Table of Contents
A.1.1. | Which version of MySQL is production-ready (GA)? |
MySQL 8.0, 5.7, and MySQL 5.6 are supported for production use. MySQL 8.0 achieved General Availability (GA) status with MySQL 8.0.11, which was released for production use on 19 April 2018. MySQL 5.7 achieved General Availability (GA) status with MySQL 5.7.9, which was released for production use on 21 October 2015. MySQL 5.6 achieved General Availability (GA) status with MySQL 5.6.10, which was released for production use on 5 February 2013. MySQL 5.5 achieved General Availability (GA) status with MySQL 5.5.8, which was released for production use on 3 December 2010. Active development for MySQL 5.5 has ended. MySQL 5.1 achieved General Availability (GA) status with MySQL 5.1.30, which was released for production use on 14 November 2008. Active development for MySQL 5.1 has ended. MySQL 5.0 achieved General Availability (GA) status with MySQL 5.0.15, which was released for production use on 19 October 2005. Active development for MySQL 5.0 has ended. | |
A.1.2. | Why did MySQL version numbering skip versions 6 and 7 and go straight to 8.0? |
Due to the many new and important features we were introducing in this MySQL version, we decided to start a fresh new series. As the series numbers 6 and 7 had actually been used before by MySQL, we went to 8.0. | |
A.1.3. | Can MySQL 8.0 do subqueries? |
Yes. See Section 13.2.11, “Subqueries”. | |
A.1.4. | Can MySQL 8.0 perform multiple-table inserts, updates, and deletes? |
Yes. For the syntax required to perform multiple-table updates, see Section 13.2.13, “UPDATE Statement”; for that required to perform multiple-table deletes, see Section 13.2.2, “DELETE Statement”.
A multiple-table insert can be accomplished using a trigger
whose | |
A.1.5. | Does MySQL 8.0 have Sequences? |
No. However, MySQL has an | |
A.1.6. |
Does MySQL 8.0 have a
|
Yes, see Section 11.2.6, “Fractional Seconds in Time Values”. | |
A.1.7. | Does MySQL 8.0 work with multi-core processors? |
Yes. MySQL is fully multithreaded, and makes use of all CPUs made available to it. Not all CPUs may be available; modern operating systems should be able to utilize all underlying CPUs, but also make it possible to restrict a process to a specific CPU or sets of CPUs. On Windows, there is currently a limit to the number of (logical) processors that mysqld can use: a single processor group, which is limited to a maximum of 64 logical processors. Use of multiple cores may be seen in these ways:
| |
A.1.8. | Why do I see multiple processes for mysqld? |
mysqld is a single-process program, not a multi-process program, and does not fork or launch other processes. However, mysqld is multithreaded and some process-reporting system utilities display separate entries for each thread of multithreaded processes, which may lead to the appearance of multiple mysqld processes when in fact there is only one. | |
A.1.9. | Can MySQL 8.0 perform ACID transactions? |
Yes. All current MySQL versions support transactions. The
The |
A.2.1. | Where can I obtain complete documentation for MySQL storage engines? |
See Chapter 16, Alternative Storage Engines. That chapter contains
information about all MySQL storage engines except for the
| |
A.2.2. | Are there any new storage engines in MySQL 8.0? |
No. | |
A.2.3. | Have any storage engines been removed in MySQL 8.0? |
The
In order to support partitioning of a given table, the storage
engine used for the table must now provide its own
(“native”) partitioning handler.
| |
A.2.4. | Can I prevent the use of a particular storage engine? |
Yes. The
| |
A.2.5. |
Is there an advantage to using the |
Yes. Using | |
A.2.6. |
What are the unique benefits of the |
The |
A.3.1. | What are server SQL modes? |
Server SQL modes define what SQL syntax MySQL should support and what kind of data validation checks it should perform. This makes it easier to use MySQL in different environments and to use MySQL together with other database servers. The MySQL Server apply these modes individually to different clients. For more information, see Section 5.1.11, “Server SQL Modes”. | |
A.3.2. | How many server SQL modes are there? |
Each mode can be independently switched on and off. See Section 5.1.11, “Server SQL Modes”, for a complete list of available modes. | |
A.3.3. | How do you determine the server SQL mode? |
You can set the default SQL mode (for mysqld
startup) with the | |
A.3.4. | Is the mode dependent on the database or connection? |
A mode is not linked to a particular database. Modes can be set
locally to the session (connection), or globally for the server.
you can change these settings using
| |
A.3.5. | Can the rules for strict mode be extended? |
When we refer to strict mode, we mean a
mode where at least one of the modes
| |
A.3.6. | Does strict mode impact performance? |
The intensive validation of input data that some settings requires more time than if the validation is not done. While the performance impact is not that great, if you do not require such validation (perhaps your application already handles all of this), then MySQL gives you the option of leaving strict mode disabled. However, if you do require it, strict mode can provide such validation. | |
A.3.7. | What is the default server SQL mode when MySQL 8.0 is installed? |
The default SQL mode in MySQL 8.0 includes these modes:
For information about all available modes and default MySQL behavior, see Section 5.1.11, “Server SQL Modes”. |
A.4.1. | Does MySQL 8.0 support stored procedures and functions? |
Yes. MySQL 8.0 supports two types of stored routines, stored procedures and stored functions. | |
A.4.2. | Where can I find documentation for MySQL stored procedures and stored functions? |
A.4.3. | Is there a discussion forum for MySQL stored procedures? |
Yes. See https://forums.mysql.com/list.php?98. | |
A.4.4. | Where can I find the ANSI SQL 2003 specification for stored procedures? |
Unfortunately, the official specifications are not freely available (ANSI makes them available for purchase). However, there are books, such as SQL-99 Complete, Really by Peter Gulutzan and Trudy Pelzer, that provide a comprehensive overview of the standard, including coverage of stored procedures. | |
A.4.5. | How do you manage stored routines? |
It is always good practice to use a clear naming scheme for your
stored routines. You can manage stored procedures with
| |
A.4.6. | Is there a way to view all stored procedures and stored functions in a given database? |
Yes. For a database named SELECT ROUTINE_TYPE, ROUTINE_NAME
FROM INFORMATION_SCHEMA.ROUTINES
WHERE ROUTINE_SCHEMA=' For more information, see Section 26.30, “The INFORMATION_SCHEMA ROUTINES Table”.
