Search

Download this Manual
PDF (US Ltr) - 35.0Mb
PDF (A4) - 35.1Mb
Man Pages (TGZ) - 254.9Kb
Man Pages (Zip) - 359.9Kb
Info (Gzip) - 3.4Mb
Info (Zip) - 3.4Mb


Displaying 211 to 220 of 1828 total results
https://dev.mysql.com/doc/refman/5.7/en/explain-output.html
For InnoDB tables that have a user-defined clustered index, that index can be used even when Using index is absent from the Extra column. For DEPENDENT SUBQUERY, the subquery is re-evaluated only once for each set of different values of the ... The ...It lists the tables in the output in the order that MySQL would read them while processing the ...
https://dev.mysql.com/doc/refman/5.7/en/encryption-functions.html
One benefit of having a set of default keys is that it gives applications a way to check for the existence of encrypted column values, without giving the end user the right to decrypt those values. This function is the SQL interface to the algorithm ...For this to work, the user must have the SUPER ...The size penalty for storing the hex string in a CHAR column is at least two times, up to eight times if the value is stored in a column that uses the ...
https://dev.mysql.com/doc/refman/5.7/en/create-trigger.html
CREATE [DEFINER = user] TRIGGER trigger_name trigger_time trigger_event ON tbl_name FOR EACH ROW [trigger_order] trigger_body trigger_time: { BEFORE | AFTER } trigger_event: { INSERT | UPDATE | DELETE } trigger_order: { FOLLOWS | PRECEDES } ...A ...
https://dev.mysql.com/doc/refman/5.7/en/mysqlimport.html
--defaults-extra-file=file_name Command-Line Format --defaults-extra-file=file_name Type File name Read this option file after the global option file but (on Unix) before the user option file. --user=user_name, -u user_name Command-Line Format ...
https://dev.mysql.com/doc/refman/5.7/en/mysql-cluster-security-mysql-privileges.html
As with any other MySQL Server, user and privilege information is stored in the mysql system database. A user who can log in as root can also access the INFORMATION_SCHEMA database and its tables, and so obtain information about databases, tables, ...If you wish, you can enable automatic distribution of MySQL users and privileges across NDB Cluster SQL nodes; see Section 21.6.13, “Distributed Privileges Using Shared Grant Tables”, for ...
https://dev.mysql.com/doc/refman/5.7/en/sys-user-summary-by-statement-type.html
These views summarize informaion about statements executed, grouped by user and statement type. Rows for which the USER column in the underlying Performance Schema table is NULL are assumed to be for background threads and are reported with a host ...By default, rows are sorted by user and descending total ...
https://dev.mysql.com/doc/refman/5.7/en/mysql-cluster-options-variables.html
Note When ndbinfo_show_hidden is enabled, the internal tables are shown in the ndbinfo database only; they are not visible in TABLES or other INFORMATION_SCHEMA tables, regardless of the variable's setting. Set to OFF to keep this from happening; ...
https://dev.mysql.com/doc/refman/5.7/en/partitioning-limitations.html
The maximum possible number of user-defined partitions for a table using the NDB storage engine is determined according to the version of the NDB Cluster software being used, the number of data nodes, and other factors. More specifically, this means ...Tables employing user-defined partitioning do not preserve the SQL mode in effect at the time that they were ...For a list of SQL functions which ...
https://dev.mysql.com/doc/refman/5.7/en/stored-programs-logging.html
It is possible for a procedure to follow different execution paths on source and replica servers, so a user can write a routine containing a dangerous statement that executes only on the replica where it is processed by a thread that has full ...The ...
https://dev.mysql.com/doc/refman/5.7/en/replication-gtids-lifecycle.html
A GTID is also assigned to the creation, alteration, or deletion of a database, and of a non-table database object such as a procedure, function, trigger, event, view, user, role, or grant. Temporary tables are dropped automatically when a replica ...If a GTID was assigned for the transaction, the GTID is externalized non-atomically (very shortly after the transaction is committed) by adding it to the set of GTIDs in the gtid_executed system variable ...
Displaying 211 to 220 of 1828 total results