Search

Download this Manual
PDF (US Ltr) - 35.1Mb
PDF (A4) - 35.2Mb
Man Pages (TGZ) - 255.8Kb
Man Pages (Zip) - 360.8Kb
Info (Gzip) - 3.4Mb
Info (Zip) - 3.4Mb


Displaying 251 to 260 of 1131 total results
https://dev.mysql.com/doc/refman/5.7/en/binary-log-mixed.html
When running in MIXED logging format, the server automatically switches from statement-based to row-based logging under the following conditions: When a DML statement updates an NDBCLUSTER table. When one or more tables with AUTO_INCREMENT columns ...
https://dev.mysql.com/doc/refman/5.7/en/condition-filtering.html
In join processing, prefix rows are those rows passed from one table in a join to the next. In general, the optimizer attempts to put tables with low prefix counts early in the join order to keep the number of row combinations from increasing ...
https://dev.mysql.com/doc/refman/5.7/en/connection-interfaces.html
This section describes aspects of how the MySQL server manages client connections. Network Interfaces and Connection Manager Threads Client Connection Thread Management Connection Volume Management Network Interfaces and Connection Manager Threads ...
https://dev.mysql.com/doc/refman/5.7/en/database-use.html
Once you know how to enter SQL statements, you are ready to access a database. Suppose that you have several pets in your home (your menagerie) and you would like to keep track of various types of information about them. You can do so by creating ...
https://dev.mysql.com/doc/refman/5.7/en/encrypted-connections.html
With an unencrypted connection between the MySQL client and the server, someone with access to the network could watch all your traffic and inspect the data being sent or received between client and server. When you must move information over a ...
https://dev.mysql.com/doc/refman/5.7/en/enterprise-encryption-usage.html
To use MySQL Enterprise Encryption in applications, invoke the functions that are appropriate for the operations you wish to perform. Use the private key to encrypt data and the public key to decrypt it This requires that the members of the key ...
https://dev.mysql.com/doc/refman/5.7/en/estimating-performance.html
In most cases, you can estimate query performance by counting disk seeks. For small tables, you can usually find a row in one disk seek (because the index is probably cached). For bigger tables, you can estimate that, using B-tree indexes, you need ...
https://dev.mysql.com/doc/refman/5.7/en/events-configuration.html
Events are executed by a special event scheduler thread; when we refer to the Event Scheduler, we actually refer to this thread. When running, the event scheduler thread and its current state can be seen by users having the PROCESS privilege in the ...
https://dev.mysql.com/doc/refman/5.7/en/explain-extended.html
For SELECT statements, the EXPLAIN statement produces extra (“extended”) information that is not part of EXPLAIN output but can be viewed by issuing a SHOW WARNINGS statement following EXPLAIN. The Message value in SHOW WARNINGS output displays ...
https://dev.mysql.com/doc/refman/5.7/en/external-locking.html
External locking is the use of file system locking to manage contention for MyISAM database tables by multiple processes. External locking is used in situations where a single process such as the MySQL server cannot be assumed to be the only ...
Displaying 251 to 260 of 1131 total results