Overview I have recently started learning MySQL related knowledge. I have organized and shared it based on the knowledge points I have learned and my own understanding. This article will analyze the execution process of the next SQL statement in MySQL, including how SQL queries flow inside MySQL and how SQL statements are updated. 1. Analysis of MySQL architecture The following is a brief architecture diagram of MySQL: MySQL is mainly divided into Server layer and storage engine layer Server layer : mainly includes connectors, query cache, analyzer, optimizer, executor, etc. All cross-storage engine functions are implemented in this layer, such as stored procedures, triggers, views, functions, etc. There is also a general log module binglog log module. Storage engine : Mainly responsible for data storage and reading, it adopts a replaceable plug-in architecture and supports multiple storage engines such as InnoDB, MyISAM, Memory, etc. Among them, the InnoDB engine has its own log module redolog module. InnoDB version 5.5.5 is used as the default engine. Connectors It is mainly responsible for user login to the database and user identity authentication, including verification of account password, permissions and other operations. If the user account password is passed, the connector will query all permissions of the user in the permission table. After that, the permission logic judgment in this connection will depend on the permission data read at this time. In other words, as long as the connection is not disconnected, the user will not be affected even if the administrator modifies the user's permissions. Query Cache After the connection is established, when executing a query statement, the cache will be queried first. Mysql will first verify whether the SQL has been executed and cache it in the memory in the form of Key-Value. The Key is the query estimate and the Value is the result set. If the cache key is hit, it will be returned directly to the client. If it is not hit, subsequent operations will be performed and the results will be cached after completion for the next call. Of course, when the cache query is actually executed, the user's permissions will still be checked to see if there are query conditions for the table. It is not recommended to use cache for Mysql query, because for frequently updated data, the effective time of cache is too short, and the effect is often not good. For data that is not frequently updated, it is still possible to use cache. The cache function was deleted after Mysql version 8.0. The official also believes that this function has relatively few actual application scenarios, so it was simply deleted. Analyzer If mysql does not hit the cache, it will enter the analyzer, which is mainly used to analyze the purpose of the SQL statement. The analyzer is also divided into several steps: The first step is lexical analysis. An SQL statement consists of multiple strings. First, we need to extract keywords, such as select, propose the query table, propose the field name, propose the query conditions, and so on. After completing these operations, you will enter the second step. The second step, syntax analysis, is mainly to determine whether the SQL you entered is correct and whether it conforms to the MySQL syntax. After completing these two steps, MySQL is ready to start executing, but how to execute it and how to execute it to get the best result? This is when the optimizer comes into play. Optimizer The role of the optimizer is to execute the optimal execution plan it deems (although sometimes it is not optimal), such as how to choose an index when there are multiple indexes, how to choose the association order when querying multiple tables, etc. Actuator After the execution plan is selected, MySQL is ready to start executing. First, it will check whether the user has permission before execution. If the user does not have permission, an error message will be returned. If the user has permission, the engine interface will be called and the result of the interface execution will be returned. 2. Statement Analysis 2.1 Query Statement Having said so much above, how is a SQL statement executed? In fact, our sql can be divided into two types, one is query and the other is update (add, update, delete). Let's analyze the query statement first. The statement is as follows: select * from tb_student A where A.age='18' and A.name='张三'; Combined with the above description, we analyze the execution flow of this statement:
a. First query the student table whose name is "Zhang San", and then determine whether his age is 18. The optimizer then selects the solution with the best execution efficiency based on its own optimization algorithm (the optimizer believes that this may not always be the best solution). Then after confirming the execution plan, you are ready to start execution. Perform permission check. If there is no permission, an error message will be returned. If there is permission, the database engine interface will be called and the engine's execution result will be returned. 2.2 Update Statement The above is the execution process of a query SQL, so let's take a look at how an update statement is executed? The sql statement is as follows: update tb_student A set A.age='19' where A.name='张三'; Let's modify Zhang San's age. In the actual database, this age field will definitely not be set, otherwise you will be beaten by the technical director. In fact, this statement will basically follow the process of the previous query, but it is necessary to record logs when executing updates, which will introduce the log module. The log module that comes with MySQL is binlog (archive log), which can be used by all storage engines. The commonly used InnoDB engine also comes with a log module redo log. We will discuss the execution process of this statement in InnoDB mode. The process is as follows:
Some students will definitely ask here, why do we need two logging modules? Can't we use one logging module? This is the previous MySQL mode. The MyISAM engine does not have a redo log, so we know that it does not support transactions. So it does not mean that only one log module cannot be used, but the InnoDB engine supports transactions through redo log. Then, some students may ask, can I use two log modules but not make it so complicated? Why does redo log need to introduce the prepare pre-commit status? Here we use proof by contradiction to explain why we do this?
If the redo log two-phase commit method is adopted, the situation will be different. After writing the binglog, submitting the redo log will prevent the above problems from occurring, thus ensuring data consistency. So the question is, is there an extreme situation? Assume that the redo log is in the pre-commit state and the binglog has been written. What will happen if an abnormal restart occurs at this time? This depends on the processing mechanism of MySQL. The processing process of MySQL is as follows:
This solves the problem of data consistency. Conclusion
IV. Reference "Building a MySQL knowledge network together" The above is a detailed explanation of how a SQL statement is executed in MySQL. I hope it will be helpful to you. If you have any questions, please leave me a message and I will reply to you in time. I would also like to thank everyone for their support of the 123WORDPRESS.COM website! You may also be interested in:
|
<<: Vue implementation counter case
Table of contents origin status quo Cancel reques...
The <base> tag specifies the default addres...
I was curious about how to access the project usi...
Table of contents Overview Getting started with d...
Table of contents 1. Introduction to NFS-Ganesha ...
Table of contents Summarize <template> <...
Preface When the code runs and an error occurs, w...
This article shares the specific code for impleme...
Azure Container Registry is a managed, dedicated ...
Table of contents style scoped style module State...
1. Basic implementation of limit In general, the ...
0. When I made this document, it was around Decem...
Background Recently, I encountered such a problem...
Some optimization rules for browser web pages Pag...
Mac node delete and reinstall delete node -v sudo...