Board logo

标题: 使用SQLyog远程管理MySQL [打印本页]

作者: admin    时间: 2019-12-7 15:33     标题: 使用SQLyog远程管理MySQL

笺注:这是在 LNMP一键安装包(lnmp_CentOS6.9) 的基础上进行的。 MySQL的版本信息: [root@localhost ~]# mysql -V mysql Ver 14.14 Distrib 5.5.48, for Linux (x86_64) using readline 5.1 [root@localhost ~]# [root@localhost ~]# mysql -V |awk '{print $5}' 5.5.48, [root@localhost ~]# [root@localhost ~]# mysql -V |awk '{print $5}' |awk -F, '{print $1}' 5.5.48 [root@localhost ~]# 检测MySQL的运行状态: [root@localhost ~]# service mysql stop Shutting down MySQL. SUCCESS! [root@localhost ~]# [root@localhost ~]# ps -ef |grep mysql |grep -v grep [root@localhost ~]# [root@localhost ~]# echo $? 1 [root@localhost ~]# ps aux |grep mysql |grep -v grep [root@localhost ~]# [root@localhost ~]# echo $? 1 [root@localhost ~]# netstat -anp | grep mysql [root@localhost ~]# [root@localhost ~]# echo $? 1 [root@localhost ~]# netstat -anp | grep 3306 [root@localhost ~]# [root@localhost ~]# echo $? 1 [root@localhost ~]# service mysql start Starting MySQL.. SUCCESS! [root@localhost ~]# [root@localhost ~]# ps -ef |grep mysql |grep -v grep root 2711 1 0 02:39 pts/1 00:00:00 /bin/sh /usr/local/mysql/bin/mysqld_safe --datadir=/usr/local/mysql/var --pid-file=/usr/local/mysql/var/localhost.localdomain.pid mysql 3195 2711 0 02:39 pts/1 00:00:00 /usr/local/mysql/bin/mysqld --basedir=/usr/local/mysql --datadir=/usr/local/mysql/var --plugin-dir=/usr/local/mysql/lib/plugin --user=mysql --log-error=/usr/local/mysql/var/localhost.localdomain.err --open-files-limit=65535 --pid-file=/usr/local/mysql/var/localhost.localdomain.pid --socket=/tmp/mysql.sock --port=3306 [root@localhost ~]# [root@localhost ~]# echo $? 0 [root@localhost ~]# ps aux |grep mysql |grep -v grep root 2711 0.0 0.0 11308 1516 pts/1 S 02:39 0:00 /bin/sh /usr/local/mysql/bin/mysqld_safe --datadir=/usr/local/mysql/var --pid-file=/usr/local/mysql/var/localhost.localdomain.pid mysql 3195 0.2 2.5 465436 48700 pts/1 Sl 02:39 0:00 /usr/local/mysql/bin/mysqld --basedir=/usr/local/mysql --datadir=/usr/local/mysql/var --plugin-dir=/usr/local/mysql/lib/plugin --user=mysql --log-error=/usr/local/mysql/var/localhost.localdomain.err --open-files-limit=65535 --pid-file=/usr/local/mysql/var/localhost.localdomain.pid --socket=/tmp/mysql.sock --port=3306 [root@localhost ~]# [root@localhost ~]# echo $? 0 [root@localhost ~]# netstat -anp | grep mysql tcp 0 0 0.0.0.0:3306 0.0.0.0:* LISTEN 3195/mysqld unix 2 [ ACC ] STREAM LISTENING 12705 3195/mysqld /tmp/mysql.sock [root@localhost ~]# [root@localhost ~]# echo $? 0 [root@localhost ~]# netstat -anp | grep 3306 tcp 0 0 0.0.0.0:3306 0.0.0.0:* LISTEN 3195/mysqld [root@localhost ~]# [root@localhost ~]# echo $? 