Search

Download this Manual
PDF (US Ltr) - 43.2Mb
PDF (A4) - 43.3Mb
Man Pages (TGZ) - 295.2Kb
Man Pages (Zip) - 400.4Kb
Info (Gzip) - 4.3Mb
Info (Zip) - 4.3Mb


Displaying 511 to 520 of 2150 total results
https://dev.mysql.com/doc/refman/8.0/en/information-schema-introduction.html
Other terms that are sometimes used for this information are data dictionary and system catalog. Performance Considerations INFORMATION_SCHEMA queries that search for information from more than one database might take a long time and impact ...They ... INFORMATION_SCHEMA provides access to database metadata, information about the MySQL server such as the name of a database or table, the data type of a column, or access ...
https://dev.mysql.com/doc/refman/8.0/en/mysql-cluster-sql-statements.html
This section discusses several SQL statements that can prove useful in managing and monitoring a MySQL server that is connected to an NDB Cluster, and in some cases provide information about the cluster itself. SHOW ENGINE NDB STATUS, SHOW ENGINE ...However, you can use LIKE to filter queries against the Information Schema ENGINES table, as discussed in the next ...
https://dev.mysql.com/doc/refman/8.0/en/query-attributes.html
Examples of the ways query attributes may be used: A web application produces pages that generate database queries, and for each query must track the URL of the page that generated it. Defining and Accessing Query Attributes Prerequisites for Using ... The most visible part of an SQL statement is the text of the ...
https://dev.mysql.com/doc/refman/8.0/en/string-functions-charset.html
MySQL has many operators and functions that return a string. This section answers the question: What is the character set and collation of such a string? For simple functions that take string input and return a string result as output, the output's ...WHEN a THEN b WHEN b THEN c COLLATE X END, the resulting collation ...
https://dev.mysql.com/doc/refman/8.0/en/data-size.html
Indexes are good for retrieval, but slow down insert and update operations. This can result in huge improvements by reducing the amount of data written to and read from disk. MySQL supports many different storage engines (table types) and row ...
https://dev.mysql.com/doc/refman/8.0/en/group-by-optimization.html
The most general way to satisfy a GROUP BY clause is to scan the whole table and create a new temporary table where all rows from each group are consecutive, and then use this temporary table to discover groups and apply aggregate functions (if ...
https://dev.mysql.com/doc/refman/8.0/en/group-replication-failure-detection.html
In that case, the suspect member is marked for expulsion from the group in a coordinated decision, and is expelled after the waiting period set by the group_replication_member_expel_timeout system variable expires and the expelling mechanism detects ... Group Replication’s failure detection mechanism is a distributed service which is able to identify that a server in the group is not communicating with the others, and is therefore suspected of being out of ...
https://dev.mysql.com/doc/refman/8.0/en/group-replication-multi-primary-mode.html
Any member that is compatible with the other group members is set to read/write mode when joining the group, and can process write transactions, even if they are issued concurrently. Group Replication does not handle client-side failover itself, so ... In multi-primary mode (group_replication_single_primary_mode=OFF) no member has a special ...
https://dev.mysql.com/doc/refman/8.0/en/innodb-memcached-benefits.html
You can stop and start the memcached server without losing updates made to cached data. Because you can access the underlying data through SQL, you can produce reports, search or update across multiple keys, and call functions such as AVG() and ...
https://dev.mysql.com/doc/refman/8.0/en/keyring-file-component.html
Warning For encryption key management, the component_keyring_file and component_keyring_encrypted_file components are not intended as a regulatory compliance solution. Security standards such as PCI, FIPS, and others require use of key management ...
Displaying 511 to 520 of 2150 total results