The body of a stored routine can be viewed using
| |
A.4.7. | Where are stored procedures stored? |
Stored procedures are stored in the
You can also use | |
A.4.8. | Is it possible to group stored procedures or stored functions into packages? |
No. This is not supported in MySQL 8.0. | |
A.4.9. | Can a stored procedure call another stored procedure? |
Yes. | |
A.4.10. | Can a stored procedure call a trigger? |
A stored procedure can execute an SQL statement, such as an
| |
A.4.11. | Can a stored procedure access tables? |
Yes. A stored procedure can access one or more tables as required. | |
A.4.12. | Do stored procedures have a statement for raising application errors? |
Yes. MySQL 8.0 implements the SQL standard
| |
A.4.13. | Do stored procedures provide exception handling? |
MySQL implements | |
A.4.14. | Can MySQL 8.0 stored routines return result sets? |
Stored procedures can, but stored functions
cannot. If you perform an ordinary
| |
A.4.15. |
Is |
Not in MySQL 8.0. | |
A.4.16. |
Is there a MySQL equivalent to using
|
There is no equivalent in MySQL 8.0. | |
A.4.17. | Can I pass an array as input to a stored procedure? |
Not in MySQL 8.0. | |
A.4.18. |
Can I pass a cursor as an |
In MySQL 8.0, cursors are available inside stored procedures only. | |
A.4.19. |
Can I return a cursor as an |
In MySQL 8.0, cursors are available inside stored
procedures only. However, if you do not open a cursor on a
| |
A.4.20. | Can I print out a variable's value within a stored routine for debugging purposes? |
Yes, you can do this in a stored procedure,
but not in a stored function. If you perform an ordinary
| |
A.4.21. | Can I commit or roll back transactions inside a stored procedure? |
Yes. However, you cannot perform transactional operations within a stored function. | |
A.4.22. | Do MySQL 8.0 stored procedures and functions work with replication? |
Yes, standard actions carried out in stored procedures and functions are replicated from a replication source server to a replica. There are a few limitations that are described in detail in Section 25.7, “Stored Program Binary Logging”. | |
A.4.23. | Are stored procedures and functions created on a replication source server replicated to a replica? |
Yes, creation of stored procedures and functions carried out
through normal DDL statements on a replication source server are
replicated to a replica, so that the objects exist on both
servers. | |
A.4.24. | How are actions that take place inside stored procedures and functions replicated? |
MySQL records each DML event that occurs in a stored procedure and replicates those individual actions to a replica. The actual calls made to execute stored procedures are not replicated. Stored functions that change data are logged as function invocations, not as the DML events that occur inside each function. | |
A.4.25. | Are there special security requirements for using stored procedures and functions together with replication? |
Yes. Because a replica has authority to execute any statement read from a source's binary log, special security constraints exist for using stored functions with replication. If replication or binary logging in general (for the purpose of point-in-time recovery) is active, then MySQL DBAs have two security options open to them:
| |
A.4.26. | What limitations exist for replicating stored procedure and function actions? |
Nondeterministic (random) or time-based actions embedded in
stored procedures may not replicate properly. By their very
nature, randomly produced results are not predictable and cannot
be exactly reproduced; therefore, random actions replicated to a
replica do not mirror those performed on a source. Declaring
stored functions to be In addition, time-based actions cannot be reproduced on a replica because the timing of such actions in a stored procedure is not reproducible through the binary log used for replication. It records only DML events and does not factor in timing constraints.
Finally, nontransactional tables for which errors occur during
large DML actions (such as bulk inserts) may experience
replication issues in that a source may be partially updated
from DML activity, but no updates are done to the replica
because of the errors that occurred. A workaround is for a
function's DML actions to be carried out with the
| |
A.4.27. | Do the preceding limitations affect the ability of MySQL to do point-in-time recovery? |
The same limitations that affect replication do affect point-in-time recovery. | |
A.4.28. | What is being done to correct the aforementioned limitations? |
You can choose either statement-based replication or row-based replication. The original replication implementation is based on statement-based binary logging. Row-based binary logging resolves the limitations mentioned earlier.
Mixed replication is also
available (by starting the server with
For additional information, see Section 17.2.1, “Replication Formats”. |
A.5.1. | Where can I find the documentation for MySQL 8.0 triggers? |
A.5.2. | Is there a discussion forum for MySQL Triggers? |
Yes. It is available at https://forums.mysql.com/list.php?99. | |
A.5.3. | Does MySQL 8.0 have statement-level or row-level triggers? |
In MySQL 8.0, all triggers are | |
A.5.4. | Are there any default triggers? |
Not explicitly. MySQL does have specific special behavior for
some | |
A.5.5. | How are triggers managed in MySQL? |
In MySQL 8.0, triggers can be created using the
Information about triggers can be obtained by querying the
| |
A.5.6. | Is there a way to view all triggers in a given database? |
Yes. You can obtain a listing of all triggers defined on
database SELECT TRIGGER_NAME, EVENT_MANIPULATION, EVENT_OBJECT_TABLE, ACTION_STATEMENT
FROM INFORMATION_SCHEMA.TRIGGERS
WHERE TRIGGER_SCHEMA=' For more information about this table, see Section 26.45, “The INFORMATION_SCHEMA TRIGGERS Table”.
You can also use the | |
A.5.7. | Where are triggers stored? |
Triggers are stored in the | |
A.5.8. | Can a trigger call a stored procedure? |
Yes. | |
A.5.9. | Can triggers access tables? |
A trigger can access both old and new data in its own table. A trigger can also affect other tables, but it is not permitted to modify a table that is already being used (for reading or writing) by the statement that invoked the function or trigger. | |
A.5.10. | Can a table have multiple triggers with the same trigger event and action time? |
In MySQL 8.0, it is possible to define multiple
triggers for a given table that have the same trigger event and
action time. For example, you can have two | |
A.5.11. | Can triggers call an external application through a UDF? |
Yes. For example, a trigger could invoke the
| |
A.5.12. | Is it possible for a trigger to update tables on a remote server? |
Yes. A table on a remote server could be updated using the
| |
A.5.13. | Do triggers work with replication? |
Yes. However, the way in which they work depends whether you are using MySQL's “classic” statement-based or row-based replication format. When using statement-based replication, triggers on the replica are executed by statements that are executed on the source (and replicated to the replica). When using row-based replication, triggers are not executed on the replica due to statements that were run on the source and then replicated to the replica. Instead, when using row-based replication, the changes caused by executing the trigger on the source are applied on the replica. For more information, see Section 17.5.1.36, “Replication and Triggers”. | |
A.5.14. | How are actions carried out through triggers on a source replicated to a replica? |
Again, this depends on whether you are using statement-based or row-based replication. Statement-based replication.
First, the triggers that exist on a source must be re-created
on the replica server. Once this is done, the replication flow
works as any other standard DML statement that participates in
replication. For example, consider a table
Row-based replication. When you use row-based replication, the changes caused by executing the trigger on the source are applied on the replica. However, the triggers themselves are not actually executed on the replica under row-based replication. This is because, if both the source and the replica applied the changes from the source and, in addition, the trigger causing these changes were applied on the replica, the changes would in effect be applied twice on the replica, leading to different data on the source and the replica. In most cases, the outcome is the same for both row-based and statement-based replication. However, if you use different triggers on the source and replica, you cannot use row-based replication. (This is because the row-based format replicates the changes made by triggers executing on the source to the replicas, rather than the statements that caused the triggers to execute, and the corresponding triggers on the replica are not executed.) Instead, any statements causing such triggers to be executed must be replicated using statement-based replication. For more information, see Section 17.5.1.36, “Replication and Triggers”. |
A.6.1. | Where can I find documentation covering MySQL Views? |
A.6.2. | Is there a discussion forum for MySQL Views? |
A.6.3. | What happens to a view if an underlying table is dropped or renamed? |
After a view has been created, it is possible to drop or alter a
table or view to which the definition refers. To check a view
definition for problems of this kind, use the
| |
A.6.4. | Does MySQL 8.0 have table snapshots? |
No. | |
A.6.5. | Does MySQL 8.0 have materialized views? |
No. | |
A.6.6. | Can you insert into views that are based on joins? |
It is possible, provided that your
You cannot insert into multiple tables with a single insert on a view. |
A.8.1. | Where can I find information on how to migrate from MySQL 5.7 to MySQL 8.0? |
For detailed upgrade information, see Section 2.11, “Upgrading MySQL”. Do not skip a major version when upgrading, but rather complete the process in steps, upgrading from one major version to the next in each step. This may seem more complicated, but ultimately saves time and trouble. If you encounter problems during the upgrade, their origin is easier to identify, either by you or, if you have a MySQL Enterprise subscription, by MySQL support. | |
A.8.2. | How has storage engine (table type) support changed in MySQL 8.0 from previous versions? |
Storage engine support has changed as follows:
|
A.9.1. | Where can I find documentation that addresses security issues for MySQL? |
The best place to start is Chapter 6, Security. Other portions of the MySQL Documentation which you may find useful with regard to specific security concerns include the following:
There is also the Secure Deployment Guide, which provides procedures for deploying a generic binary distribution of MySQL Enterprise Edition Server with features for managing the security of your MySQL installation. | |
A.9.2. | What is the default authentication plugin in MySQL 8.0? |
The default authentication plugin in MySQL 8.0 is
The For general information about pluggable authentication and other available authentication plugins, see Section 6.2.17, “Pluggable Authentication”, and Section 6.4.1, “Authentication Plugins”. | |
A.9.3. | Does MySQL 8.0 have native support for SSL? |
Most 8.0 binaries have support for SSL connections between the client and server. See Section 6.3, “Using Encrypted Connections”. You can also tunnel a connection using SSH, if (for example) the client application does not support SSL connections. For an example, see Section 6.3.4, “Connecting to MySQL Remotely from Windows with SSH”. | |
A.9.4. | Is SSL support built into MySQL binaries, or must I recompile the binary myself to enable it? |
Most 8.0 binaries have SSL enabled for client/server connections that are secured, authenticated, or both. See Section 6.3, “Using Encrypted Connections”. | |
A.9.5. | Does MySQL 8.0 have built-in authentication against LDAP directories? |
The Enterprise edition includes a PAM Authentication Plugin that supports authentication against an LDAP directory. | |
A.9.6. | Does MySQL 8.0 include support for Roles Based Access Control (RBAC)? |
Not at this time. |
In the following section, we answer questions that are frequently
asked about MySQL NDB Cluster and the
NDB
storage engine.