0 登录MySQL后,修改数据库管理员root@localhost的密码: use mysql; UPDATE user SET Password = password ( '1688' ) WHERE User = 'root'; flush privileges; 图片1.png 服务器本地登录MySQL数据库:(使用的是数据库管理员root@localhost,密码1688) mysql -u"root" -p"1688" 图片2.png 查看数据库里有哪些库:(以下3个库是默认就有的) show databases; 图片3.png 切换到库mysql,并列出这个库里所有的表: mysql> use mysql; Database changed mysql> mysql> show tables; +---------------------------+ | Tables_in_mysql | +---------------------------+ | columns_priv | | db | | event | | func | | general_log | | help_category | | help_keyword | | help_relation | | help_topic | | host | | ndb_binlog_index | | plugin | | proc | | procs_priv | | proxies_priv | | servers | | slow_log | | tables_priv | | time_zone | | time_zone_leap_second | | time_zone_name | | time_zone_transition | | time_zone_transition_type | | user | +---------------------------+ 24 rows in set (0.00 sec) mysql> 查看指定表的表结构:(截图有省略) describe mysql.user; 图片4.png 笺注:库mysql中的表user里面包含了所有数据库用户的信息。 查看所有数据库用户及其主机信息:(以下是初始状态) select user,host from mysql.user; 图片5.png 查看数据库管理员root@localhost的权限: mysql> show grants for root@localhost; +----------------------------------------------------------------------------------------------------------------------------------------+ | Grants for root@localhost | +----------------------------------------------------------------------------------------------------------------------------------------+ | GRANT ALL PRIVILEGES ON *.* TO 'root'@'localhost' IDENTIFIED BY PASSWORD '*398D8BD83BF246533D81FF0E614402C6505D0EED' WITH GRANT OPTION | | GRANT PROXY ON ''@'' TO 'root'@'localhost' WITH GRANT OPTION | +----------------------------------------------------------------------------------------------------------------------------------------+ 2 rows in set (0.00 sec) mysql> 笺注:如果站点的数据库配置文件中直接使用了数据库管理员户root@localhost,并且站点文件和数据库在同一台服务器上,就无需另外创建数据库用户、授权了。 ###### ###### 创建一个数据库用户并授权: 授权数据库用户zhuohua@'%'(密码886),可以从任意IP进行访问,对所有的库有完全控制的权限: mysql> grant all on *.* to zhuohua@'%' identified by '886'; Query OK, 0 rows affected (0.01 sec) 查看数据库用户zhuohua@'%'的权限: mysql> show grants for zhuohua@'%'; +-----------------------------------------------------------------------------------------------------------------+ | Grants for zhuohua@% | +-----------------------------------------------------------------------------------------------------------------+ | GRANT ALL PRIVILEGES ON *.* TO 'zhuohua'@'%' IDENTIFIED BY PASSWORD '*F961C54AFEB4D281CE53D7CB8E7822890D86FFFC' | +-----------------------------------------------------------------------------------------------------------------+ 1 row in set (0.00 sec) mysql> 再次查看所有数据库用户及其主机信息: 图片6.png ###### 编辑防火墙规则:(打开TCP 3306端口) [root@localhost ~]# vi /etc/sysconfig/iptables 修改: -A INPUT -p tcp -m tcp --dport 3306 -j ACCEPT 图片7.png 重启iptable服务: [root@localhost ~]# service iptables restart iptables:将链设置为政策 ACCEPT:filter [确定] iptables:清除防火墙规则:[确定] iptables:正在卸载模块:[确定] iptables:应用防火墙规则:[确定] 查看防火墙的filter表的规则:(截图有省略) iptables -nL -t filter --line 图片8.png ############ ############ SQLyog是一个图形化管理MySQL/MariaDB数据库的工具。 