-
- Section 12.1.1, “
ALTER DATABASE
Syntax” - Section 11.18.2, “
DECIMAL
Data Type Changes” - Section 12.4.1.3, “
GRANT
Syntax” - Section 11.6.1, “Arithmetic Operators”
- Section 11.9.2, “Boolean Full-Text Searches”
- Section 10.7, “Choosing the Right Type for a Column”
- Section 11.7, “Date and Time Functions”
- Section 4.2.1, “Invoking MySQL Programs”
- Section 5.2.4.3, “Mixed Binary Logging Format”
- Section 8.1.2, “Numbers”
- Section 10.2, “Numeric Types”
- Section 10.1.1, “Overview of Numeric Types”
- Section 11.5.2, “Regular Expressions”
- Section 5.1.2, “Server Command Options”
- Section 5.1.4, “Server System Variables”
- Section 5.4.3, “Specifying Account Names”
- Section 4.2.3.1, “Using Options on the Command Line”
--log-bin
- Section 12.5.2.1, “
CHANGE MASTER TO
Syntax” - Section 12.5.1.1, “
PURGE BINARY LOGS
Syntax” - Section 6.3.3, “Backup Strategy Summary”
- Section 17.1.3.4, “Binary Log Options and Variables”
- Section 19.7, “Binary Logging of Stored Programs”
- Section 6.2, “Database Backup Methods”
- Section 6.3.1, “Establishing a Backup Policy”
- Section 17.4.6, “How to Report Replication Bugs or Problems”
- Section 23.5.1.7, “Making a Test Case If You Experience Table Corruption”
- Section 6.5, “Point-in-Time (Incremental) Recovery Using the Binary Log”
- Section 17.4.4, “Replication FAQ”
- Section 17.1.3.3, “Replication Slave Options and Variables”
- Section 5.1.2, “Server Command Options”
- Section 5.2.6, “Server Log Maintenance”
- Section 5.1.4, “Server System Variables”
- Section 17.3.6, “Switching Masters During Failover”
- Section 5.2.4, “The Binary Log”
- Section 5.2.3, “The General Query Log”
- Section 17.4.5, “Troubleshooting Replication”
- Section 17.4.3, “Upgrading a Replication Setup”
- Section 6.3.2, “Using Backups for Recovery”
--password
- Section 4.5.1.1, “mysql Options”
- Section 5.5.2, “Adding User Accounts”
- Section 5.4.7, “Causes of Access-Denied Errors”
- Section 4.2.2, “Connecting to the MySQL Server”
- Description
- Description
- Description
- Description
- Description
- Description
- Description
- Description
- Section 5.3.2.2, “End-User Guidelines for Password Security”
- Section 6.3, “Example Backup and Recovery Strategy”
- Section 5.5.6.1, “Installing and Using Authentication Plugins”
- Section 4.2.1, “Invoking MySQL Programs”
- Section C.5.2.5, “Password Fails When Entered Interactively”
- Section 5.5.1, “User Names and Passwords”
- Section 4.2.3.1, “Using Options on the Command Line”
--replicate-do-db
- Section 12.4.5.35, “
SHOW SLAVE STATUS
Syntax” - Section 12.3.1, “
START TRANSACTION
,
COMMIT
, and
ROLLBACK
Syntax” - Section 17.1.3.4, “Binary Log Options and Variables”
- Section 17.2.3.1, “Evaluation of Database-Level Replication and Binary Logging Options”
- Section 17.2.3, “How Servers Evaluate Replication Filtering Rules”
- Section 17.3.4, “Replicating Different Databases to Different Slaves”
- Section 17.1.3.3, “Replication Slave Options and Variables”
- Section 17.4.1.22, “Replication and Reserved Words”
- Section 17.4.1.19, “Replication and Temporary Tables”
- Section 17.1.2.2, “Safe and Unsafe Statements in Logging and Replication”
- Section 5.2.4, “The Binary Log”
--replicate-ignore-db
- Section 12.4.5.35, “
SHOW SLAVE STATUS
Syntax” - Section 12.3.1, “
START TRANSACTION
,
COMMIT
, and
ROLLBACK
Syntax” - Section 17.1.3.4, “Binary Log Options and Variables”