A.10.1. | Which versions of the MySQL software support NDB Cluster? Do I have to compile from source? |
NDB Cluster is not supported in standard MySQL Server 8.0 releases. Instead, MySQL NDB Cluster is provided as a separate product. Available NDB Cluster release series include the following:
You can obtain and compile NDB Cluster from source (see Section 23.2.1.4, “Building NDB Cluster from Source on Linux”, and Section 23.2.2.2, “Compiling and Installing NDB Cluster from Source on Windows”), but for all but the most specialized cases, we recommend using one of the following installers provided by Oracle that is appropriate to your operating platform and circumstances:
Installation packages may also be available from your platform's package management system.
You can determine whether your MySQL Server has
| |
A.10.2. | What do “NDB” and “NDBCLUSTER” mean? |
“NDB” stands for
“Network
Database”.
| |
A.10.3. | What is the difference between using NDB Cluster versus using MySQL Replication? |
In traditional MySQL replication, a source MySQL server updates
one or more replicas. Transactions are committed sequentially,
and a slow transaction can cause the replica to lag behind the
source. This means that if the source fails, it is possible that
the replica might not have recorded the last few transactions.
If a transaction-safe engine such as
In short, whereas standard MySQL replication is asynchronous, NDB Cluster is synchronous. Asynchronous replication is also available in NDB Cluster. NDB Cluster Replication (also sometimes known as “geo-replication”) includes the capability to replicate both between two NDB Clusters, and from an NDB Cluster to a non-Cluster MySQL server. See Section 23.6, “NDB Cluster Replication”. | |
A.10.4. | Do I need any special networking to run NDB Cluster? How do computers in a cluster communicate? |
NDB Cluster is intended to be used in a high-bandwidth environment, with computers connecting using TCP/IP. Its performance depends directly upon the connection speed between the cluster's computers. The minimum connectivity requirements for NDB Cluster include a typical 100-megabit Ethernet network or the equivalent. We recommend you use gigabit Ethernet whenever available. | |
A.10.5. | How many computers do I need to run an NDB Cluster, and why? |
A minimum of three computers is required to run a viable cluster. However, the minimum recommended number of computers in an NDB Cluster is four: one each to run the management and SQL nodes, and two computers to serve as data nodes. The purpose of the two data nodes is to provide redundancy; the management node must run on a separate machine to guarantee continued arbitration services in the event that one of the data nodes fails. To provide increased throughput and high availability, you should use multiple SQL nodes (MySQL Servers connected to the cluster). It is also possible (although not strictly necessary) to run multiple management servers. | |
A.10.6. | What do the different computers do in an NDB Cluster? |
An NDB Cluster has both a physical and logical organization, with computers being the physical elements. The logical or functional elements of a cluster are referred to as nodes, and a computer housing a cluster node is sometimes referred to as a cluster host. There are three types of nodes, each corresponding to a specific role within the cluster. These are:
| |
A.10.7. |
When I run the id=2 @10.100.10.32 (Version: 8.0.24-ndb-8.0.24 Nodegroup: 0, *)
What does the |
The simplest answer is, “It's not something you can control, and it's nothing that you need to worry about in any case, unless you're a software engineer writing or analyzing the NDB Cluster source code”. If you don't find that answer satisfactory, here's a longer and more technical version: A number of mechanisms in NDB Cluster require distributed coordination among the data nodes. These distributed algorithms and protocols include global checkpointing, DDL (schema) changes, and node restart handling. To make this coordination simpler, the data nodes “elect” one of their number to act as leader. There is no user-facing mechanism for influencing this selection, which is completely automatic; the fact that it is automatic is a key part of NDB Cluster's internal architecture. When a node acts as the “leader” for any of these mechanisms, it is usually the point of coordination for the activity, and the other nodes act as “followers”, carrying out their parts of the activity as directed by the leader. If the node acting as leader fails, then the remaining nodes elect a new leader. Tasks in progress that were being coordinated by the old leader may either fail or be continued by the new leader, depending on the actual mechanism involved.
It is possible for some of these different mechanisms and
protocols to have different leader nodes, but in general the
same leader is chosen for all of them. The node indicated as the
leader in the output of NDB Cluster is designed in such a way that the choice of leader has no discernible effect outside the cluster itself. For example, the current leader does not have significantly higher CPU or resource usage than the other data nodes, and failure of the leader should not have a significantly different impact on the cluster than the failure of any other data node. | |
A.10.8. | With which operating systems can I use NDB Cluster? |
NDB Cluster is supported on most Unix-like operating systems. NDB Cluster is also supported in production settings on Microsoft Windows operating systems. For more detailed information concerning the level of support which is offered for NDB Cluster on various operating system versions, operating system distributions, and hardware platforms, please refer to https://www.mysql.com/support/supportedplatforms/cluster.html. | |
A.10.9. | What are the hardware requirements for running NDB Cluster? |
NDB Cluster should run on any platform for which
| |
A.10.10. | How much RAM do I need to use NDB Cluster? Is it possible to use disk memory at all? |
NDB Cluster was originally implemented as in-memory only, but all versions currently available also provide the ability to store NDB Cluster on disk. See Section 23.5.10, “NDB Cluster Disk Data Tables”, for more information.
