PDF (US Ltr)
        - 35.1Mb
                                PDF (A4)
        - 35.2Mb
                                Man Pages (TGZ)
        - 256.4Kb
                                Man Pages (Zip)
        - 361.2Kb
                                Info (Gzip)
        - 3.4Mb
                                Info (Zip)
        - 3.4Mb
                    
            Search Results
                        
                    
                    
            https://dev.mysql.com/doc/refman/5.7/en/enterprise-encryption-usage.html
                                Use the private key to encrypt data and the public key to decrypt it This requires that the members of the key pair be RSA keys. For some installations, this might result in unacceptable CPU usage if applications frequently generate excessively long ... To use MySQL Enterprise Encryption in applications, invoke the functions that are appropriate for the operations you wish to ...
                                            
                https://dev.mysql.com/doc/refman/5.7/en/forcing-innodb-recovery.html
                                Usually, most of the data obtained in this way is intact. If an unexpected exit would occur during the purge operation, this recovery value prevents it. After using this value, be prepared to drop and recreate all secondary indexes. In this case, ...
                                            
                https://dev.mysql.com/doc/refman/5.7/en/group-replication-group-membership.html
                                In this situation, Group Replication's failure detection mechanism recognizes after a short period of time that the member has left, and a reconfiguration of the group without the failed member is proposed. In this situation, the rejoining member ...
                                            
                https://dev.mysql.com/doc/refman/5.7/en/group-replication-view-changes.html
                                 This section explains the process which controls how the view change identifier is incorporated into a binary log event and written to the log, The following steps are taken: Begin: Stable Group All servers are online and processing incoming ...
                                            
                https://dev.mysql.com/doc/refman/5.7/en/information-schema-innodb-cmpmem-table.html
                                Use the INFORMATION_SCHEMA COLUMNS table or the SHOW COLUMNS statement to view additional information about the columns of this table, including data types and default values.  The INNODB_CMPMEM and INNODB_CMPMEM_RESET tables provide status ...
                                            
                https://dev.mysql.com/doc/refman/5.7/en/information-schema-ndb-transid-mysql-connection-map-table.html
                                This information is used when populating the server_operations and server_transactions tables of the ndbinfo NDB Cluster information database. Although the names of this table and its columns are displayed using lowercase, you can use uppercase or ... The ndb_transid_mysql_connection_map table provides a mapping between NDB transactions, NDB transaction coordinators, and MySQL Servers attached to an NDB Cluster as API ...
                                            
                https://dev.mysql.com/doc/refman/5.7/en/information-schema-tp-thread-group-stats-table.html
                                This number is incremented when a statement starts executing, not when it finishes. This does not count statements that the thread group was able to begin executing immediately without queuing, which can happen under the conditions described in ...
                                            
                https://dev.mysql.com/doc/refman/5.7/en/innodb-buffer-pool.html
                                This midpoint insertion strategy treats the list as two sublists: At the head, a sublist of new (“young”) pages that were accessed recently At the tail, a sublist of old pages that were accessed less recently Figure 14.2 Buffer Pool List The ...
                                            
                https://dev.mysql.com/doc/refman/5.7/en/innodb-memcached-porting-mysql.html
                                Example 14.13 Using Your Own Table with an InnoDB memcached Application This example shows how to use your own table with a sample Python application that uses memcached for data manipulation. In this example, the sample script is copied to a file ... Consider these aspects of memcached applications when adapting an existing MySQL schema or application to use the daemon_memcached plugin: memcached keys cannot contain spaces or newlines, because these characters are used as separators in the ASCII ...
                                            
                https://dev.mysql.com/doc/refman/5.7/en/innodb-online-ddl-performance.html
                                For example, use this clause for tables involving customer signups or purchases, to avoid making the tables unavailable during lengthy DDL operations. For example, use this clause on data warehouse tables, where you can delay data load operations ...