PDF (US Ltr)
- 35.0Mb
PDF (A4)
- 35.1Mb
Man Pages (TGZ)
- 254.9Kb
Man Pages (Zip)
- 359.9Kb
Info (Gzip)
- 3.4Mb
Info (Zip)
- 3.4Mb
Search Results
https://dev.mysql.com/doc/refman/5.7/en/mysql-cluster-limitations-database-objects.html
Some database objects such as tables and indexes have different limitations when using the NDBCLUSTER storage engine: Database and table names. When using the NDB storage engine, the maximum allowed length both for database names and for table ...
https://dev.mysql.com/doc/refman/5.7/en/mysql-cluster-management.html
Managing an NDB Cluster involves a number of tasks, the first of which is to configure and start NDB Cluster. This is covered in Section 21.4, “Configuration of NDB Cluster”, and Section 21.5, “NDB Cluster Programs”. The next few sections ...
https://dev.mysql.com/doc/refman/5.7/en/mysql-cluster-ndbinfo-dict-obj-info.html
The dict_obj_info table provides information about NDB data dictionary (DICT) objects such as tables and indexes. (The dict_obj_types table can be queried for a list of all the types.) This information includes the object's type, state, parent ...
https://dev.mysql.com/doc/refman/5.7/en/mysql-cluster-nodes-groups.html
This is subject to the following limitations: Only the KEY and LINEAR KEY partitioning schemes are supported in production with NDB tables. This section discusses the manner in which NDB Cluster divides and duplicates data for storage. A number of ...
https://dev.mysql.com/doc/refman/5.7/en/mysql-cluster-programs-ndb-select-all.html
ndb_select_all prints all rows from an NDB table to stdout. Usage ndb_select_all -c connection_string tbl_name -d db_name [> file_name] Options that can be used with ndb_select_all are shown in the following table. --connect-retries Command-Line ...
https://dev.mysql.com/doc/refman/5.7/en/mysql-enterprise-encryption.html
These functions enable Enterprise applications to perform the following operations: Implement added data protection using public-key asymmetric cryptography Create public and private keys and digital signatures Perform asymmetric encryption and ...
https://dev.mysql.com/doc/refman/5.7/en/mysql-installer-setup.html
The following figure identifies and describes the key areas of this step. Template files contain keys and formulas to calculate some values dynamically. Choosing a Setup Type Path Conflicts Check Requirements MySQL Installer Configuration Files ...
https://dev.mysql.com/doc/refman/5.7/en/partitioning-columns-list.html
This is a variant of LIST partitioning that enables the use of multiple columns as partition keys, and for columns of data types other than integer types to be used as partitioning columns; you can use string types, DATE, and DATETIME columns. In ...
https://dev.mysql.com/doc/refman/5.7/en/partitioning-limitations-locking.html
ON DUPLICATE KEY UPDATE is pruned as long as no partitioning column is updated. In MySQL 5.7, partition lock pruning eliminates unneeded locks in many cases, and most statements reading from or updating a partitioned MyISAM table cause only the ...
https://dev.mysql.com/doc/refman/5.7/en/partitioning-list.html
ADD PARTITION statement to restore the table's original partitioning scheme.) As with RANGE partitioning, it is possible to combine LIST partitioning with partitioning by hash or key to produce a composite partitioning (subpartitioning). You can ...