For in-memory (SizeofDatabase × NumberOfReplicas × 1.1 ) / NumberOfDataNodes To calculate the memory requirements more exactly requires determining, for each table in the cluster database, the storage space required per row (see Section 11.7, “Data Type Storage Requirements”, for details), and multiplying this by the number of rows. You must also remember to account for any column indexes as follows:
Creating NDB Cluster tables with
When calculating Cluster memory requirements, you may find
useful the ndb_size.pl utility which is
available in recent MySQL 8.0 releases. This Perl
script connects to a current (non-Cluster) MySQL database and
creates a report on how much space that database would require
if it used the
It is especially important to keep in mind that every
NDB Cluster table must have a primary key. The
You can determine how much memory is being used for storage of
NDB Cluster data and indexes at any given time using the
| |
A.10.11. | What file systems can I use with NDB Cluster? What about network file systems or network shares? |
Generally, any file system that is native to the host operating system should work well with NDB Cluster. If you find that a given file system works particularly well (or not so especially well) with NDB Cluster, we invite you to discuss your findings in the NDB Cluster Forums.
For Windows, we recommend that you use NDB Cluster is implemented as a shared-nothing solution; the idea behind this is that the failure of a single piece of hardware should not cause the failure of multiple cluster nodes, or possibly even the failure of the cluster as a whole. For this reason, the use of network shares or network file systems is not supported for NDB Cluster. This also applies to shared storage devices such as SANs. | |
A.10.12. | Can I run NDB Cluster nodes inside virtual machines (such as those created by VMWare, VirtualBox, Parallels, or Xen)? |
NDB Cluster is supported for use in virtual machines. We currently support and test using Oracle VM. Some NDB Cluster users have successfully deployed NDB Cluster using other virtualization products; in such cases, Oracle can provide NDB Cluster support, but issues specific to the virtual environment must be referred to that product's vendor. | |
A.10.13. | I am trying to populate an NDB Cluster database. The loading process terminates prematurely and I get an error message like this one:
Why is this happening? |
The cause is very likely to be that your setup does not provide
sufficient RAM for all table data and all indexes,
including the primary key required by the
It is also worth noting that all data nodes should have the same amount of RAM, since no data node in a cluster can use more memory than the least amount available to any individual data node. For example, if there are four computers hosting Cluster data nodes, and three of these have 3GB of RAM available to store Cluster data while the remaining data node has only 1GB RAM, then each data node can devote at most 1GB to NDB Cluster data and indexes.
In some cases it is possible to get Table is
full errors in MySQL client applications even when
ndb_mgm -e "ALL REPORT MEMORYUSAGE" shows
significant free
For similar reasons, you can also sometimes encounter problems
with data node restarts on nodes that are heavily loaded with
data. The | |
A.10.14. | NDB Cluster uses TCP/IP. Does this mean that I can run it over the Internet, with one or more nodes in remote locations? |
It is very unlikely that a cluster would perform reliably under such conditions, as NDB Cluster was designed and implemented with the assumption that it would be run under conditions guaranteeing dedicated high-speed connectivity such as that found in a LAN setting using 100 Mbps or gigabit Ethernet—preferably the latter. We neither test nor warrant its performance using anything slower than this. Also, it is extremely important to keep in mind that communications between the nodes in an NDB Cluster are not secure; they are neither encrypted nor safeguarded by any other protective mechanism. The most secure configuration for a cluster is in a private network behind a firewall, with no direct access to any Cluster data or management nodes from outside. (For SQL nodes, you should take the same precautions as you would with any other instance of the MySQL server.) For more information, see Section 23.5.17, “NDB Cluster Security Issues”. | |
A.10.15. | Do I have to learn a new programming or query language to use NDB Cluster? |
No. Although some specialized commands are used to manage and configure the cluster itself, only standard (My)SQL statements are required for the following operations:
Some specialized configuration parameters and files are required to set up an NDB Cluster—see Section 23.3.3, “NDB Cluster Configuration Files”, for information about these. A few simple commands are used in the NDB Cluster management client (ndb_mgm) for tasks such as starting and stopping cluster nodes. See Section 23.5.1, “Commands in the NDB Cluster Management Client”. | |
A.10.16. | What programming languages and APIs are supported by NDB Cluster? |
NDB Cluster supports the same programming APIs and languages as the standard MySQL Server, including ODBC, .Net, the MySQL C API, and numerous drivers for popular scripting languages such as PHP, Perl, and Python. NDB Cluster applications written using these APIs behave similarly to other MySQL applications; they transmit SQL statements to a MySQL Server (in the case of NDB Cluster, an SQL node), and receive responses containing rows of data. For more information about these APIs, see Chapter 29, Connectors and APIs.
NDB Cluster also supports application programming using the NDB
API, which provides a low-level C++ interface to NDB Cluster
data without needing to go through a MySQL Server. See
The NDB API. In addition, many
NDB Cluster also supports Java application programming using ClusterJ, which supports a domain object model of data using sessions and transactions. See Java and NDB Cluster, for more information.
In addition, NDB Cluster provides support for
NDB Cluster also includes adapters supporting NoSQL applications
written against | |
A.10.17. | Does NDB Cluster include any management tools? |
NDB Cluster includes a command line client for performing basic management functions. See Section 23.4.5, “ndb_mgm — The NDB Cluster Management Client”, and Section 23.5.1, “Commands in the NDB Cluster Management Client”. NDB Cluster 7.6 and earlier are also supported by MySQL Cluster Manager, a separate product providing an advanced command line interface that can automate many NDB Cluster management tasks such as rolling restarts and configuration changes. Beginning with version 1.4.8, MySQL Cluster Manager also provides experimental support for NDB Cluster 8.0. For more information about MySQL Cluster Manager, see MySQL™ Cluster Manager 1.4.8 User Manual. NDB Cluster also provides a graphical, browser-based Auto-Installer for setting up and deploying NDB Cluster, as part of the NDB Cluster software distribution. For more information, see The NDB Cluster Auto-Installer (NDB 7.5) (No longer supported). | |
A.10.18. | How do I find out what an error or warning message means when using NDB Cluster? |
There are two ways in which this can be done:
| |
A.10.19. | Is NDB Cluster transaction-safe? What isolation levels are supported? |
Yes. For tables created with the
| |
A.10.20. | What storage engines are supported by NDB Cluster? |
NDB Cluster requires the
It is possible to create tables using other storage engines
(such as
NDB Cluster is quite different from
| |
A.10.21. | In the event of a catastrophic failure— for example, the whole city loses power and my UPS fails—would I lose all my data? |
All committed transactions are logged. Therefore, although it is possible that some data could be lost in the event of a catastrophe, this should be quite limited. Data loss can be further reduced by minimizing the number of operations per transaction. (It is not a good idea to perform large numbers of operations per transaction in any case.) | |
A.10.22. |
Is it possible to use |
| |
A.10.23. | Can I run multiple nodes on a single computer? |
It is possible but not always advisable. One of the chief reasons to run a cluster is to provide redundancy. To obtain the full benefits of this redundancy, each node should reside on a separate machine. If you place multiple nodes on a single machine and that machine fails, you lose all of those nodes. For this reason, if you do run multiple data nodes on a single machine, it is extremely important that they be set up in such a way that the failure of this machine does not cause the loss of all the data nodes in a given node group. Given that NDB Cluster can be run on commodity hardware loaded with a low-cost (or even no-cost) operating system, the expense of an extra machine or two is well worth it to safeguard mission-critical data. It also worth noting that the requirements for a cluster host running a management node are minimal. This task can be accomplished with a 300 MHz Pentium or equivalent CPU and sufficient RAM for the operating system, plus a small amount of overhead for the ndb_mgmd and ndb_mgm processes. It is acceptable to run multiple cluster data nodes on a single host that has multiple CPUs, cores, or both. The NDB Cluster distribution also provides a multithreaded version of the data node binary intended for use on such systems. For more information, see Section 23.4.3, “ndbmtd — The NDB Cluster Data Node Daemon (Multi-Threaded)”. It is also possible in some cases to run data nodes and SQL nodes concurrently on the same machine; how well such an arrangement performs is dependent on a number of factors such as number of cores and CPUs as well as the amount of disk and memory available to the data node and SQL node processes, and you must take these factors into account when planning such a configuration. | |
