PDF (US Ltr)
        - 35.1Mb
                                PDF (A4)
        - 35.2Mb
                                Man Pages (TGZ)
        - 256.4Kb
                                Man Pages (Zip)
        - 361.2Kb
                                Info (Gzip)
        - 3.4Mb
                                Info (Zip)
        - 3.4Mb
                    
            Search Results
                        
                    
                    
            https://dev.mysql.com/doc/refman/5.7/en/create-table-generated-columns.html
                                A function is deterministic if, given the same data in tables, multiple invocations produce the same result, independently of the connected user. Examples of functions that are nondeterministic and fail this definition: CONNECTION_ID(), ...The ...
                                            
                https://dev.mysql.com/doc/refman/5.7/en/security.html
                                The security is related to the grants for individual users, but you may also wish to restrict MySQL so that it is available only locally on the MySQL server host, or to a limited set of other hosts. These include choosing good passwords, not ...For ... When thinking about security within a MySQL installation, you should consider a wide range of possible topics and how they affect the security of your MySQL server and related applications: General factors that affect ...
                                            
                https://dev.mysql.com/doc/refman/5.7/en/innodb-information-schema-fulltext_index-tables.html
                                Before querying any of them, set the value of the innodb_ft_aux_table system variable to the name (including the database name) of the table that contains the FULLTEXT index (for example, test/articles). YourSQL','In the following database ...
                                            
                https://dev.mysql.com/doc/refman/5.7/en/show-slave-hosts.html
                                User: The replica server user name as, specified on the replica with the --report-user option. Password: The replica server password as, specified on the replica with the --report-password option. A zero in this column means that the replica port ...
                                            
                https://dev.mysql.com/doc/refman/5.7/en/myisamchk-table-info.html
                                If you start the MySQL server with external locking disabled, myisamchk may report an error for a table that is updated while it runs. myisamchk -dv tbl_name Adding -v runs myisamchk in verbose mode so that it produces more information about the ...
                                            
                https://dev.mysql.com/doc/refman/5.7/en/innodb-system-tablespace.html
                                When using a raw disk partition, ensure that the user ID that runs the MySQL server has read and write privileges for that partition. For example, if running the server as the mysql user, the partition must be readable and writeable by mysql. To do ... The system tablespace is the storage area for the InnoDB data dictionary, the doublewrite buffer, the change buffer, and undo ...It ...
                                            
                https://dev.mysql.com/doc/refman/5.7/en/replication-features-user-names.html
                                 The maximum length of MySQL user names was increased from 16 characters to 32 characters in MySQL 5.7.8. Replication of user names longer than 16 characters to a replica that supports only shorter user names fails. However, this should occur only ...
                                            
                https://dev.mysql.com/doc/refman/5.7/en/performance-schema-metadata-locks-table.html
                                Metadata locking applies not just to tables, but also to schemas, stored programs (procedures, functions, triggers, scheduled events), tablespaces, user locks acquired with the GET_LOCK() function (see Section 12.14, “Locking Functions”), and ...
                                            
                https://dev.mysql.com/doc/refman/5.7/en/bnl-bka-optimization.html
                                Then the BKA algorithm builds keys to access the table to be joined for all rows in the buffer and submits these keys in a batch to the database engine for index lookups. For BKA to be used, the batched_key_access flag of the optimizer_switch system ...Benefits of BKA include improved join performance due to more efficient table ... In MySQL, a Batched Key Access (BKA) Join ...
                                            
                https://dev.mysql.com/doc/refman/5.7/en/faqs-tablespace-encryption.html
                                Is data decrypted for users who are authorized to see it? A.17.2. Is data decrypted for users who are authorized to see it? Yes. For example, assets such as pharmaceutical research results, oil field exploration results, financial contracts, or ...