PDF (US Ltr)
- 35.1Mb
PDF (A4)
- 35.2Mb
Man Pages (TGZ)
- 256.4Kb
Man Pages (Zip)
- 361.3Kb
Info (Gzip)
- 3.4Mb
Info (Zip)
- 3.4Mb
Search Results
https://dev.mysql.com/doc/refman/5.7/en/tracing-example.html
row *************************** QUERY: SELECT SUM(alias2.col_varchar_nokey) AS c1, alias2.pk AS c2 FROM t1 AS alias1 STRAIGHT_JOIN t2 AS alias2 ON alias2.pk = alias1.col_int_key WHERE alias1.pk GROUP BY c2 ORDER BY alias1.col_int_key, alias2.pk This ...Now we can examine the trace, whose first column (QUERY), containing the original statement to be traced, is shown here: SELECT * FROM INFORMATION_SCHEMA.OPTIMIZER_TRACE\G ...
https://dev.mysql.com/doc/refman/5.7/en/account-activity-auditing.html
When a client connects successfully, the server authenticates the client to a particular row in this table. The User and Host column values in this row uniquely identify the account and correspond to the 'user_name'@'host_name' format in which ...
https://dev.mysql.com/doc/refman/5.7/en/adding-character-set.html
This section discusses the procedure for adding a character set to MySQL. To find the maximum of the currently used collation IDs, use this query: SELECT MAX(ID) FROM INFORMATION_SCHEMA.COLLATIONS; This step depends on whether you are adding a ...
https://dev.mysql.com/doc/refman/5.7/en/alter-table-examples.html
Column c1 uses disk-based storage, since this is the default for the table (determined by the table-level STORAGE DISK clause in the CREATE TABLE statement). This occurs because the order in which the rows are numbered depends on the specific ...For ...
https://dev.mysql.com/doc/refman/5.7/en/assigning-passwords.html
This enables MySQL to obfuscate passwords prior to storing them in the mysql.user system table. Also, on some systems this overwriting strategy is ineffective and the password remains visible to ps. This is not due to any limit imposed by the MySQL ... Required credentials for clients that connect to the MySQL server can include a ...
https://dev.mysql.com/doc/refman/5.7/en/binary-log-setting.html
The logging format also can be switched at runtime, although note that there are a number of situations in which you cannot do this, as discussed later in this section. This means that changing the logging format on a replication source server does ... You can select the binary logging format explicitly by starting the MySQL server with ...
https://dev.mysql.com/doc/refman/5.7/en/charset-applications.html
This causes the server to use the given settings for all applications that do not make other arrangements. This causes the server to use the given settings as the defaults for all applications, without having to specify them at server startup. To ...
https://dev.mysql.com/doc/refman/5.7/en/checksum-table.html
You can use this statement to verify that the contents are the same before and after a backup, rollback, or other operation that is intended to put the data back to a known state. For large tables, this could take a long time, thus you would only ...
https://dev.mysql.com/doc/refman/5.7/en/create-table-generated-columns.html
Generated column definitions have this syntax: col_name data_type [GENERATED ALWAYS] AS (expr) [VIRTUAL | STORED] [NOT NULL | NULL] [UNIQUE [KEY]] [[PRIMARY] KEY] [COMMENT 'string'] AS (expr) indicates that the column is generated and defines the ...
https://dev.mysql.com/doc/refman/5.7/en/creating-database.html
(Under Windows, this restriction does not apply, although you must refer to databases and tables using the same lettercase throughout a given query. Discuss this with the administrator or see Section 6.2, “Access Control and Account Management”.