A.10.24. | Can I add data nodes to an NDB Cluster without restarting it? |
It is possible to add new data nodes to a running NDB Cluster without taking the cluster offline. For more information, see Section 23.5.7, “Adding NDB Cluster Data Nodes Online”. For other types of NDB Cluster nodes, a rolling restart is all that is required (see Section 23.5.5, “Performing a Rolling Restart of an NDB Cluster”). | |
A.10.25. | Are there any limitations that I should be aware of when using NDB Cluster? |
Limitations on
For a complete listing of limitations in NDB Cluster, see Section 23.1.7, “Known Limitations of NDB Cluster”. See also Section 23.1.7.11, “Previous NDB Cluster Issues Resolved in NDB Cluster 8.0”. | |
A.10.26. | Does NDB Cluster support foreign keys? |
NDB Cluster provides support for foreign key constraints which
is comparable to that found in the
| |
A.10.27. | How do I import an existing MySQL database into an NDB Cluster? |
You can import databases into NDB Cluster much as you would with
any other version of MySQL. Other than the limitations mentioned
elsewhere in this FAQ, the only other special requirement is
that any tables to be included in the cluster must use the
It is also possible to convert existing tables that use other
storage engines to | |
A.10.28. | How do NDB Cluster nodes communicate with one another? |
Cluster nodes can communicate through any of three different transport mechanisms: TCP/IP, SHM (shared memory), and SCI (Scalable Coherent Interface). Where available, SHM is used by default between nodes residing on the same cluster host; however, this is considered experimental. SCI is a high-speed (1 gigabit per second and higher), high-availability protocol used in building scalable multi-processor systems; it requires special hardware and drivers. See Section 23.3.4, “Using High-Speed Interconnects with NDB Cluster”, for more about using SCI as a transport mechanism for NDB Cluster. | |
A.10.29. | What is an arbitrator? |
If one or more data nodes in a cluster fail, it is possible that not all cluster data nodes are able to “see” one another. In fact, it is possible that two sets of data nodes might become isolated from one another in a network partitioning, also known as a “split-brain” scenario. This type of situation is undesirable because each set of data nodes tries to behave as though it is the entire cluster. An arbitrator is required to decide between the competing sets of data nodes.
When all data nodes in at least one node group are alive,
network partitioning is not an issue, because no single subset
of the cluster can form a functional cluster on its own. The
real problem arises when no single node group has all its nodes
alive, in which case network partitioning (the
“split-brain” scenario) becomes possible. Then an
arbitrator is required. All cluster nodes recognize the same
node as the arbitrator, which is normally the management server;
however, it is possible to configure any of the MySQL Servers in
the cluster to act as the arbitrator instead. The arbitrator
accepts the first set of cluster nodes to contact it, and tells
the remaining set to shut down. Arbitrator selection is
controlled by the The role of arbitrator does not in and of itself impose any heavy demands upon the host so designated, and thus the arbitrator host does not need to be particularly fast or to have extra memory especially for this purpose. | |
A.10.30. | What data types are supported by NDB Cluster? |
NDB Cluster supports all of the usual MySQL data types,
including those associated with MySQL's spatial extensions;
however, the
Note
NDB Cluster Disk Data tables (that is, tables created with
See Section 23.1.7, “Known Limitations of NDB Cluster”, for more information about these issues. | |
A.10.31. | How do I start and stop NDB Cluster? |
It is necessary to start each node in the cluster separately, in the following order:
Each of these commands must be run from a system shell on the
machine housing the affected node. (You do not have to be
physically present at the machine—a remote login shell can
be used for this purpose.) You can verify that the cluster is
running by starting the
To shut down a running cluster, issue the command
shell>
(The quotation marks in this example are optional, since there
are no spaces in the command string following the
Either of these commands causes the ndb_mgm, ndb_mgm, and any ndbd processes to terminate gracefully. MySQL servers running as SQL nodes can be stopped using mysqladmin shutdown. For more information, see Section 23.5.1, “Commands in the NDB Cluster Management Client”, and Section 23.2.6, “Safe Shutdown and Restart of NDB Cluster”. MySQL Cluster Manager and the NDB Cluster Auto-Installer provide additional ways to handle starting ansd stopping of NDB Cluster nodes. See MySQL™ Cluster Manager 1.4.8 User Manual, and Section 23.2.8, “The NDB Cluster Auto-Installer (No longer supported)”, for more information about these tools. | |
A.10.32. | What happens to NDB Cluster data when the NDB Cluster is shut down? |
The data that was held in memory by the cluster's data nodes is written to disk, and is reloaded into memory the next time that the cluster is started. | |
A.10.33. | Is it a good idea to have more than one management node for an NDB Cluster? |
It can be helpful as a fail-safe. Only one management node controls the cluster at any given time, but it is possible to configure one management node as primary, and one or more additional management nodes to take over in the event that the primary management node fails. See Section 23.3.3, “NDB Cluster Configuration Files”, for information on how to configure NDB Cluster management nodes. | |
A.10.34. | Can I mix different kinds of hardware and operating systems in one NDB Cluster? |
Yes, as long as all machines and operating systems have the same “endianness” (all big-endian or all little-endian). It is also possible to use software from different NDB Cluster releases on different nodes. However, we support such use only as part of a rolling upgrade procedure (see Section 23.5.5, “Performing a Rolling Restart of an NDB Cluster”). | |
A.10.35. | Can I run two data nodes on a single host? Two SQL nodes? |
Yes, it is possible to do this. In the case of multiple data nodes, it is advisable (but not required) for each node to use a different data directory. If you want to run multiple SQL nodes on one machine, each instance of mysqld must use a different TCP/IP port. Running data nodes and SQL nodes together on the same host is possible, but you should be aware that the ndbd or ndbmtd processes may compete for memory with mysqld. | |
A.10.36. | Can I use host names with NDB Cluster? |
Yes, it is possible to use DNS and DHCP for cluster hosts. However, if your application requires “five nines” availability, you should use fixed (numeric) IP addresses, since making communication between Cluster hosts dependent on services such as DNS and DHCP introduces additional potential points of failure. | |
A.10.37. | Does NDB Cluster support IPv6? |
IPv6 is supported for connections between SQL nodes (MySQL servers), but connections between all other types of NDB Cluster nodes must use IPv4. In practical terms, this means that you can use IPv6 for replication between NDB Clusters, but connections between nodes in the same NDB Cluster must use IPv4. For more information, see Section 23.6.3, “Known Issues in NDB Cluster Replication”. | |
A.10.38. | How do I handle MySQL users in an NDB Cluster having multiple MySQL servers? |
MySQL user accounts and privileges are normally not
automatically propagated between different MySQL servers
accessing the same NDB Cluster. MySQL NDB Cluster provides
support for shared and synchronized users and privileges using
the | |
A.10.39. | How do I continue to send queries in the event that one of the SQL nodes fails? |
MySQL NDB Cluster does not provide any sort of automatic failover between SQL nodes. Your application must be prepared to handle the loss of SQL nodes and to fail over between them. | |
A.10.40. | How do I back up and restore an NDB Cluster? |
You can use the NDB Cluster native backup and restore functionality in the NDB management client and the ndb_restore program. See Section 23.5.8, “Online Backup of NDB Cluster”, and Section 23.4.23, “ndb_restore — Restore an NDB Cluster Backup”. You can also use the traditional functionality provided for this purpose in mysqldump and the MySQL server. See Section 4.5.4, “mysqldump — A Database Backup Program”, for more information. | |
A.10.41. | What is an “angel process”? |
This process monitors and, if necessary, attempts to restart the data node process. If you check the list of active processes on your system after starting ndbd, you can see that there are actually 2 processes running by that name, as shown here (we omit the output from ndb_mgmd and ndbd for brevity): shell>
The ndbd process showing
|
This set of Frequently Asked Questions derives from the experience of MySQL's Support and Development groups in handling many inquiries about CJK (Chinese-Japanese-Korean) issues.
