PDF (US Ltr)
- 35.1Mb
PDF (A4)
- 35.2Mb
Man Pages (TGZ)
- 256.4Kb
Man Pages (Zip)
- 361.3Kb
Info (Gzip)
- 3.4Mb
Info (Zip)
- 3.4Mb
Search Results
https://dev.mysql.com/doc/refman/5.7/en/json-function-reference.html
Table 12.22 JSON Functions Name Description Introduced Deprecated -> Return value from JSON column after evaluating path; equivalent to JSON_EXTRACT(). ->> Return value from JSON column after evaluating path and unquoting the result; equivalent to ...
https://dev.mysql.com/doc/refman/5.7/en/mysql-cluster-programs-ndb-perror.html
Added to the MySQL NDB Cluster distribution in NDB 7.6, it is intended as a drop-in replacement for perror --ndb. ndb_perror replaces perror --ndb, which is deprecated in NDB 7.6 and subject to removal in a future release of MySQL NDB Cluster.
https://dev.mysql.com/doc/refman/5.7/en/mysql-cluster-programs-ndbmtd.html
In other words, a data node running ndbd can be stopped, the binary replaced with ndbmtd, and then restarted without any loss of data. ndbmtd is a multithreaded version of ndbd, the process that is used to handle all the data in tables using the ...
https://dev.mysql.com/doc/refman/5.7/en/mysql-enterprise-data-masking.html
Data masking hides sensitive information by replacing real values with substitutes. MySQL Enterprise Data Masking and De-Identification functions enable masking existing data using several methods such as obfuscation (removing identifying ... MySQL ...
https://dev.mysql.com/doc/refman/5.7/en/mysql-enterprise-security.html
MySQL Enterprise Edition includes a suite of masking and de-identification functions that perform subsetting, random generation, and dictionary replacement to de-identify strings, numerics, phone numbers, emails and more. These functions enable ...
https://dev.mysql.com/doc/refman/5.7/en/mysql-indexes.html
In this case, MySQL does a single key lookup for each MIN() or MAX() expression and replaces it with a constant. If all expressions are replaced with constants, the query returns at once. Indexes are used to find rows with specific column values ...
https://dev.mysql.com/doc/refman/5.7/en/optimizer-hints.html
The parser recognizes optimizer hint comments after the initial keyword of SELECT, UPDATE, INSERT, REPLACE, and DELETE statements. One means of control over optimizer strategies is to set the optimizer_switch system variable (see Section 8.9.2, ...
https://dev.mysql.com/doc/refman/5.7/en/optimizing-subqueries.html
For example: SELECT * FROM t1 WHERE t1.column1 IN (SELECT column1 FROM t2 ORDER BY column1); SELECT * FROM t1 WHERE t1.column1 IN (SELECT DISTINCT column1 FROM t2); SELECT * FROM t1 WHERE EXISTS (SELECT * FROM t2 LIMIT 1); Replace a join with a ...
https://dev.mysql.com/doc/refman/5.7/en/replication-gtids-auto-positioning.html
GTIDs replace the file-offset pairs previously required to determine points for starting, stopping, or resuming the flow of data between source and replica. The correct approach to recover from this situation is for the replica to replicate the ...
https://dev.mysql.com/doc/refman/5.7/en/shared-key-cache.html
Multiple sessions can initiate requests that result in cache block replacements, as long as they do not interfere with each other (that is, as long as they need different index blocks, and thus cause different cache blocks to be replaced). Threads ...