- Section 17.2.3.1, “Evaluation of Database-Level Replication and Binary Logging Options”
- Section 17.2.3, “How Servers Evaluate Replication Filtering Rules”
- Section 17.2.3.3, “Replication Rule Application”
- Section 17.1.3.3, “Replication Slave Options and Variables”
- Section 17.4.1.22, “Replication and Reserved Words”
- Section 17.1.2.2, “Safe and Unsafe Statements in Logging and Replication”
- Section 5.2.4, “The Binary Log”
--skip-grant-tables
- Section 12.4.3.2, “
CREATE FUNCTION
Syntax for User-Defined
Functions” - Section 12.4.3.4, “
INSTALL PLUGIN
Syntax” - Section 5.4.7, “Causes of Access-Denied Errors”
- Section 23.3.2.5, “Compiling and Installing User-Defined Functions”
- Description
- Description
- Section 12.4.3.1, “Installing and Uninstalling Plugins”
- Section 5.5.6.1, “Installing and Using Authentication Plugins”
- Section 2.11.4, “MySQL Source-Configuration Options”
- Section C.5.4.1.3, “Resetting the Root Password: Generic Instructions”
- Section 5.3.4, “Security-Related mysqld Options”
- Section 5.1.2, “Server Command Options”
- Section 9.1.11, “Upgrading from Previous to Current Unicode Support”
- Section 4.2.3.1, “Using Options on the Command Line”
- Section 5.4.6, “When Privilege Changes Take Effect”
--user
- Section C.5.2.18, “'
File
' Not Found and
Similar Errors” - Description
- Description
- Description
- Section 6.3, “Example Backup and Recovery Strategy”
- Section 2.11.2, “Installing MySQL from a Standard Source Distribution”
- Section 2.10, “Installing MySQL on i5/OS”
- Section 5.5.6.1, “Installing and Using Authentication Plugins”
- Section 4.2.1, “Invoking MySQL Programs”
- Section 4.2.3.5, “Option Defaults, Options Expecting Values, and the
=
Sign” - Section 5.1.2, “Server Command Options”
- Section 5.5.1, “User Names and Passwords”
- Section 4.2.3.3, “Using Option Files”
--verbose
- Section 4.6.3.1, “myisamchk General Options”
- Section 4.5.1.1, “mysql Options”
- Section 4.6.7.2, “mysqlbinlog Row Event Display”
- Section 17.1.2.1, “Comparison of Statement-Based and Row-Based Replication”
- Description
- Description
- Description
- Description
- Description
- Description
- Description
- Description
- Description
- Description
- Description
- Description
- Description
- Description
- Description
- Description
- Description
- Description
- Section 4.5.1.5, “Executing SQL Statements from a Text File”
- Section 4.6.3.4, “Other myisamchk Options”
- Section 17.1.2.2, “Safe and Unsafe Statements in Logging and Replication”
- Section 5.1.2, “Server Command Options”
- Section 5.1.4, “Server System Variables”
- Section 7.11.2, “Tuning Server Parameters”
- Section 4.2.3.3, “Using Option Files”
- Section 4.2.3.1, “Using Options on the Command Line”
-p
- Section 4.6.3.3, “myisamchk Repair Options”
- Section 4.5.1.1, “mysql Options”
- Section 18.2.5, “
KEY
Partitioning” - Section 5.5.2, “Adding User Accounts”
- Section 5.4.7, “Causes of Access-Denied Errors”
- Section 4.2.2, “Connecting to the MySQL Server”
- Section 3.3.1, “Creating and Selecting a Database”
- Description
- Description
- Description
- Description
- Description
- Description
- Description
- Description
- Section 5.3.2.2, “End-User Guidelines for Password Security”
- Section 4.2.1, “Invoking MySQL Programs”
- Section C.5.2.5, “Password Fails When Entered Interactively”
- Section 5.5.1, “User Names and Passwords”
