There are significant differences between cloud-hosted MySQL and MySQL 8.0 Enterprise. Read this before you plan your next deployment into the cloud.
Online, non-blocking backups · Full, incremental, and partial backups with no downtime · up to 90% compression · backward compatible full recovery · Precise one-click point-in-time recovery · Partial recovery for restoring specific objects
Block SQL Injection attacks · Whitelist creation · real-time threat monitoring · SQL statement blocking and alerting · intrusion detection
MySQL Thread Pool - a highly scalable, queue-based thread-handling model designed to reduce overhead in managing client connections and statement execution threads.
Asymmetric encryption (Public Key Cryptography) · Encryption · Key Generation · Digital Signatures · Protect confidential data and comply with regulatory requirements such as HIPAA, Sarbanes-Oxley, and the PCI Data Security Standard · External authentication modules including Linux Pluggable Authentication Modules (PAM) and Windows Active Directory
Automatically detect and recover from failures · Minimize downtime
Continuously monitor databases · Proactively alert DBAs to potential problems, queries, and tuning opportunities before they impact key systems or applications · Expert advisors for fixing and tuning MySQL configurations and variables for optimal security, performance and availability · Built-in, advanced Query Analyzer to visually find and tune expensive query code · integrates into Oracle Enterprise Manager for MySQL
Store document collections in your relational databases · JSON documents up to 1 gigabyte in size
Provide direct access to expert MySQL Support engineers who are ready to assist users in the development, deployment, and management of MySQL applications. The MySQL Support team is composed of seasoned MySQL developers and database experts who understand the issues and challenges users face because they've overcome these same challenges themselves.
MySQL Router is an enterprise middleware service for InnoDB clusters used to route client requests to database servers based on a number of configuration scenarios. Let's take a look at some of the configuration options, as well as keep track of what's new in version 8.0.