Search

Download this Manual
PDF (US Ltr) - 43.3Mb
PDF (A4) - 43.4Mb
Man Pages (TGZ) - 297.2Kb
Man Pages (Zip) - 402.4Kb
Info (Gzip) - 4.3Mb
Info (Zip) - 4.3Mb


Displaying 551 to 560 of 2151 total results
https://dev.mysql.com/doc/refman/8.0/en/mysql-cluster-install-configuration.html
In this section, we discuss manual configuration of an installed NDB Cluster by creating and editing configuration files. For our four-node, four-host NDB Cluster (see Cluster nodes and host computers), it is necessary to write four configuration ...For more information on connection strings, see Section 25.4.3.3, “NDB Cluster Connection ...
https://dev.mysql.com/doc/refman/8.0/en/partial-revokes.html
For attempts to disable partial_revokes at runtime, an error occurs and the partial_revokes value remains unchanged. Using Partial Revokes Partial Revokes Versus Explicit Schema Grants Disabling Partial Revokes Partial Revokes and Replication Note ... Prior to MySQL 8.0.16, it is not possible to grant privileges that apply globally except for certain ...
https://dev.mysql.com/doc/refman/8.0/en/precision-math-expressions.html
If strict mode is enabled, inserts and updates involving division by zero are prohibited, and an error occurs. In other words, inserts and updates involving expressions that perform division by zero can be treated as errors, but this requires ...(If ... With precision math, exact-value numbers are used as given whenever ...
https://dev.mysql.com/doc/refman/8.0/en/replication-encrypted-connections.html
To use an encrypted connection for the transfer of the binary log required during replication, both the source and the replica servers must support encrypted network connections. You must obtain (or create) a suitable security certificate that you ...If either server does not support encrypted connections (because it has not been compiled or configured for them), replication through an encrypted connection is not ...
https://dev.mysql.com/doc/refman/8.0/en/replication-howto.html
There are a number of different methods for setting up replication, and the exact method to use depends on how you are setting up replication, and whether you already have data in the database on the source that you want to replicate. There are some ... This section describes how to set up a MySQL server to use binary log file position based ...
https://dev.mysql.com/doc/refman/8.0/en/replication-rules-examples.html
Operations to watch out for include transactions involving multi-table UPDATE statements, triggers, cascading foreign keys, stored functions that update multiple tables, and DML statements that invoke stored functions that update one or more tables.
https://dev.mysql.com/doc/refman/8.0/en/string-literals.html
Every binary string has a character set and collation named binary. It has a character set other than binary and a collation that is compatible with the character set. For nonbinary strings, the unit is the character and some character sets support ... A string is a sequence of bytes or characters, enclosed within either single quote (') or double quote (") ...
https://dev.mysql.com/doc/refman/8.0/en/system-variable-privileges.html
This includes operations that affect runtime values, and operations that persist values. To persist a global system variable to the mysqld-auto.cnf file (and set the runtime value), use the SET PERSIST statement, which requires the ...(For ...(For ...
https://dev.mysql.com/doc/refman/8.0/en/truncate-table.html
Logically, TRUNCATE TABLE is similar to a DELETE statement that deletes all rows, or a sequence of DROP TABLE and CREATE TABLE statements. Thus, it does not cause ON DELETE triggers to fire, it cannot be performed for InnoDB tables with parent-child ...To achieve high performance, TRUNCATE TABLE bypasses the DML method of deleting ...
https://dev.mysql.com/doc/refman/8.0/en/select-optimization.html
Isolate and tune any part of the query, such as a function call, that takes excessive time. With efficient use of the InnoDB buffer pool, MyISAM key cache, and the MySQL query cache, repeated queries run faster because the results are retrieved from ...Tuning these statements is a top priority, whether to achieve sub-second response times for dynamic web pages, or to chop hours off the time to generate huge overnight ...
Displaying 551 to 560 of 2151 total results