PDF (US Ltr)
- 35.0Mb
PDF (A4)
- 35.1Mb
Man Pages (TGZ)
- 254.9Kb
Man Pages (Zip)
- 359.9Kb
Info (Gzip)
- 3.4Mb
Info (Zip)
- 3.4Mb
Search Results
https://dev.mysql.com/doc/refman/5.7/en/mysql-acid.html
The ACID model is a set of database design principles that emphasize aspects of reliability that are important for business data and mission-critical applications. In cases where you have additional software safeguards, ultra-reliable hardware, or ...Because of the many possibilities depending on the capabilities of your CPU, network, and storage devices, this aspect is the most complicated to provide concrete guidelines ...MySQL includes components such as the InnoDB storage ...
https://dev.mysql.com/doc/refman/5.7/en/audit-log-security.html
For security reasons, audit log files should be written to a directory accessible only to the MySQL server and to users with a legitimate reason to view the log. By default, contents of audit log files produced by the audit log plugin are not ...
https://dev.mysql.com/doc/refman/5.7/en/too-many-connections.html
By granting the privilege to administrators and not to normal users (who should not need it), an administrator who also has the PROCESS privilege can connect to the server and use SHOW PROCESSLIST to diagnose problems even if the maximum number of ...The extra connection is reserved for use by accounts that have the SUPER ... If clients encounter Too many connections errors when attempting to ...
https://dev.mysql.com/doc/refman/5.7/en/views.html
Additional Resources You may find the MySQL User Forums helpful when working with views. Views are stored queries that when invoked produce a result set. The following discussion describes the syntax for creating and dropping views, and shows some ...There are some restrictions on the use of views; see Section 23.9, “Restrictions on ...
https://dev.mysql.com/doc/refman/5.7/en/fulltext-search-ngram.html
Typically, ngram_token_size is set to the size of the largest token that you want to search for. If you only intend to search for single characters, set ngram_token_size to 1. If you need to search for words comprised of more than one character, set ...The ngram full-text parser is supported for use with InnoDB and ... The built-in MySQL full-text parser uses the white space between words as a delimiter to determine where words begin and end, which is a limitation ...
https://dev.mysql.com/doc/refman/5.7/en/gis-linestring-property-functions.html
mysql> SET @ls = 'LineString(1 1,2 2,3 3)'; mysql> SELECT ST_AsText(ST_EndPoint(ST_GeomFromText(@ls))); +----------------------------------------------+ | ST_AsText(ST_EndPoint(ST_GeomFromText(@ls))) | ...You can extract particular points of a ...
https://dev.mysql.com/doc/refman/5.7/en/insert-on-duplicate.html
If column b is also unique, the INSERT is equivalent to this UPDATE statement instead: UPDATE t1 SET c=c+1 WHERE a=1 OR b=2 LIMIT 1; If a=1 OR b=2 matches several rows, only one row is updated. With ON DUPLICATE KEY UPDATE, the affected-rows value ... If you specify an ON DUPLICATE KEY UPDATE clause and a row to be inserted would cause a duplicate value in a UNIQUE index or PRIMARY KEY, an UPDATE of the old row ...
https://dev.mysql.com/doc/refman/5.7/en/myisamchk-repair-options.html
--set-collation=name Command-Line Format --set-collation=name Type String Specify the collation to use for sorting table indexes. --tmpdir can be set to a list of directory paths that are used successively in round-robin fashion for creating ...See ...
https://dev.mysql.com/doc/refman/5.7/en/spatial-convenience-functions.html
If any geometry argument is not a syntactically well-formed geometry byte string, an ER_GIS_INVALID_DATA error occurs. The only valid empty geometry is represented in the form of an empty geometry collection value. ST_IsValid() works only for the ...
https://dev.mysql.com/doc/refman/5.7/en/replication-solutions-switch.html
To use CHANGE MASTER TO, add all information about how to connect to Replica 1 from Replica 2 or Replica 3 (user, password, port). When this is true for all replicas, they can be reconfigured to the new setup. During this procedure, do not forget to ...The replica does not check whether the databases on the source are compatible with those on the replica; it simply begins reading and executing events from the specified coordinates in the new source's binary ...