A.11.1. | What CJK character sets are available in MySQL? | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
The list of CJK character sets may vary depending on your MySQL
version. For example, the mysql> (For more information, see Section 26.4, “The INFORMATION_SCHEMA CHARACTER_SETS Table”.)
MySQL supports three variants of the
GB (Guojia
Biaozhun, or National
Standard, or Simplified Chinese)
character sets which are official in the People's Republic of
China:
Sometimes people try to insert
Here, we try to clarify exactly what characters are legitimate
in
It is also possible to store CJK characters in Unicode character sets, although the available collations may not sort characters quite as you expect:
The collation used for a Unicode character set determines the ability to sort (that is, distinguish) characters in the set:
Moreover, distinguishing characters is not the same as ordering
them per the conventions of a given CJK language. Currently,
MySQL has only one CJK-specific UCA collation,
For information about Unicode collations and their differentiating properties, including collation properties for supplementary characters, see Section 10.10.1, “Unicode Character Sets”. | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
A.11.2. |
I have inserted CJK characters into my table. Why does
| ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
This problem is usually due to a setting in MySQL that does not match the settings for the application program or the operating system. Here are some common steps for correcting these types of issues:
| |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
A.11.3. | What problems should I be aware of when working with the Big5 Chinese character set? | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
MySQL supports the Big5 character set which is common in Hong
Kong and Taiwan (Republic of China). The MySQL
A feature request for adding | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
A.11.4. | Why do Japanese character set conversions fail? | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
MySQL supports the
In the following conversion table, the
Now consider the following portion of the table.
This means that MySQL converts the | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
A.11.5. |
What should I do if I want to convert SJIS
| ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Our answer is: “?”. There are disadvantages to
this, and many people would prefer a “loose”
conversion, so that | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
A.11.6. |
How does MySQL represent the Yen ( | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
A problem arises because some versions of Japanese character
sets (both
MySQL follows only one version of the JIS (Japanese Industrial
Standards) standard description. In MySQL,
| |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
A.11.7. | Of what issues should I be aware when working with Korean character sets in MySQL? | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
In theory, while there have been several versions of the
mysql> | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
A.11.8. | Why do I get Incorrect string value error messages? | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
To see the problem, create a table with one Unicode
( mysql>
In nonstrict SQL mode, try to place the rare character
mysql>
The mysql>
So it is a warning about the mysql> SELECT ucs2,HEX(ucs2),gb2312,HEX(gb2312) FROM ch; +-------+--------------+--------+-------------+ | ucs2 | HEX(ucs2) | gb2312 | HEX(gb2312) | +-------+--------------+--------+-------------+ | A汌B | 00416C4C0042 | A?B | 413F42 | +-------+--------------+--------+-------------+ Several things need explanation here:
| |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
A.11.9. | Why does my GUI front end or browser display CJK characters incorrectly in my application using Access, PHP, or another API? | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Obtain a direct connection to the server using the
mysql client, and try the same query there.
If mysql responds correctly, the trouble may
be that your application interface requires initialization. Use
mysql to tell you what character set or sets
it uses with the statement <% Session.CodePage=0 Dim strConnection Dim Conn strConnection="driver={MySQL ODBC 3.51 Driver};server=
In much the same way, if you are using any character set other
than If you are using PHP, try this: <?php $link = new mysqli($host, $usr, $pwd, $db); if( mysqli_connect_errno() ) { printf("Connect failed: %s\n", mysqli_connect_error()); exit(); } $link->query("SET NAMES 'utf8'"); ?>
In this case, we used
Another issue often encountered in PHP applications has to do
with assumptions made by the browser. Sometimes adding or
changing a If you are using Connector/J, see Using Character Sets and Unicode. | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
A.11.10. | I've upgraded to MySQL 8.0. How can I revert to behavior like that in MySQL 4.0 with regard to character sets? | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
In MySQL Version 4.0, there was a single “global” character set for both server and client, and the decision as to which character to use was made by the server administrator. This changed starting with MySQL Version 4.1. What happens now is a “handshake”, as described in Section 10.4, “Connection Character Sets and Collations”:
The effect of this is that you cannot control the client
character set by starting mysqld with
By way of example, suppose that your favorite server character
set is mysqld --character-set-server=latin1
And then start the client with the default character set
mysql --default-character-set=utf8
The resulting settings can be seen by viewing the output of
mysql> Now stop the client, and stop the server using mysqladmin. Then start the server again, but this time tell it to skip the handshake like so: mysqld --character-set-server=utf8 --skip-character-set-client-handshake
Start the client with mysql>
As you can see by comparing the differing results from
| |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
A.11.11. |
Why do some | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
For +-------------------------+---------------------------+ | OCTET_LENGTH(_utf8 'A') | OCTET_LENGTH(_utf8 'ペ') | +-------------------------+---------------------------+ | 1 | 3 | +-------------------------+---------------------------+
If we do not know where the first character in a string ends, we
do not know where the second character begins, in which case
even very simple searches such as
This is one reason why MySQL cannot permit encodings of nonexistent characters. If it is not strict about rejecting bad input, it has no way of knowing where characters end.
For | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
A.11.12. |
How do I know whether character | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
The majority of simplified Chinese and basic nonhalfwidth
Japanese Kana characters appear in all CJK character sets. The
following stored procedure accepts a DELIMITER // CREATE PROCEDURE p_convert(ucs2_char CHAR(1) CHARACTER SET ucs2) BEGIN CREATE TABLE tj (ucs2 CHAR(1) character set ucs2, utf8 CHAR(1) character set utf8, big5 CHAR(1) character set big5, cp932 CHAR(1) character set cp932, eucjpms CHAR(1) character set eucjpms, euckr CHAR(1) character set euckr, gb2312 CHAR(1) character set gb2312, gbk CHAR(1) character set gbk, sjis CHAR(1) character set sjis, ujis CHAR(1) character set ujis); INSERT INTO tj (ucs2) VALUES (ucs2_char); UPDATE tj SET utf8=ucs2, big5=ucs2, cp932=ucs2, eucjpms=ucs2, euckr=ucs2, gb2312=ucs2, gbk=ucs2, sjis=ucs2, ujis=ucs2; /* If there are conversion problems, UPDATE produces warnings. */ SELECT hex(ucs2) AS ucs2, hex(utf8) AS utf8, hex(big5) AS big5, hex(cp932) AS cp932, hex(eucjpms) AS eucjpms, hex(euckr) AS euckr, hex(gb2312) AS gb2312, hex(gbk) AS gbk, hex(sjis) AS sjis, hex(ujis) AS ujis FROM tj; DROP TABLE tj; END// DELIMITER ;
The input can be any single mysql>
Since none of the column values is | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
A.11.13. | Why do CJK strings sort incorrectly in Unicode? (I) | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
CJK sorting problems that occurred in older MySQL versions can
be solved as of MySQL 8.0 by using the
| |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
A.11.14. | Why do CJK strings sort incorrectly in Unicode? (II) | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
CJK sorting problems that occurred in older MySQL versions can
be solved as of MySQL 8.0 by using the
| |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
A.11.15. | Why are my supplementary characters rejected by MySQL? | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Supplementary characters lie outside the Unicode Basic
Multilingual Plane / Plane 0. BMP characters have
code point values between To store supplementary characters, you must use a character set that permits them:
| |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
A.11.16. | Should “CJK” be “CJKV”? | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
No. The term “CJKV” (Chinese Japanese Korean Vietnamese) refers to Vietnamese character sets which contain Han (originally Chinese) characters. MySQL supports the modern Vietnamese script with Western characters, but does not support the old Vietnamese script using Han characters. As of MySQL 5.6, there are Vietnamese collations for Unicode character sets, as described in Section 10.10.1, “Unicode Character Sets”. | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
A.11.17. | Does MySQL permit CJK characters to be used in database and table names? | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Yes. | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
A.11.18. | Where can I find translations of the MySQL Manual into Chinese, Japanese, and Korean? | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
The Japanese translation of the MySQL 5.6 manual can be downloaded from https://dev.mysql.com/doc/. | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
A.11.19. | Where can I get help with CJK and related issues in MySQL? | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
The following resources are available:
|
For common questions, issues, and answers relating to the MySQL Connectors and other APIs, see the following areas of the Manual:
Frequently asked questions about MySQL C API and libmysql.