- Section 4.2.3.1, “Using Options on the Command Line”
db
- Section 12.4.5.30, “
SHOW PROCESSLIST
Syntax” - Section 22.9.3.3, “
mysql_change_user()
” - Section 22.9.3.8, “
mysql_create_db()
” - Section 22.9.3.11, “
mysql_drop_db()
” - Section 22.9.3.52, “
mysql_real_connect()
” - Section 22.9.3.60, “
mysql_select_db()
” - Section 5.4.5, “Access Control, Stage 2: Request Verification”
- Section 5.5.2, “Adding User Accounts”
- Section 22.9.1, “C API Data Structures”
- Section 5.4.7, “Causes of Access-Denied Errors”
- Description
- Section 7.12.5, “Examining Thread Information”
- Section 5.4.2, “Privilege System Grant Tables”
- Section 5.4.1, “Privileges Provided by MySQL”
- Section E.7, “Restrictions on Character Sets”
- Section 20.27, “The
INFORMATION_SCHEMA PARAMETERS
Table” - Section 20.23, “The
INFORMATION_SCHEMA PROCESSLIST
Table” - Section 20.14, “The
INFORMATION_SCHEMA ROUTINES
Table”
length
- Section 22.9.3.34, “
mysql_hex_string()
” - Section 22.9.3.53, “
mysql_real_escape_string()
” - Section 22.9.3.54, “
mysql_real_query()
” - Section 22.9.7.11, “
mysql_stmt_fetch()
” - Section 22.9.7.21, “
mysql_stmt_prepare()
” - Section 22.9.7.26, “
mysql_stmt_send_long_data()
” - Section 22.9.1, “C API Data Structures”
- Section 22.9.5, “C API Prepared Statement Data Structures”
- Section 23.2.4.3.1, “Full-Text Parser Plugin Data Structures and Functions”
- Section 23.2.5, “Writing Plugins”
mysql
- Section 4.5.1.1, “mysql Options”
- Section 4.5.1.4, “mysql Server-Side Help”
- Section 12.4.3.2, “
CREATE FUNCTION
Syntax for User-Defined
Functions” - Section 12.1.13, “
CREATE SERVER
Syntax” - Section 12.4.1.1, “
CREATE USER
Syntax” - Section C.5.2.4, “
Client does not support authentication protocol
” - Section 12.4.3.3, “
DROP FUNCTION
Syntax” - Section 12.4.1.2, “
DROP USER
Syntax” - Section 12.4.6.3, “
FLUSH
Syntax” - Section 12.4.1.3, “
GRANT
Syntax” - Section 12.8.3, “
HELP
Syntax” - Section C.5.2.9, “
MySQL server has gone away
” - Section 12.4.1.4, “
RENAME USER
Syntax” - Section 12.4.1.5, “
REVOKE
Syntax” - Section 12.4.1.6, “
SET PASSWORD
Syntax” - Section 12.4.5.22, “
SHOW GRANTS
Syntax” - Section 22.9.3.3, “
mysql_change_user()
” - Section 22.9.10.1, “
mysql_client_find_plugin()
” - Section 22.9.10.2, “
mysql_client_register_plugin()
” - Section 22.9.3.5, “
mysql_close()
” - Section 22.9.3.14, “
mysql_errno()
” - Section 22.9.3.15, “
mysql_error()
” - Section 22.9.3.33, “
mysql_get_ssl_cipher()
” - Section 22.9.3.36, “
mysql_init()
” - Section 22.9.10.3, “
mysql_load_plugin()
” - Section 22.9.3.53, “
mysql_real_escape_string()
” - Section 22.9.3.60, “
mysql_select_db()
” - Section 22.9.3.67, “
mysql_ssl_set()
” - Section 22.9.7.10, “
mysql_stmt_execute()
” - Section 22.9.7.11, “
mysql_stmt_fetch()
” - Section 22.9.7.26, “
mysql_stmt_send_long_data()
” - Section 5.4.4, “Access Control, Stage 1: Connection Verification”
- Section 12.4.1, “Account Management Statements”
- Section 5.5.2, “Adding User Accounts”
- Section 5.3.2.1, “Administrator Guidelines for Password Security”
- Section 5.5.5, “Assigning Account Passwords”
- Section 22.9.15, “C API Prepared Statement Handling of Date and Time Values”
- Section 5.4.7, “Causes of Access-Denied Errors”
- Section 17.1.2.1, “Comparison of Statement-Based and Row-Based Replication”
- Section 23.3.2.5, “Compiling and Installing User-Defined Functions”