下载SQLyog:https://pan.baidu.com/s/16Hb9sUgSt5Q8QPaquYNw8w Windows客户端使用SQLyog,可以远程访问MySQL/MariaDB数据库: 图片9.png 运行 SQLyogEnt.exe ,新建一个连接: 图片10.png 图片11.png MySQL服务器的IP地址 192.168.168.130 数据库用户名 zhuohua 密码 886 端口 3306 图片12.png SQLyog的主界面: 图片13.png 使用SQLyog创建库:(快捷键 Ctrl+D 图片14.png 图片15.png 自定义的库data1创建成功: 图片16.png 在MySQL服务器本地查看库data1的字符集: [root@localhost ~]# mysql -u"root" -p"1688" -e "show create database data1;" +----------+----------------------------------------------------------------+ | Database | Create Database | +----------+----------------------------------------------------------------+ | data1 | CREATE DATABASE `data1` /*!40100 DEFAULT CHARACTER SET utf8 */ | +----------+----------------------------------------------------------------+ [root@localhost ~]# 注释:库data1的字符集为 utf8_general_ci 使用SQLyog创建表: 图片17.png 设置好字段后,点击左下角的“创建表”: 图片18.png 输入自定义表名: 图片19.png 图片20.png 使用SQLyog查看库data1中的表table1的表结构: 图片21.png 创建表后,还可以查看表的字段信息、索引信息、DDL信息: 图片22.png 图片23.png DDL信息: CREATE TABLE `table1` ( `id` int(11) NOT NULL AUTO_INCREMENT, `name` varchar(30) NOT NULL, `age` tinyint(4) DEFAULT NULL, `math` float DEFAULT NULL, `english` decimal(50,2) DEFAULT NULL, `adress1` text, `adress2` mediumtext, `adress3` longtext, `shijian` datetime DEFAULT NULL, PRIMARY KEY (`id`) ) ENGINE=InnoDB DEFAULT CHARSET=utf8 可以使用代码创建表: 图片24.png 在MySQL服务器本地查看库data1中的表table1的表结构: [root@localhost ~]# mysql -u"root" -p"1688" -e "desc data1.table1;" 图片25.png 使用SQLyog插入记录:(选择表名后,选择粘贴SQL语句) 图片26.png 代码:(字段id为主键、标识符列,会自动增长,不用写) INSERT INTO data1.table1 ( NAME, age, math, english, adress1, adress2, adress3, shijian ) VALUES ( 'zhuohua', 18, 60, 80.5, '中国', '广东省', '佛山市', '2019-12-2 15:33:5' ); 图片27.png 在MySQL服务器本地查看库data1中的表table1的表数据: [root@localhost ~]# mysql -u"root" -p"1688" -e "use data1;select * from table1;" 图片28.png ###### ###### 在MySQL服务器本地修改数据库用户zhuohua@'%'的密码为1234: [root@localhost ~]# mysql -u"root" -p"1688" -e "update mysql.user set password=password('1234') where user='zhuohua' and host='%';flush privileges;" [root@localhost ~]# [root@localhost ~]# mysql -u"root" -p"1688" -e "show grants for zhuohua@'%';" +-----------------------------------------------------------------------------------------------------------------+ | Grants for zhuohua@% | +-----------------------------------------------------------------------------------------------------------------+ | GRANT ALL PRIVILEGES ON *.* TO 'zhuohua'@'%' IDENTIFIED BY PASSWORD '*A4B6157319038724E3560894F7F932C8886EBFCF' | +-----------------------------------------------------------------------------------------------------------------+ [root@localhost ~]# 注释:密码是加密了的。 ###### ###### 在MySQL服务器本地撤销数据库用户zhuohua@'%'对所有的库有完全控制的权限: [root@localhost ~]# mysql -u"root" -p"1688" -e "revoke all on *.* from zhuohua@'%';flush privileges;" [root@localhost ~]# 再次查看数据库用户zhuohua@'%' 的权限: [root@localhost ~]# mysql -u"root" -p"1688" -e "show grants for zhuohua@'%';" +--------------------------------------------------------------------------------------------------------+ | Grants for zhuohua@% | +--------------------------------------------------------------------------------------------------------+ | GRANT USAGE ON *.