A.13.1. | What is “MySQL Native C API”? What are typical benefits and use cases? |
libmysql is a C-based API that you can use in C applications to connect with the MySQL database server. It is also itself used as the foundation for drivers for standard database APIs like ODBC, Perl's DBI, and Python's DB API. | |
A.13.2. | Which version of libmysql should I use? |
For MySQL 8.0, 5.7, 5.6, and 5.5, we recommend libmysql 8.0. | |
A.13.3. | What if I want to use the “NoSQL” X DevAPI? |
For C-language and X DevApi Document Store for MySQL 8.0, we recommend MySQL Connector/C++. Connector/C++ 8.0 has compatible C headers. (This is not applicable to MySQL 5.7 or before.) | |
A.13.4. | How to I download libmysql? |
| |
A.13.5. | Where is the documentation? |
A.13.6. | How do I report bugs? |
Please report any bugs or inconsistencies you observe to our Bugs Database. Select the C API Client as shown. | |
A.13.7. | Is it possible to compile the library myself? |
Yes, you can download the libmysqlclient source code and compile it on your own. Here's an example: $ git clone --depth 1 https://github.com/mysql/mysql-server $ cd mysql-server $ mkdir build $ cd build $ cmake .. -GNinja -DDOWNLOAD_BOOST=1 \ -DWITH_BOOST=/tmp -DCMAKE_BUILD_TYPE=Release -DWITHOUT_SERVER=ON \ -DWITH_SSL=system $ ninja libmysqlclient.a $ ls -la archive_output_directory/libmysqlclient.a -rw-rw-r-- 1 kg kg 8,5M wrz 5 04:57 archive_output_directory/libmysqlclient.a
Note
This example uses https://ninja-build.org/ as a build system instead of make.
|
In the following section, we provide answers to questions that are most frequently asked about MySQL Replication.
A.14.1. | Must the replica be connected to the source all the time? |
No, it does not. The replica can go down or stay disconnected for hours or even days, and then reconnect and catch up on updates. For example, you can set up a source/replica relationship over a dial-up link where the link is up only sporadically and for short periods of time. The implication of this is that, at any given time, the replica is not guaranteed to be in synchrony with the source unless you take some special measures. To ensure that catchup can occur for a replica that has been disconnected, you must not remove binary log files from the source that contain information that has not yet been replicated to the replicas. Asynchronous replication can work only if the replica is able to continue reading the binary log from the point where it last read events. | |
A.14.2. | Must I enable networking on my source and replica to enable replication? |
Yes, networking must be enabled on the source and replica. If
networking is not enabled, the replica cannot connect to the
source and transfer the binary log. Verify that the
| |
A.14.3. | How do I know how late a replica is compared to the source? In other words, how do I know the date of the last statement replicated by the replica? |
Check the
When the replication SQL thread executes an event read from the
source, it modifies its own time to the event timestamp. (This
is why | |
A.14.4. | How do I force the source to block updates until the replica catches up? |
Use the following procedure:
| |
A.14.5. | What issues should I be aware of when setting up two-way replication? |
MySQL replication currently does not support any locking protocol between source and replica to guarantee the atomicity of a distributed (cross-server) update. In other words, it is possible for client A to make an update to co-source 1, and in the meantime, before it propagates to co-source 2, client B could make an update to co-source 2 that makes the update of client A work differently than it did on co-source 1. Thus, when the update of client A makes it to co-source 2, it produces tables that are different from what you have on co-source 1, even after all the updates from co-source 2 have also propagated. This means that you should not chain two servers together in a two-way replication relationship unless you are sure that your updates can safely happen in any order, or unless you take care of mis-ordered updates somehow in the client code. You should also realize that two-way replication actually does not improve performance very much (if at all) as far as updates are concerned. Each server must do the same number of updates, just as you would have a single server do. The only difference is that there is a little less lock contention because the updates originating on another server are serialized in one replication thread. Even this benefit might be offset by network delays. | |
A.14.6. | How can I use replication to improve performance of my system? |
Set up one server as the source and direct all writes to it.
Then configure as many replicas as you have the budget and
rackspace for, and distribute the reads among the source and the
replicas. You can also start the replicas with the
| |
A.14.7. | What should I do to prepare client code in my own applications to use performance-enhancing replication? |
See the guide to using replication as a scale-out solution, Section 17.4.5, “Using Replication for Scale-Out”. | |
A.14.8. | When and how much can MySQL replication improve the performance of my system? |
MySQL replication is most beneficial for a system that processes frequent reads and infrequent writes. In theory, by using a single-source/multiple-replica setup, you can scale the system by adding more replicas until you either run out of network bandwidth, or your update load grows to the point that the source cannot handle it.
To determine how many replicas you can use before the added
benefits begin to level out, and how much you can improve
performance of your site, you must know your query patterns, and
determine empirically by benchmarking the relationship between
the throughput for reads and writes on a typical source and a
typical replica. The example here shows a rather simplified
calculation of what you can get with replication for a
hypothetical system. Let
Let's say that system load consists of 10% writes and 90% reads,
and we have determined by benchmarking that
9 *
The last equation indicates the maximum number of writes for
This analysis yields the following conclusions:
These computations assume infinite network bandwidth and neglect
several other factors that could be significant on your system.
