PDF (US Ltr)
- 43.3Mb
PDF (A4)
- 43.4Mb
Man Pages (TGZ)
- 297.2Kb
Man Pages (Zip)
- 402.4Kb
Info (Gzip)
- 4.3Mb
Info (Zip)
- 4.3Mb
Search Results
https://dev.mysql.com/doc/refman/8.0/en/comparison-operators.html
For DATE and DATETIME columns that are declared as NOT NULL, you can find the special date '0000-00-00' by using a statement like this: SELECT * FROM tbl_name WHERE date_column IS NULL This is needed to get some ODBC applications to work because ...
https://dev.mysql.com/doc/refman/8.0/en/with.html
A common table expression (CTE) is a named temporary result set that exists within the scope of a single statement and that can be referred to later within that statement, possibly multiple times. For queries that execute and thus recurse slowly or ...Common Table Expressions Recursive Common Table Expressions Limiting Common Table Expression Recursion Recursive Common Table Expression Examples Common Table Expressions Compared to Similar Constructs For information about CTE optimization, see Section 10.2.2.4, “Optimizing Derived Tables, View References, and Common Table Expressions with Merging or ...
https://dev.mysql.com/doc/refman/8.0/en/innodb-row-format.html
As more rows fit into a single disk page, queries and index lookups can work faster, less cache memory is required in the buffer pool, and less I/O is required to write out updated values. The row format of a table determines how its rows are ...
https://dev.mysql.com/doc/refman/8.0/en/linux-installation-rpm.html
The default password policy implemented by validate_password requires that passwords contain at least one uppercase letter, one lowercase letter, one digit, and one special character, and that the total password length is at least 8 characters. Be ... The recommended way to install MySQL on RPM-based Linux distributions is by using the RPM packages provided by ...
https://dev.mysql.com/doc/refman/8.0/en/innodb-compression-internals.html
It is important to minimize the number of times B-tree nodes are split, as well as to minimize the need to uncompress and recompress their content. Updates and inserts of small records may be written to this modification log without requiring the ...
https://dev.mysql.com/doc/refman/8.0/en/mysql-cluster-programs-ndb-config.html
--connect-retries Command-Line Format --connect-retries=# Type Integer Default Value 12 Minimum Value 0 Maximum Value 12 Number of times to retry connection before giving up. However, this behavior is not guaranteed and is subject to change at any ... This tool extracts current configuration information for data nodes, SQL nodes, and API nodes from one of a number of sources: an NDB Cluster management node, or its config.ini or my.cnf ...
https://dev.mysql.com/doc/refman/8.0/en/x-plugin-connection-compression.html
The benefits of compression therefore occur primarily when there is low network bandwidth, network transfer time dominates the cost of compression and decompression operations, and result sets are large. As the compression level for an algorithm ...
https://dev.mysql.com/doc/refman/8.0/en/semijoins.html
A semijoin is a preparation-time transformation that enables multiple execution strategies such as table pullout, duplicate weedout, first match, loose scan, and materialization. For an inner join between two tables, the join returns a row from one ...The optimizer uses semijoin strategies to improve subquery execution, as described in this ...
https://dev.mysql.com/doc/refman/8.0/en/storage-requirements.html
InnoDB Table Storage Requirements NDB Table Storage Requirements Numeric Type Storage Requirements Date and Time Type Storage Requirements String Type Storage Requirements Spatial Type Storage Requirements JSON Storage Requirements The storage ...
https://dev.mysql.com/doc/refman/8.0/en/group-replication-frequently-asked-questions.html
From MySQL 8.0, two settings are available to increase the chances of a member remaining in or rejoining a group: group_replication_member_expel_timeout increases the time between the creation of a suspicion (which happens after an initial 5-second ...This limit has been identified from testing and benchmarking as a safe boundary where the group performs reliably on a stable local area ...