Book Image

Advanced MySQL 8

By : Eric Vanier, Birju Shah, Tejaswi Malepati
Book Image

Advanced MySQL 8

By: Eric Vanier, Birju Shah, Tejaswi Malepati

Overview of this book

Advanced MySQL 8 teaches you to enhance your existing database infrastructure and build various tools to improve your enterprise applications and overall website performance. The book starts with the new and exciting MySQL 8.0 features and how to utilize them for maximum efficiency. As you make your way through the chapters, you will learn to optimize MySQL performance using indexes and advanced data query techniques for large queries. You will also discover MySQL Server 8.0 settings and work with the MySQL data dictionary to boost the performance of your database. In the concluding chapters, you will cover MySQL 8.0 Group Replication, which will enable you to create elastic, highly available, and fault-tolerant replication topologies. You will also explore backup and recovery techniques for your databases and understand important tips and tricks to help your critical data reach its full potential. By the end of this book, you’ll have learned about new MySQL 8.0 security features that allow a database administrator (DBA) to simplify user management and increase the security of their multi-user environments.
Table of Contents (13 chapters)
11
Advanced MySQL Performance Tips and Techniques

MySQL 8.0 security features

MySQL 8.0 is continuing in the same vein as that set by MySQL 5.7—to be secure by default. The Oracle MySQL development team has added a number of interesting security features, including, SQL roles, making the ACL statements atomic, and also dynamic global privileges.

Another aspect that has been improved is the keyring API.

New MySQL 8.0 roles will give you better access controls:

  • An easy way to manage user and application rights
  • As compliant with standards as is feasible in practice
  • Multiple default roles

MySQL 8.0 provides a better way to have administrative-level access controls with dynamic privileges:

  • Too often, super privileges are given for tasks when fewer privileges are actually required.
  • These are needed to allow the addition of administrative access controls.

Examples of the new components include the following:

  • Replication
  • ...