Search Results
https://dev.mysql.com/doc/refman/8.4/en/identifier-length.html
For constraint definitions that include no constraint name, the server internally generates a name derived from the associated table name. The following table describes the maximum length for each type of identifier. For example, internally ...
https://dev.mysql.com/doc/refman/8.4/en/installing.html
You can choose from pre-packaged distributions containing binary (precompiled) programs or source code. Alternatively, use the Secure Deployment Guide, which provides procedures for deploying a generic binary distribution of MySQL Enterprise Edition ...A summary of the procedure follows and later sections provide the ...
https://dev.mysql.com/doc/refman/8.4/en/limit-optimization.html
With the mysql client program, you can use the --column-type-info option to display result column types. If the server uses temporary tables to resolve a query, it uses the LIMIT row_count clause to calculate how much space is required. If multiple ... If you need only a specified number of rows from a result set, use a LIMIT clause in the query, rather than fetching the whole result set and throwing away the extra ...
https://dev.mysql.com/doc/refman/8.4/en/miscellaneous-optimization-tips.html
The resulting fast database operations are then available to be reused by other queries, applications, and even code written in different programming languages. With Web servers, store images and other binary assets as files, with the path name ...
https://dev.mysql.com/doc/refman/8.4/en/myisam-ftdump.html
It reads the MyISAM index file directly, so it must be run on the server host where the table is located. Before using myisam_ftdump, be sure to issue a FLUSH TABLES statement first if the server is running. myisam_ftdump scans and dumps the entire ...
https://dev.mysql.com/doc/refman/8.4/en/mysql-cluster-backup-using-management-client.html
node_id is the identifier of the management server that is coordinating the backup with the data nodes. Before starting a backup, make sure that the cluster is properly configured for performing one. If an existing backup_id value is used, the ...
https://dev.mysql.com/doc/refman/8.4/en/optimize-overview.html
A DBA must evaluate whether it is possible to tune the application or reconfigure the server to avoid these bottlenecks, or whether more hardware resources are required. Balancing Portability and Performance To use performance-oriented SQL ...
https://dev.mysql.com/doc/refman/8.4/en/performance-schema-metadata-locks-table.html
Metadata locking applies not just to tables, but also to schemas, stored programs (procedures, functions, triggers, scheduled events), tablespaces, user locks acquired with the GET_LOCK() function (see Section 14.14, “Locking Functions”), and ...
https://dev.mysql.com/doc/refman/8.4/en/replication-features.html
In other words, successful statement-based replication requires that any SQL features used be supported by both the source and the replica servers. If you use a feature on the source server that is available only in the current version of MySQL, you ... The following sections provide information about what is supported and what is not in MySQL replication, and about specific issues and situations that may occur when replicating certain ...
MySQL 8.4 Reference Manual :: 19.2.1.3 Determination of Safe and Unsafe Statements in Binary Logging
https://dev.mysql.com/doc/refman/8.4/en/replication-rbr-safe-unsafe.html
This plugin may behave differently on different MySQL servers; therefore, statements depending on it could have different results. Trigger or stored program updates a table having an AUTO_INCREMENT column. When executed against a table that contains ... The “safeness” of a statement in MySQL replication refers to whether the statement and its effects can be replicated correctly using statement-based ...