PDF (US Ltr)
- 35.1Mb
PDF (A4)
- 35.2Mb
Man Pages (TGZ)
- 256.4Kb
Man Pages (Zip)
- 361.3Kb
Info (Gzip)
- 3.4Mb
Info (Zip)
- 3.4Mb
Search Results
https://dev.mysql.com/doc/refman/5.7/en/mysql-cluster-online-add-node-example.html
This should be similar to what is shown here, where password is the MySQL root password for a given MySQL server instance: $> mysqladmin -uroot -ppassword shutdown 081208 20:19:56 mysqld_safe mysqld from pid file /usr/local/mysql/var/tonfisk.pid ...
https://dev.mysql.com/doc/refman/5.7/en/xa-restrictions.html
When binlog_format=STATEMENT is set, a warning is issued for DML statements inside XA transactions. When binlog_format=MIXED or binlog_format=ROW is set, DML statements inside XA transactions are logged using row-based replication, and the potential ...For “external XA,” a MySQL server acts as a Resource Manager and client programs act as Transaction ...
https://dev.mysql.com/doc/refman/5.7/en/out-of-range-and-overflow.html
If no restrictive modes are enabled, MySQL clips the value to the appropriate endpoint of the column data type range and stores the resulting value instead. When an out-of-range value is assigned to an integer column, MySQL stores the value ...
https://dev.mysql.com/doc/refman/5.7/en/information-schema-columns-table.html
CHARACTER_OCTET_LENGTH should be the same as CHARACTER_MAXIMUM_LENGTH, except for multibyte character sets. For example, if you say SHOW FULL COLUMNS FROM t, and you see in the COLLATION_NAME column a value of latin1_swedish_ci, the character set is ...TABLE_SCHEMA The name of the schema (database) to which the table containing the column ...The COLUMNS table has these ...
https://dev.mysql.com/doc/refman/5.7/en/bit-functions.html
Table 12.17 Bit Functions and Operators Name Description & Bitwise AND >> Right shift << Left shift ^ Bitwise XOR BIT_COUNT() Return the number of bits that are set | Bitwise OR ~ Bitwise inversion The following list describes available bit ...
https://dev.mysql.com/doc/refman/5.7/en/comparison-operators.html
The following relational comparison operators can be used to compare not only scalar operands, but row operands: = > < >= <= <> != The descriptions for those operators later in this section detail how they work with row operands. For additional ...
https://dev.mysql.com/doc/refman/5.7/en/create-logfile-group.html
The optional UNDO_BUFFER_SIZE parameter sets the size used by the UNDO buffer for the log file group; The default value for UNDO_BUFFER_SIZE is 8M (eight megabytes); this value cannot exceed the amount of system memory available. This includes any ...For rules covering the naming of log file groups, see Section 9.2, “Schema Object ... CREATE LOGFILE GROUP logfile_group ADD UNDOFILE 'undo_file' [INITIAL_SIZE [=] initial_size] [UNDO_BUFFER_SIZE [=] undo_buffer_size] [REDO_BUFFER_SIZE [=] redo_buffer_size] [NODEGROUP [=] nodegroup_id] [WAIT] [COMMENT [=] 'string'] ENGINE [=] engine_name This statement ...
https://dev.mysql.com/doc/refman/5.7/en/gis-polygon-property-functions.html
For arguments of dimension 0 or 1, the result is 0. The result is the sum of the area values of all components for a geometry collection. ST_Centroid({poly|mpoly}) Returns the mathematical centroid for the Polygon or MultiPolygon argument as a Point. This function processes geometry collections by computing the centroid point for components of highest dimension in the ...
https://dev.mysql.com/doc/refman/5.7/en/mysql-cluster-config-send-buffers.html
This parameter can be set for all types of NDB Cluster nodes—that is, it can be set in the [ndbd], [mgm], and [api] (or [mysql]) sections of the config.ini file. It represents the total amount of memory (in bytes) to be allocated by each node for ...Configuration of the unified send buffer can accomplished by setting the following parameters: ... The NDB kernel ...
https://dev.mysql.com/doc/refman/5.7/en/security-options.html
For descriptions of each of these, see Section 5.1.6, “Server Command Options”, and Section 5.1.7, “Server System Variables”. The following table shows mysqld options and system variables that affect security.