* TO 'zhuohua'@'%' IDENTIFIED BY PASSWORD '*A4B6157319038724E3560894F7F932C8886EBFCF' | +--------------------------------------------------------------------------------------------------------+ [root@localhost ~]# 此时数据库用户 zhuohua@'%' 可以登录SQLyog,但实际上已经没有任何权限了: 图片29.png ###### 重新授权数据库用户zhuohua@'%'(密码1234),可以从任意IP进行访问,只对库data1有完全控制的权限: [root@localhost ~]# mysql -u"root" -p"1688" -e "grant all on data1.* to zhuohua@'%' identified by '1234';" [root@localhost ~]# 重新查看数据库用户zhuohua@'%'的权限: [root@localhost ~]# mysql -u"root" -p"1688" -e "show grants for zhuohua@'%';" +--------------------------------------------------------------------------------------------------------+ | Grants for zhuohua@% | +--------------------------------------------------------------------------------------------------------+ | GRANT USAGE ON *.* TO 'zhuohua'@'%' IDENTIFIED BY PASSWORD '*A4B6157319038724E3560894F7F932C8886EBFCF' | | GRANT ALL PRIVILEGES ON `data1`.* TO 'zhuohua'@'%' | +--------------------------------------------------------------------------------------------------------+ [root@localhost ~]# 此时数据库用户 zhuohua@'%' 可以登录SQLyog,只对库data1有完全控制的权限: 图片30.png ###### 撤销数据库用户zhuohua@'%'对库data1的完全控制权限: [root@localhost ~]# mysql -u"root" -p"1688" -e "revoke all on data1.* from zhuohua@'%';flush privileges;" [root@localhost ~]# 重新查看数据库用户zhuohua@'%'的权限: [root@localhost ~]# mysql -u"root" -p"1688" -e "show grants for zhuohua@'%';" +--------------------------------------------------------------------------------------------------------+ | Grants for zhuohua@% | +--------------------------------------------------------------------------------------------------------+ | GRANT USAGE ON *.* TO 'zhuohua'@'%' IDENTIFIED BY PASSWORD '*A4B6157319038724E3560894F7F932C8886EBFCF' | +--------------------------------------------------------------------------------------------------------+ [root@localhost ~]# 笺注:撤销数据库用户权限的方式,要匹配授权时的方式。 ###### 删除数据库用户zhuohua@'%': [root@localhost ~]# mysql -u"root" -p"1688" -e "drop user zhuohua@'%';flush privileges;" [root@localhost ~]# 数据库用户被删除后,再查询其权限,会有如下显示: [root@localhost ~]# mysql -u"root" -p"1688" -e "show grants for zhuohua@'%';" ERROR 1141 (42000) at line 1: There is no such grant defined for user 'zhuohua' on host '%' [root@localhost ~]# 重新查看所有数据库用户及其主机信息: [root@localhost ~]# mysql -u"root" -p"1688" -e "select user,host from mysql.user;" 图片31.png 相关文章: 使用Navicat远程管理MySQL Windows2012R2_安装MySQL5.5 Windows下MySQL的备份和还原 Linux下MySQL的备份和还原 MySQL的SQL语句 MySQL的最大连接数/最大可打开表数/最大可打开文件数 重置MySQL5.5/5.6/5.7的用户密码 Zabbix自定义监控Linux下的MySQL Zabbix5.0.12_使用模板监控MySQL主从同步状态 CentOS8_在Docker中安装MySQL CentOS8_在Docker中安装Nagios CentOS8_Mycat实现MySQL的读写分离 CentOS6_iptables