- Section 9.1.4, “Connection Character Sets and Collations”
- Chapter 22, Connectors and APIs
- Section 13.6.5.2, “Converting Tables from Other Storage Engines to
InnoDB
” - Section 13.11.2.1, “Creating a
FEDERATED
Table Using
CONNECTION
” - Section 17.1.1.6, “Creating a Data Snapshot Using Raw Data Files”
- Section 3.3, “Creating and Using a Database”
- Description
- Description
- Description
- Section 7.11.4.2, “Enabling Large Page Support”
- Section 6.3.1, “Establishing a Backup Policy”
- Section 2.4.1, “General Notes on Installing MySQL on Mac OS X”
- Section 5.3.1, “General Security Guidelines”
- Section 7.9.3.1, “How the Query Cache Operates”
- Section 17.1.1, “How to Set Up Replication”
- Section 13.6.1, “InnoDB as the Default MySQL Storage Engine”
- Section 2.5.1, “Installing MySQL from RPM Packages on Linux”
- Section 2.11.2, “Installing MySQL from a Standard Source Distribution”
- Section 2.4, “Installing MySQL on Mac OS X”
- Section 2.6.2, “Installing MySQL on OpenSolaris using IPS”
- Section 2.6, “Installing MySQL on Solaris and OpenSolaris”
- Section 2.6.1, “Installing MySQL on Solaris using a Solaris
PKG
” - Section 5.2.4.4, “Logging Format for Changes to
mysql
Database Tables” - Section 5.3.3, “Making MySQL Secure Against Attackers”
- Section 5.2.4.3, “Mixed Binary Logging Format”
- Section 22.10, “MySQL PHP API”
- Section 9.6, “MySQL Server Time Zone Support”
- Section 12.3.5.3, “Other Table-Locking Notes”
- Section 4.1, “Overview of MySQL Programs”
- Section 5.3.2.3, “Password Hashing in MySQL”
- Section 5.4.2, “Privilege System Grant Tables”
- Section 5.4.1, “Privileges Provided by MySQL”
- Section 17.4.4, “Replication FAQ”
- Section 17.4.1.10, “Replication and
FLUSH
” - Section 17.4.1.20, “Replication of the
mysql
System Database” - Section C.5.4.1.2, “Resetting the Root Password: Unix Systems”
- Section 13.6.15, “Limits on
InnoDB
Tables” - Section E.7, “Restrictions on Character Sets”
- Section E.1, “Restrictions on Stored Routines, Triggers, and Events”
- Section 8.2, “Schema Object Names”
- Section 5.2.1, “Selecting General Query and Slow Query Log Output Destinations”
- Section 5.1.2, “Server Command Options”
- Section 5.1.8, “Server-Side Help”
- Section 5.5.4, “Setting Account Resource Limits”
- Section 5.4.3, “Specifying Account Names”
- Section 5.6.1.1, “Starting Multiple Windows Servers at the Command Line”
- Section 12.3.3, “Statements That Cause an Implicit Commit”
- Section 9.6.1, “Staying Current with Time Zone Changes”
- Section 5.4, “The MySQL Access Privilege System”
- Section 23.2, “The MySQL Plugin API”
- Section 9.1.11, “Upgrading from Previous to Current Unicode Support”
- Section 5.5.1, “User Names and Passwords”
- Section 13.6.3.1, “Using Raw Devices for the Shared Tablespace”
- Section 5.5.8.2, “Using SSL Connections”
- Section 23.5.1.6, “Using Server Logs to Find Causes of Errors in mysqld”
- Section 19.2, “Using Stored Routines (Procedures and Functions)”
- Section 1.5, “What Is New in MySQL 5.5”
performance_schema
- Section 12.3.5, “
LOCK TABLES
and
UNLOCK
TABLES
Syntax” - Section 12.4.5.16, “
SHOW ENGINE
Syntax” - Description
- Section 7.9.3.1, “How the Query Cache Operates”
- Section 13.6.1, “InnoDB as the Default MySQL Storage Engine”
- Section 7.12.4, “Measuring Performance with
performance_schema
” - Chapter 21, MySQL Performance Schema
- Section 21.2.1, “Performance Schema Build Configuration”
