Search

Download this Manual
PDF (US Ltr) - 35.0Mb
PDF (A4) - 35.1Mb
Man Pages (TGZ) - 254.9Kb
Man Pages (Zip) - 359.9Kb
Info (Gzip) - 3.4Mb
Info (Zip) - 3.4Mb


Displaying 331 to 340 of 1828 total results
https://dev.mysql.com/doc/refman/5.7/en/range-optimization.html
If conditions that cover sets of rows contained within intervals are combined with OR, they form a condition that covers a set of rows contained within the union of their intervals. If the conditions are combined with AND, they form a condition that ... The range access method uses a single index to retrieve a subset of table rows that are contained within one or several index value ...
https://dev.mysql.com/doc/refman/5.7/en/sys-user-summary-by-file-io.html
Rows for which the USER column in the underlying Performance Schema table is NULL are assumed to be for background threads and are reported with a host name of background. ios The total number of file I/O events for the user. io_latency The total ...
https://dev.mysql.com/doc/refman/5.7/en/version-tokens-usage.html
Suppose that a management application communicates with a set of servers that are queried by clients to access employee and product databases (named emp and prod, respectively). In the token list for a given server, token names represent database ...
https://dev.mysql.com/doc/refman/5.7/en/encrypted-connection-protocols-ciphers.html
The set of protocols actually permitted for connections is subject to multiple factors: MySQL configuration. For example, a server that acts as a replica can be configured with tls_version set to TLSv1.2 to permit only incoming connections that use ... MySQL supports multiple TLS protocols and ciphers, and enables configuring which protocols and ciphers to permit for encrypted ...
https://dev.mysql.com/doc/refman/5.7/en/testing-server.html
For example: $> bin/mysqld_safe --user=mysql & If mysqld_safe fails, see Section 2.9.2.1, “Troubleshooting Problems Starting the MySQL Server”. If you have assigned a password for the root account already, you'll also need to specify -p on the ... After the data directory is initialized and you have started the server, perform some simple tests to make sure that it works ...This section assumes that ...
https://dev.mysql.com/doc/refman/5.7/en/enterprise-encryption-functions.html
This example creates a 2,048-bit DSA private key, then derives a public key from the private key: SET @priv = create_asymmetric_priv_key('DSA', 2048); SET @pub = create_asymmetric_pub_key('DSA', @priv); For an example showing DH key generation, see ... MySQL Enterprise Encryption functions have these general characteristics: For arguments of the wrong type or an incorrect number of arguments, each function returns an ...
https://dev.mysql.com/doc/refman/5.7/en/performance-schema-summary-tables.html
Summary tables provide aggregated information for terminated events over time. Tables that summarize events in similar ways often have similar sets of summary columns and differ only in the grouping columns used to determine how events are ...The ...
https://dev.mysql.com/doc/refman/5.7/en/innodb-online-ddl-performance.html
row *************************** Id: 5 User: root Host: localhost db: test Command: Query Time: 44 State: Waiting for table metadata lock Info: ALTER TABLE t1 ADD COLUMN x INT, ALGORITHM=INPLACE, LOCK=NONE ... When evaluating the techniques for ...
https://dev.mysql.com/doc/refman/5.7/en/get-diagnostics.html
This instance of GET DIAGNOSTICS assigns the number of available conditions and the rows-affected count to the user variables @p1 and @p2: GET DIAGNOSTICS @p1 = NUMBER, @p2 = ROW_COUNT; To obtain condition information, specify the condition number ...This instance of GET DIAGNOSTICS assigns the SQLSTATE value and error message to the user variables @p3 and @p4: GET DIAGNOSTICS CONDITION 1 @p3 = RETURNED_SQLSTATE, @p4 = MESSAGE_TEXT; The retrieval list specifies one or more target = item_name assignments, separated by ...
https://dev.mysql.com/doc/refman/5.7/en/audit-log-logging-configuration.html
For best security, write the audit log to a directory accessible only to the MySQL server and to users with a legitimate reason to view the log. Encryption is based on a user-defined password (with the exception of the initial password, which the ...
Displaying 331 to 340 of 1828 total results