MySQL daemon, MySQL Server, or simply MySQL works behind-the-scenes on millions of websites across thousands of industries around the world: it is used by worldwide social media giants such as Facebook, by the world’s fastest data breach search engines, and by small startups alike. A proper understanding of what the daemon is, what it does, and why it’s used is absolutely crucial for every developer and database administrator.
Over the past couple of years, MySQL has evolved heavily, adding a lot of new parameters to expand its use cases even further, and it’s now the modern king in the data space for a reason: MySQL has given developers an awesome opportunity to get inside of its “brain,” and
mysqld is largely responsible for that adaptability.
Lukas is an ethical hacker, a MySQL database administrator, and a frequent conference speaker. Since 2014, Lukas has found and responsibly disclosed security flaws in some of the most visited websites in Lithuania and abroad including advertising, gift-buying, gaming, hosting websites as well as some websites of government institutions. Lukas runs one of the biggest and fastest data breach search engines in the world: BreachDirectory.com and frequently blogs in multiple places educating people about information security and other topics. He also runs his own blog over at lukasvileikis.com.