- Section 21.6, “Performance Schema General Table Characteristics”
- Section 21.1, “Performance Schema Quick Start”
- Section E.8, “Performance Schema Restrictions”
- Section 21.7.1, “Performance Schema Setup Tables”
- Section 21.3, “Performance Schema Status Monitoring”
- Section 21.7, “Performance Schema Table Descriptions”
- Section 21.8, “Performance Schema and Plugins”
- Section 19.3, “Using Triggers”
test
- Section 13.6.14.2.3, “
InnoDB
Table Monitor Output” - Section 12.2.7, “
LOAD XML
Syntax” - Section 12.4.5.19, “
SHOW EVENTS
Syntax” - Section 9.1.7.9, “Collation and
INFORMATION_SCHEMA
Searches” - Section 11.4, “Control Flow Functions”
- Section 13.6.5, “Creating and Using
InnoDB
Tables” - Section 3.3, “Creating and Using a Database”
- Description
- Description
- Section 6.4.5.4, “Dumping Table Definitions and Content Separately”
- Section 3.6, “Examples of Common Queries”
- Section 8.2.4, “Function Name Parsing and Resolution”
- Section 4.2.1, “Invoking MySQL Programs”
- Section 7.2.4, “Optimizing
INFORMATION_SCHEMA
Queries” - Section 17.1.3.3, “Replication Slave Options and Variables”
- Section 19.2.1, “Stored Routine Syntax”
- Section 20.19, “The
INFORMATION_SCHEMA PARTITIONS
Table” - Section 4.2.3.1, “Using Options on the Command Line”
type
- Section 12.4.3.2, “
CREATE FUNCTION
Syntax for User-Defined
Functions” - Section 7.8.2, “
EXPLAIN
Output Format” - Section 13.6.14.2.3, “
InnoDB
Table Monitor Output” - Section 22.9.10.1, “
mysql_client_find_plugin()
” - Section 22.9.10.3, “
mysql_load_plugin()
” - Section 22.9.1, “C API Data Structures”
- Section 23.2.4.4, “Client Plugin API Data Structures”
- Section 23.2.4.3.1, “Full-Text Parser Plugin Data Structures and Functions”
- Section 23.2.4.1, “General Plugin Data Structures and Functions”
- Section 7.2.1.4, “How to Avoid Table Scans”
- Section 7.13.2, “Index Merge Optimization”
- Section 23.2.4.2, “Plugin Status and System Variables”
- Section 20.14, “The
INFORMATION_SCHEMA ROUTINES
Table”
user
- Section 12.4.1.2, “
DROP USER
Syntax” - Section C.5.2.15, “
Ignoring user
” - Section 22.9.3.49, “
mysql_options()
” - Section 22.9.3.52, “
mysql_real_connect()
” - Section 5.4.4, “Access Control, Stage 1: Connection Verification”
- Section 5.4.5, “Access Control, Stage 2: Request Verification”
- Section 5.5.2, “Adding User Accounts”
- Section 5.3.2.1, “Administrator Guidelines for Password Security”
- Section 5.5.5, “Assigning Account Passwords”
- Section 5.5.10, “Auditing MySQL Account Activity”
- Section 5.4.7, “Causes of Access-Denied Errors”
- Section 3.1, “Connecting to and Disconnecting from the Server”
- Section 13.6.5.2, “Converting Tables from Other Storage Engines to
InnoDB
” - Description
- Section 11.13, “Encryption and Compression Functions”
- Section 5.3.1, “General Security Guidelines”
- Section 5.3.6, “How to Run MySQL as a Normal User”
- Section 5.3.3, “Making MySQL Secure Against Attackers”
- Section 5.3.2.3, “Password Hashing in MySQL”
- Section 5.4.2, “Privilege System Grant Tables”
- Section 5.4.1, “Privileges Provided by MySQL”
- Section E.7, “Restrictions on Character Sets”
- Section 5.1.2, “Server Command Options”
- Section 5.5.4, “Setting Account Resource Limits”
- Section 5.4.3, “Specifying Account Names”
- Section 5.5.1, “User Names and Passwords”
- Section 5.5.8.2, “Using SSL Connections”
- Section 11.11, “XML Functions”