当前位置:网站首页>Summary of remote connection of MySQL
Summary of remote connection of MySQL
2022-07-03 06:33:00 【Thousands of sails burn】
Preface
MySQL It is one of the most popular databases , It is also the preferred database for persistent storage of small and medium-sized enterprises .
Different from our daily study , in application ,MySQL Services will be attached to a server . If MySQL Deployed on a cloud server , thus , To manipulate the database, you need to connect to the server first , Then enter the database operation , Not very convenient .
therefore , Learning remote connections MySQL The method of is a required course when the database is on the server .
But for the sake of safety ,MySQL The remote connection of is not easy with one click , Especially in MySQL8.x version , We will introduce .
preparation
At this stage , Make sure you have entered the database service you want to access remotely , The usual interface is as follows :

Release remote host access
Generally speaking ,MySQL Only allow users to access on the local host . By inquiring user surface , You can also see the allowed host information :
select host,user from mysql.user

host Below the field localhost Represents that only local hosts are accepted .
therefore , Our work is very clear , Is to modify the access permission information , Enable the specified user to accept remote access . Generally speaking , We have two ways to achieve this effect .
The first one is : Change account permissions ( Suggest )
Since the remote host has no permission to connect , We can go through GRANT Statement to modify the permissions of the specified user .
GRANT The syntax of the statement is roughly :GRANT jurisdiction ON Database objects TO user .
Grant all permissions for all database operations to Any mainframe (’%’) Access to the root user , So any connected to the database root Users can access all information .
GRANT ALL PRIVILEGES ON *.* TO 'root'@'%' IDENTIFIED BY ' Your password ' WITH GRANT OPTION;
Refresh the permissions :
flush privileges;
Query again , You can find that a new record will be added ,host Field % Means any host :

If you just want to grant A separate host Access right , be % It can be modified to the specified IP:
GRANT ALL PRIVILEGES ON *.* TO 'root'@'172.16.28.71' IDENTIFIED BY
' Your password ' WITH GRANT OPTION;
The effect is similar to :

Refresh the permissions :
flush privileges;
The second kind : Modified table method
Use GRANT Statement is to add a new record directly , I personally suggest doing it in the above way .
however , We can also adopt direct modification user by root Of host Field contents , Use it directly UPDATE Statement modification table :
UPDATE mysql.user SET host = '%' WHERE user = 'root';
Refresh the permissions :
flush privileges;
The effect is as shown in the picture , Directly modifying host field value , Instead of adding .

To this step , Most of the time , We can use database tools such as :Web SQLyog、Navicat、Dbeaver Wait, connect to our remote database .
MySQL 8.x Points for attention
But please pay attention to , If your MySQL The version is 8.x Words , Due to the different ways of password encryption , The following prompt may appear when connecting :

therefore , We have to Change the encryption method To achieve remote connection , Use ALTER sentence :
ALTER USER 'root'@'%' IDENTIFIED WITH mysql_native_password BY ' Your password ';
Finally, don't forget to refresh permissions :
flush privileges;
OK, This is the end of the tutorial , If you have any problems , Welcome to comment in the comment area
Reference resources
边栏推荐
- Openresty best practices
- The most classic 100 sentences in the world famous works
- Page text acquisition
- Printer related problem record
- Summary of the design and implementation of the weapon system similar to the paladin of vitality
- POI dealing with Excel learning
- Oracle Database Introduction
- Pytest attempts to execute the test case without skipping, but the case shows that it is all skipped
- Scroll view specifies the starting position of the scrolling element
- [system design] proximity service
猜你喜欢

如何迁移或复制VMware虚拟机系统

ruoyi接口权限校验
![[set theory] relational closure (relational closure solution | relational graph closure | relational matrix closure | closure operation and relational properties | closure compound operation)](/img/a4/00aca72b268f77fe4fb24ac06289f5.jpg)
[set theory] relational closure (relational closure solution | relational graph closure | relational matrix closure | closure operation and relational properties | closure compound operation)

Important knowledge points of redis

Kubesphere - set up redis cluster

YOLOV1学习笔记

论文笔记 VSALM 文献综述《A Comprehensive Survey of Visual SLAM Algorithms》

Kubesphere - build MySQL master-slave replication structure

Kubesphere - build Nacos cluster

The dynamic analysis and calculation of expressions are really delicious for flee
随机推荐
[5g NR] UE registration process
Redis cluster creation, capacity expansion and capacity reduction
Difference between shortest path and minimum spanning tree
Learning notes -- principles and comparison of k-d tree and IKD tree
Opencv mouse and keyboard events
Kubesphere - build MySQL master-slave replication structure
Mysql database binlog log enable record
有意思的鼠標指針交互探究
2022 cisp-pte (III) command execution
In depth learning
Yolov3 learning notes
The difference between CONDA and pip
Use selenium to climb the annual box office of Yien
Svn branch management
Push box games C #
Summary of the design and implementation of the weapon system similar to the paladin of vitality
When PHP uses env to obtain file parameters, it gets strings
Characteristics and isolation level of database
scroll-view指定滚动元素的起始位置
2022年华东师范大学计科考研复试机试题-详细题解