PDF (US Ltr)
- 43.3Mb
PDF (A4)
- 43.4Mb
Man Pages (TGZ)
- 297.2Kb
Man Pages (Zip)
- 402.4Kb
Info (Gzip)
- 4.3Mb
Info (Zip)
- 4.3Mb
Search Results
https://dev.mysql.com/doc/refman/8.0/en/tracing-example.html
Next, for every table in the query, we estimate the cost of, and number of records returned by, a table scan or a range access. Normally, greedy search is used, but since the statement uses a straight join, only the requested order is explored, and ...Now we can examine the trace, whose first column (QUERY), containing the original statement to be traced, is shown here: SELECT * FROM INFORMATION_SCHEMA.OPTIMIZER_TRACE\G *************************** ...
https://dev.mysql.com/doc/refman/8.0/en/fulltext-fine-tuning.html
Most full-text variables described in this section must be set at server startup time. Note Minimum and maximum word length full-text parameters do not apply to FULLTEXT indexes created using the ngram parser. For example, to make two-character ...
https://dev.mysql.com/doc/refman/8.0/en/replication-gtids-failover.html
This is necessary for restoring a replica that is immediately available as a candidate to become a new source on failover or switchover. This method is simple and effective, but requires the replica to read the binary log from the source; it can ...
https://dev.mysql.com/doc/refman/8.0/en/group-replication-responses-failure-expel.html
You can use the group_replication_member_expel_timeout system variable, which is available from MySQL 8.0.13, to allow additional time between the creation of a suspicion and the expulsion of the suspect member. A further short period of time might ...A group member is then expelled when another member's suspicion of it (or its own suspicion of itself) times ...A suspicion is created when ...
https://dev.mysql.com/doc/refman/8.0/en/innodb-change-buffer.html
Similarly, deletes and updates may affect secondary index pages that are not adjacently located in an index tree. Merging cached changes at a later time, when affected pages are read into the buffer pool by other operations, avoids substantial ...
https://dev.mysql.com/doc/refman/8.0/en/replication-gtids-auto-positioning.html
This method is efficient and only takes a significant amount of time if the replica is behind the source by a large number of binary log files. GTIDs replace the file-offset pairs previously required to determine points for starting, stopping, or ...When GTIDs are in use, all the information that the replica needs for synchronizing with the source is obtained directly from the replication data ...
https://dev.mysql.com/doc/refman/8.0/en/stored-objects-security.html
Stored programs (procedures, functions, triggers, and events) and views are defined prior to use and, when referenced, execute within a security context that determines their privileges. The privileges applicable to execution of a stored object are ...The DEFINER Attribute The SQL SECURITY Characteristic Examples Orphan Stored Objects Risk-Minimization Guidelines The DEFINER Attribute A stored object definition can include a DEFINER attribute that names a MySQL ...
https://dev.mysql.com/doc/refman/8.0/en/upgrade-prerequisites.html
In-place upgrade to MySQL 8.0 is not supported if tables contain old temporal columns in pre-5.6.4 format (TIME, DATETIME, and TIMESTAMP columns without support for fractional seconds precision). (Alternatively, let the 8.0 server add those ...The ... Before upgrading to the latest MySQL 8.0 release, ensure the upgrade readiness of your current MySQL 5.7 or MySQL 8.0 server instance by performing the preliminary checks described ...
https://dev.mysql.com/doc/refman/8.0/en/data-masking-plugin-functions.html
Prior to MySQL 8.0.19, the functions treat string arguments as binary strings (which means they do not distinguish lettercase), and string return values are binary strings. If a MySQL Enterprise Data Masking and De-Identification function is invoked ...margin1: A nonnegative integer that specifies the number of characters on the left end of the string to remain ...
https://dev.mysql.com/doc/refman/8.0/en/data-masking-plugin-usage.html
Before using MySQL Enterprise Data Masking and De-Identification, install it according to the instructions provided at Section 8.5.3.1, “MySQL Enterprise Data Masking and De-Identification Plugin Installation”. To use MySQL Enterprise Data ...