图片附件: 图片1.png (2022-4-9 10:45, 77.75 KB) / 下载次数 102
http://blog.zhuohua.store/attachment.php?aid=19291&k=3a8c6f91a809da30cc49ad05ced4fdf8&t=1714627503&sid=QrD6Rw



图片附件: 图片2.png (2022-4-9 10:45, 126.74 KB) / 下载次数 99
http://blog.zhuohua.store/attachment.php?aid=19292&k=0abafde9b224320b979aaa8f4f28ed76&t=1714627503&sid=QrD6Rw



图片附件: 图片3.png (2022-4-9 10:46, 47.5 KB) / 下载次数 92
http://blog.zhuohua.store/attachment.php?aid=19293&k=c078bc09d74f48aa49b190387da115d3&t=1714627503&sid=QrD6Rw



图片附件: 图片4.png (2022-4-9 10:47, 51.05 KB) / 下载次数 106
http://blog.zhuohua.store/attachment.php?aid=19294&k=1f7fbc1bc86430bbc96cde558cbe2099&t=1714627503&sid=QrD6Rw



图片附件: 图片5.png (2022-4-9 10:48, 34.46 KB) / 下载次数 95
http://blog.zhuohua.store/attachment.php?aid=19295&k=61563d877756db3262fb2023fd61998f&t=1714627503&sid=QrD6Rw



图片附件: 图片6.png (2022-4-9 10:50, 52.51 KB) / 下载次数 79
http://blog.zhuohua.store/attachment.php?aid=19296&k=2d111af65a16d223d2cedd619607634e&t=1714627503&sid=QrD6Rw



图片附件: 图片7.png (2022-4-9 10:50, 174.49 KB) / 下载次数 99
http://blog.zhuohua.store/attachment.php?aid=19297&k=64030256f6243bbdda2cd7ca0b79ed94&t=1714627503&sid=QrD6Rw



图片附件: 图片8.png (2022-4-9 10:51, 77.7 KB) / 下载次数 110
http://blog.zhuohua.store/attachment.php?aid=19298&k=09b68b4146fac34d9aca9e78b0054b44&t=1714627503&sid=QrD6Rw



图片附件: 图片9.png (2022-4-9 10:52, 207.01 KB) / 下载次数 104
http://blog.zhuohua.store/attachment.php?aid=19299&k=71d9ad958134d3aff8e2c5a64f62412a&t=1714627503&sid=QrD6Rw



图片附件: 图片10.png (2022-4-9 10:52, 130.73 KB) / 下载次数 92
http://blog.zhuohua.store/attachment.php?aid=19300&k=6657b29a3905d08f651709ff4ab40977&t=1714627503&sid=QrD6Rw



图片附件: 图片11.png (2022-4-9 10:53, 26.63 KB) / 下载次数 96
http://blog.zhuohua.store/attachment.php?aid=19301&k=fc4a89f25fab438b5d9a81069345efbe&t=1714627503&sid=QrD6Rw



图片附件: 图片12.png (2022-4-9 10:53, 239.27 KB) / 下载次数 103
http://blog.zhuohua.store/attachment.php?aid=19302&k=eba0f03c6d1863662da6c4195993fe39&t=1714627503&sid=QrD6Rw



图片附件: 图片13.png (2022-4-9 10:54, 162.18 KB) / 下载次数 98
http://blog.zhuohua.store/attachment.php?aid=19303&k=e5440e6a8e5e401ec33579d0900e43c4&t=1714627503&sid=QrD6Rw



图片附件: 图片14.png (2022-4-9 10:54, 159.08 KB) / 下载次数 102
http://blog.zhuohua.store/attachment.php?aid=19304&k=158a9309aa459be5a50b510b790759a0&t=1714627503&sid=QrD6Rw



图片附件: 图片15.png (2022-4-9 10:54, 38.39 KB) / 下载次数 110
http://blog.zhuohua.store/attachment.php?aid=19305&k=6c37fa30b29d05aa50ff7ea07f3f5b17&t=1714627503&sid=QrD6Rw



图片附件: 图片16.png (2022-4-9 10:55, 176.66 KB) / 下载次数 95
http://blog.zhuohua.store/attachment.php?aid=19306&k=7e9e78b0fd372629ff05e82fcba0ccd5&t=1714627503&sid=QrD6Rw



图片附件: 图片17.png (2022-4-9 10:56, 141.3 KB) / 下载次数 94
http://blog.zhuohua.store/attachment.php?aid=19307&k=f6175dd64bf06878dfe3a9a468ea97fb&t=1714627503&sid=QrD6Rw