In many cases, you may not be able to perform a computation
similar to the one just shown that accurately predicts what
happens on your system if you add
| |
A.14.9. | How can I use replication to provide redundancy or high availability? |
How you implement redundancy is entirely dependent on your application and circumstances. High-availability solutions (with automatic failover) require active monitoring and either custom scripts or third party tools to provide the failover support from the original MySQL server to the replica. To handle the process manually, you should be able to switch from a failed source to a pre-configured replica by altering your application to talk to the new server or by adjusting the DNS for the MySQL server from the failed server to the new server. For more information and some example solutions, see Section 17.4.8, “Switching Sources During Failover”. | |
A.14.10. | How do I tell whether a replication source server is using statement-based or row-based binary logging format? |
Check the value of the
mysql>
The value shown is always one of | |
A.14.11. | How do I tell a replica to use row-based replication? |
Replicas automatically know which format to use. | |
A.14.12. |
How do I prevent |
Start the server with the
| |
A.14.13. | Does replication work on mixed operating systems (for example, the source runs on Linux while replicas run on OS X and Windows)? |
Yes. | |
A.14.14. | Does replication work on mixed hardware architectures (for example, the source runs on a 64-bit machine while replicas run on 32-bit machines)? |
Yes. |
A.15.1. | What is the Thread Pool and what problem does it solve? |
The MySQL Thread Pool is a MySQL server plugin that extends the default connection-handling capabilities of the MySQL server to limit the number of concurrently executing statements/queries and transactions to ensure that each has sufficient CPU and memory resources to fulfill its task. For MySQL 8.0, the Thread Pool plugin is included in MySQL Enterprise Edition, a commercial product. The default thread-handling model in MySQL Server executes statements using one thread per client connection. As more clients connect to the server and execute statements, overall performance degrades. The Thread Pool plugin provides an alternative thread-handling model designed to reduce overhead and improve performance. The Thread Pool plugin increases server performance by efficiently managing statement execution threads for large numbers of client connections, especially on modern multi-CPU/Core systems. For more information, see Section 5.6.3, “MySQL Enterprise Thread Pool”. | |
A.15.2. | How does the Thread Pool limit and manage concurrent sessions and transactions for optimal performance and throughput? |
The Thread Pool uses a “divide and conquer” approach to limiting and balancing concurrency. Unlike the default connection handling of the MySQL Server, the Thread Pool separates connections and threads, so there is no fixed relationship between connections and the threads that execute statements received from those connections. The Thread Pool then manages client connections within configurable thread groups, where they are prioritized and queued based on the nature of the work they were submitted to accomplish. For more information, see Section 5.6.3.3, “Thread Pool Operation”. | |
A.15.3. | How is the Thread Pool different from the client side Connection Pool? |
The MySQL Connection Pool operates on the client side to ensure that a MySQL client does not constantly connect to and disconnect from the MySQL server. It is designed to cache idle connections in the MySQL client for use by other users as they are needed. This minimizes the overhead and expense of establishing and tearing down connections as queries are submitted to the MySQL server. The MySQL Connection Pool has no visibility as to the query handling capabilities or load of the back-end MySQL server. By contrast, the Thread Pool operates on the MySQL server side and is designed to manage the execution of inbound concurrent connections and queries as they are received from the client connections accessing the back-end MySQL database. Because of the separation of duties, the MySQL Connection Pool and Thread Pool are orthogonal and can be used independent of each other. MySQL Connection Pooling via the MySQL Connectors is covered in Chapter 29, Connectors and APIs. | |
A.15.4. | When should I use the Thread Pool? |
There are a few rules of thumb to consider for optimal Thread Pool use cases:
The MySQL
If you are using the
Lastly, if your workload comprises mainly short queries, the Thread Pool should be beneficial. To learn more, see Section 5.6.3.4, “Thread Pool Tuning”. | |
A.15.5. | Are there recommended Thread Pool configurations? |
The Thread Pool has a number of user case driven configuration parameters that affect its performance. To learn about these and tips on tuning, see Section 5.6.3.4, “Thread Pool Tuning”. |
A.16.1. | What types of operations modify secondary indexes and result in change buffering? |
| |
A.16.2. |
What is the benefit of the |
Buffering secondary index changes when secondary index pages are not in the buffer pool avoids expensive random access I/O operations that would be required to immediately read in affected index pages from disk. Buffered changes can be applied later, in batches, as pages are read into the buffer pool by other read operations. | |
A.16.3. | Does the change buffer support other types of indexes? |
No. The change buffer only supports secondary indexes. Clustered indexes, full-text indexes, and spatial indexes are not supported. Full-text indexes have their own caching mechanism. | |
A.16.4. |
How much space does |
Prior to the introduction of the
In MySQL 5.6 and later, the
Change buffer pages are not required to persist in the buffer pool and may be evicted by LRU operations. | |
A.16.5. | How do I determine the current size of the change buffer? |
The current size of the change buffer is reported by
------------------------------------- INSERT BUFFER AND ADAPTIVE HASH INDEX ------------------------------------- Ibuf: size 1, free list len 0, seg size 2, 0 merges Relevant data points include:
For information about monitoring change buffer status, see Section 15.5.2, “Change Buffer”. | |
A.16.6. | When does change buffer merging occur? |
| |
A.16.7. | When is the change buffer flushed? |
Updated pages are flushed by the same flushing mechanism that flushes the other pages that occupy the buffer pool. | |
A.16.8. | When should the change buffer be used? |
The change buffer is a feature designed to reduce random I/O to
secondary indexes as indexes grow larger and no longer fit in
the | |
A.16.9. | When should the change buffer not be used? |
You might consider disabling the change buffer if the entire
data set fits within the | |
A.16.10. | Where can I find additional information about the change buffer? |
A.17.1. | Is data decrypted for users who are authorized to see it? |
Yes. | |
A.17.2. |
What is the overhead associated with |
There is no additional storage overhead. According to internal benchmarks, performance overhead amounts to a single digit percentage difference. | |
A.17.3. |
What are the encryption algorithms used with
|
| |
A.17.4. |
Is it possible to use 3rd party encryption algorithms in place
of the one provided by the |
No, it is not possible to use other encryption algorithms. The provided encryption algorithm is broadly accepted. | |
A.17.5. | Can indexed columns be encrypted? |
| |
A.17.6. |
What data types and data lengths does |
| |
A.17.7. | Does data remain encrypted on the network? |
Data encrypted by the | |
A.17.8. | Does database memory contain cleartext or encrypted data? |
With | |
A.17.9. | How do I know which data to encrypt? |
Compliance with the PCI-DSS standard requires that credit card numbers (Primary Account Number, or 'PAN') be stored in encrypted form. Breach Notification Laws (for example, CA SB 1386, CA AB 1950, and similar laws in 43+ more US states) require encryption of first name, last name, driver license number, and other PII data. In early 2008, CA AB 1298 added medical and health insurance information to PII data. Additionally, industry specific privacy and security standards may require encryption of certain assets. For example, assets such as pharmaceutical research results, oil field exploration results, financial contracts, or personal data of law enforcement informants may require encryption. In the health care industry, the privacy of patient data, health records and X-ray images is of the highest importance. | |
A.17.10. |
How is |
There are symmetric and asymmetric encryption APIs in MySQL that
can be used to manually encrypt data within the database.
However, the application must manage encryption keys and perform
required encryption and decryption operations by calling API
functions. | |
A.17.11. |
Does the transportable tablespaces feature work with
|
Yes. It is supported for encrypted file-per-table tablespaces. For more information, see Exporting Encrypted Tablespaces. | |
A.17.12. |
Does compression work with |
Customers using | |
A.17.13. |
Can I use mysqlpump or
|
Yes. Because these utilities create logical backups, the data dumped from encrypted tables is not encrypted. | |
A.17.14. | How do I change (rotate, re-key) the master encryption key? |
| |
A.17.15. |
How do I migrate data from a cleartext |
Transferring data from one tablespace to another is not
required. To encrypt data in an |
A.18.1. | Is MySQL supported on virtualized environments such as Oracle VM, VMWare, Docker, Microsoft Hyper-V, or others? |
MySQL is supported on virtualized environments, but is certified only for Oracle VM. Contact Oracle Support for more information. Be aware of potential problems when using virtualization software. The usual ones are related to performance, performance degradations, slowness, or unpredictability of disk, I/O, network, and memory. |