Search icon
Subscription
0
Cart icon
Close icon
You have no products in your basket yet
Save more on your purchases!
Savings automatically calculated. No voucher code required
Arrow left icon
All Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Newsletters
Free Learning
Arrow right icon
MySQL 8 Administrator???s Guide

You're reading from  MySQL 8 Administrator???s Guide

Product type Book
Published in Feb 2018
Publisher Packt
ISBN-13 9781788395199
Pages 510 pages
Edition 1st Edition
Languages
Authors (4):
Chintan Mehta Chintan Mehta
Profile icon Chintan Mehta
Ankit K Bhavsar Ankit K Bhavsar
Profile icon Ankit K Bhavsar
Hetal Oza Hetal Oza
Profile icon Hetal Oza
Subhash Shah Subhash Shah
Profile icon Subhash Shah
View More author details

Table of Contents (17) Chapters

Preface 1. An Introduction to MYSQL 8 2. Installing and Upgrading MySQL 8 3. MySQL 8 – Using Programs and Utilities 4. MySQL 8 Data Types 5. MySQL 8 Database Management 6. MySQL 8 Storage Engines 7. Indexing in MySQL 8 8. Replication in MySQL 8 9. Partitioning in MySQL 8 10. MySQL 8 – Scalability and High Availability 11. MySQL 8 – Security 12. Optimizing MySQL 8 13. Extending MySQL 8 14. MySQL 8 Best Practices and Benchmarking 15. Troubleshooting MySQL 8 16. Other Books You May Enjoy

Several types of storage engines

In this section, we will take a closer look at the widely used storage engines that are supported by MySQL 8. But before checking on them, let us see how the storage engine architecture has made it pluggable and provided flexibility to enable using multiple storage engines in the same schema or server.

The following is the list of storage engines supported in MySQL 8:

  • InnoDB: The default storage engine for MySQL 8. It is an ACID compliant (transaction-safe) storage engine that has commit, roll back, and crash-recovery for protecting the user data and referential-integrity constraints to maintain data integrity, and much more.
  • MyISAM: The storage engine with tables having a small footprint. It has table-level locking and so is mostly used in read-only or read-mostly data workloads, such as in data warehousing and web configurations.
  • Memory: The...
lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $15.99/month. Cancel anytime}