图片附件: 图片18.png (2022-4-9 10:56, 79.96 KB) / 下载次数 112
http://blog.zhuohua.store/attachment.php?aid=19308&k=d432534a9e0725a6d82b95207587b6f0&t=1714627503&sid=QrD6Rw



图片附件: 图片19.png (2022-4-9 10:57, 18.2 KB) / 下载次数 95
http://blog.zhuohua.store/attachment.php?aid=19309&k=26e90d3749c2135b2831037a4f079660&t=1714627503&sid=QrD6Rw



图片附件: 图片20.png (2022-4-9 10:57, 24.1 KB) / 下载次数 103
http://blog.zhuohua.store/attachment.php?aid=19310&k=d833e08c9fc3e81cc52518bfc8ca4596&t=1714627503&sid=QrD6Rw



图片附件: 图片21.png (2022-4-9 10:57, 83.67 KB) / 下载次数 111
http://blog.zhuohua.store/attachment.php?aid=19311&k=ede39f1c564c7dd83d7665416e5fd564&t=1714627503&sid=QrD6Rw



图片附件: 图片22.png (2022-4-9 10:58, 70.11 KB) / 下载次数 86
http://blog.zhuohua.store/attachment.php?aid=19312&k=7b3dd84f012af67e7a6842bbed18dda2&t=1714627503&sid=QrD6Rw



图片附件: 图片23.png (2022-4-9 10:58, 91.17 KB) / 下载次数 96
http://blog.zhuohua.store/attachment.php?aid=19313&k=5208c99f7760e254d5d8f835ece1f9ff&t=1714627503&sid=QrD6Rw



图片附件: 图片24.png (2022-4-9 10:58, 204.71 KB) / 下载次数 97
http://blog.zhuohua.store/attachment.php?aid=19314&k=5123172cb6995b85612e98d975290788&t=1714627503&sid=QrD6Rw



图片附件: 图片25.png (2022-4-9 10:59, 142.09 KB) / 下载次数 108
http://blog.zhuohua.store/attachment.php?aid=19315&k=34a9cb2b3f75f1993b62ebc7de678cf9&t=1714627503&sid=QrD6Rw



图片附件: 图片26.png (2022-4-9 11:00, 188.68 KB) / 下载次数 105
http://blog.zhuohua.store/attachment.php?aid=19316&k=c68d49f2451610c9b8ae33a185774eeb&t=1714627503&sid=QrD6Rw



图片附件: 图片27.png (2022-4-9 11:00, 217.87 KB) / 下载次数 94
http://blog.zhuohua.store/attachment.php?aid=19317&k=111a2cd6178207d599cf8a6bc2d2441c&t=1714627503&sid=QrD6Rw



图片附件: 图片28.png (2022-4-9 11:01, 51.49 KB) / 下载次数 110
http://blog.zhuohua.store/attachment.php?aid=19318&k=4dd2d1e72579c6c9511cc920b6cb78d4&t=1714627503&sid=QrD6Rw



图片附件: 图片29.png (2022-4-9 11:03, 120.68 KB) / 下载次数 59
http://blog.zhuohua.store/attachment.php?aid=19319&k=f8c3f6ea266bd54382b8bfd97321ebfa&t=1714627503&sid=QrD6Rw



图片附件: 图片30.png (2022-4-9 11:04, 110.43 KB) / 下载次数 70
http://blog.zhuohua.store/attachment.php?aid=19320&k=5d7fa42130485ba4e2f24d1cd701d599&t=1714627503&sid=QrD6Rw



图片附件: 图片31.png (2022-4-9 11:05, 39.01 KB) / 下载次数 64
http://blog.zhuohua.store/attachment.php?aid=19321&k=f6ce2213b8fe19a52b55a2d6415028b7&t=1714627503&sid=QrD6Rw






欢迎光临 blog.zhuohua.store (http://blog.zhuohua.store/) Powered by Discuz! 7.2