https://dev.mysql.com/dbug-package.html
Here are some example debug control strings as they might be specified on a shell command line: --debug=d:t --debug=d:f,main,subr1:F:L:t,20 --debug=d,input,output,files:n --debug=d:t:i:O,\\mysqld.trace For mysqld, it is also possible to change DBUG ... The MySQL server and most MySQL clients are compiled with the DBUG package originally created by Fred ...
https://dev.mysql.com/ddl-rewriter-options.html
If values specified at startup time are incorrect, the ddl_rewriter plugin may fail to initialize properly and the server does not load it. This section describes the command options that control operation of the ddl_rewriter plugin. To control ...
https://dev.mysql.com/debugging-server.html
If mysqld starts to eat up CPU or memory or if it “hangs,” you can use mysqladmin processlist status to find out if someone is executing a query that takes a long time. If you are using some functionality that is very new in MySQL, you can try ...
https://dev.mysql.com/delete-optimization.html
The time required to delete individual rows in a MyISAM table is exactly proportional to the number of indexes. To delete rows more quickly, you can increase the size of the key cache by increasing the key_buffer_size system variable. To delete all ...
https://dev.mysql.com/derived-tables.html
For information about lateral derived tables preceded by the LATERAL keyword, see Section 13.2.11.9, “Lateral Derived Tables”. A derived table is an expression that generates a table within the scope of a query FROM clause. For example, a ...
https://dev.mysql.com/documenters-translators.html
And a lot of spelling/language fixes for the FAQ (that turned into the MySQL manual a long time ago). The following people have helped us with writing the MySQL documentation and translating the documentation or error messages in MySQL. Paul DuBois ...
https://dev.mysql.com/enterprise-encryption-functions.html
Some general considerations in choosing key lengths and encryption algorithms: The strength of encryption for private and public keys increases with the key size, but the time for key generation increases as well. MySQL Enterprise Encryption ...
https://dev.mysql.com/enterprise-encryption-installation.html
This differs from their use at function invocation time, for which you can use any lettercase. MySQL Enterprise Encryption functions are located in a user-defined function (UDF) library file installed in the plugin directory (the directory named by ...
https://dev.mysql.com/enum.html
An ENUM is a string object with a value chosen from a list of permitted values that are enumerated explicitly in the column specification at table creation time. It has these advantages: Compact data storage in situations where a column has a ...
https://dev.mysql.com/error-log-destination-configuration.html
This is true even for writers such as log_sink_json that can be enabled multiple times; all instances write to the console. This section discusses which server options configure the default error log destination, which can be the console or a named ...