PDF (US Ltr)
- 43.3Mb
PDF (A4)
- 43.4Mb
Man Pages (TGZ)
- 297.2Kb
Man Pages (Zip)
- 402.4Kb
Info (Gzip)
- 4.3Mb
Info (Zip)
- 4.3Mb
Search Results
https://dev.mysql.com/doc/refman/8.0/en/replace.html
MySQL uses the following algorithm for REPLACE (and LOAD DATA ... REPLACE [LOW_PRIORITY | DELAYED] [INTO] tbl_name [PARTITION (partition_name [, partition_name] ...)] [(col_name [, col_name] ...)] { {VALUES | VALUE} (value_list) [, (value_list)] ... | VALUES row_constructor_list } REPLACE [LOW_PRIORITY | DELAYED] [INTO] tbl_name [PARTITION (partition_name [, partition_name] ...)] SET assignment_list REPLACE [LOW_PRIORITY | DELAYED] [INTO] tbl_name [PARTITION (partition_name [, partition_name] ...)] [(col_name [, col_name] ...)] {SELECT ...
https://dev.mysql.com/doc/refman/8.0/en/view-algorithms.html
The optional ALGORITHM clause for CREATE VIEW or ALTER VIEW is a MySQL extension to standard SQL. For MERGE, the text of a statement that refers to the view and the view definition are merged such that parts of the view definition replace ...For ...
https://dev.mysql.com/doc/refman/8.0/en/innodb-online-ddl-operations.html
Renaming an index ALTER TABLE tbl_name RENAME INDEX old_index_name TO new_index_name, ALGORITHM=INPLACE, LOCK=NONE; Adding a FULLTEXT index CREATE FULLTEXT INDEX name ON table(column); Adding the first FULLTEXT index rebuilds the table if there is ... Online support details, syntax examples, and usage notes for DDL operations are provided under the following topics in this ...
https://dev.mysql.com/doc/refman/8.0/en/nested-loop-joins.html
MySQL executes joins between tables using a nested-loop algorithm or variations on it. Nested-Loop Join Algorithm Block Nested-Loop Join Algorithm Nested-Loop Join Algorithm A simple nested-loop join (NLJ) algorithm reads rows from the first table ...This process is repeated as many times as there remain tables to be ...
https://dev.mysql.com/doc/refman/8.0/en/x-plugin-connection-compression.html
Connections can be compressed if the server and the client agree on a mutually supported compression algorithm. Configuring Connection Compression for X Plugin Compressed Connection Characteristics for X Plugin Monitoring Connection Compression for ... From MySQL 8.0.19, X Plugin supports compression of messages sent over X Protocol ...
https://dev.mysql.com/doc/refman/8.0/en/enterprise-encryption-functions-legacy.html
This occurs, for example, if a function does not support a specified algorithm, a key length is too short or long, or a string expected to be a key string in PEM format is not a valid key. asymmetric_decrypt(algorithm, crypt_str, key_str) Decrypts ... In releases before MySQL 8.0.30, MySQL Enterprise Encryption's functions are based on the openssl_udf shared ...
https://dev.mysql.com/doc/refman/8.0/en/alter-table.html
Performance and Space Requirements ALTER TABLE operations are processed using one of the following algorithms: COPY: Operations are performed on a copy of the original table, and table data is copied from the original table to the new table row by ... ALTER TABLE tbl_name [alter_option [, alter_option] ...] [partition_options] alter_option: { table_options | ADD [COLUMN] col_name column_definition [FIRST | AFTER col_name] | ADD [COLUMN] (col_name column_definition,...) | ADD {INDEX | KEY} [index_name] [index_type] (key_part,...) [index_option] ...
https://dev.mysql.com/doc/refman/8.0/en/connection-compression-control.html
By default, connections are uncompressed, but can be compressed if the server and the client agree on a mutually permitted compression algorithm. Configuring Connection Compression Configuring Legacy Connection Compression Monitoring Connection ...
https://dev.mysql.com/doc/refman/8.0/en/rewriter-query-rewrite-plugin-usage.html
row *************************** id: 1 pattern: SELECT ? pattern_database: NULL replacement: SELECT ? + 1 enabled: YES message: NULL pattern_digest: NULL normalized_pattern: NULL The rule specifies a pattern template indicating which SELECT ...These ... To enable or disable the plugin, enable or disable the rewriter_enabled system ...
https://dev.mysql.com/doc/refman/8.0/en/enterprise-encryption-functions.html
This occurs, for example, if a function does not support a specified algorithm, a key length is too short or long, or a string expected to be a key string in PEM format is not a valid key. asymmetric_decrypt(algorithm, data_str, priv_key_str) ... In ...