Command summary for operating MySQL in Linux Command lines

Source: Internet
Author: User
Tags mysql host import database mysql command line

Command summary for operating MySQL in Linux Command lines

(Note: commands in the MySQL environment are followed by a semicolon as the command Terminator)

1. commands for starting MySQL in Linux:

Mysqladmin start
/Ect/init. d/mysql start (the installation path of mysql is earlier)

2. Command for restarting MySQL in Linux:

Mysqladmin restart
/Ect/init. d/mysql restart (the installation path of mysql is earlier)

3. Run the following command to disable MySQL in Linux:

Mysqladmin shutdown
/Ect/init. d/mysql shutdown (the installation path of mysql is earlier)

4. Connect to MySQL on the local machine:

Enter the mysql \ bin directory, type the mysql-uroot-p command, and press enter to enter the password. (in Linux, if mysql is a system server, directly press mysql-u root-p to enter the mysql \ bin directory );
Exit mysql command: exit (Press ENTER)

5. Modify the MySQL password:

Mysqladmin-u username-p old password New password
Or enter the mysql command line set password for root = PASSWORD ("root ");

6. Add new users.

Grant select on database. * to username @ login host identified by "password"
For example, if a user's test password is added to 123, the user can log on to any host and have the permission to query, insert, modify, and delete all databases. First, use the root user to connect to mysql, and then type the following command:
Grant select, insert, update, delete on *. * to "Identified by" 123 ″;

Ii. MySQL database operations

You must first log on to MySQL. The related operations are performed at the MySQL prompt, and each command ends with a semicolon.

1. display the Database List.

Show databases;

2. display the data tables in the database:

Use mysql; // open the database
Show tables;

3. display the data table structure:

Describe table name;

4. database creation:

Create database name;

GBK: create database test2 default character set gbk COLLATE gbk_chinese_ci;
UTF8: create database 'test2' default character set utf8 COLLATE utf8_general_ci;

5. Create a table:
Use Database Name;
Create table Name (field setting list );

6. Delete databases and tables:

Drop database name;
Drop table name;

7. Clear records in the table:

Delete from table name;

Truncate table name;

8. Display records in the table:
Select * from table name;

9. Encoding Modification

To change the encoding format of mysql:
When mysql is started, add the mysqld_safe command line
-Default-character-set = gbk

To change the encoding format of a Database: Enter the command at the mysql prompt
Alter database db_name default character set gbk;

10. rename a table

Alter table t1 rename t2;

11. View SQL statement Efficiency

Explain <table_name>

Example: explain select * from t3 where id = 3952602;

12. load data into database tables in text mode (for example, D:/mysql.txt)

Mysql> load data local infile "D:/mysql.txt" into table mytable;

Iii. Data Import and Export

1. Transfer text data to the database

Text data should conform to the format: field data is separated by the tab key, and null value is used instead. Example:
1 name duty 2006-11-23
Data Import command load data local infile "file name" into table name;

2. Export databases and tables

Mysqldump-opt news> news. SQL (back up all the tables in the database news to the news. SQL file. news. SQL is a text file with any file name .)
Mysqldump-opt news author article> author. article. SQL (back up the author table and article table in the database news to author. article. SQL file, author. article. SQL is a text file with any file name .)
Mysqldump-databases db1 db2> news. SQL (back up database dbl and db2 to the news. SQL file. news. SQL is a text file with any file name .)
Mysqldump-h host-u user-p pass-databases dbname> file. dump
Import the database dbname on the host named "user" and "password pass" to file. dump.
Mysqldump-all-databases> all-databases. SQL (back up all databases to all-databases. SQL files, a all-databases. SQL is a text file, any file name .)

3. Import Data

Mysql <all-databases. SQL (import database)
Mysql> source news. SQL; (run the mysql command to import tables)
1. Connect to MySQL
Format: mysql-h host address-u user name-p User Password

1. Example 1: connect to MYSQL on the local machine.

First, open the DOS window, enter the directory mysqlbin, then type the command mysql-uroot-p, and press enter to prompt you to enter the password. If you have just installed MYSQL, super User root has no password, so press enter to enter MYSQL. The MYSQL prompt is: mysql>.

2. Example 2: connect to MYSQL on the remote host. Assume that the IP address of the remote host is 110.110.110.110, the user name is root, and the password is abcd123. Enter the following command:

Mysql-h110.110.110.110-uroot-pabcd123

(Note: you do not need to add spaces for u and root. The same applies to others)

3. exit MYSQL command: exit (Press ENTER ).

Ii. Change the password

Format: mysqladmin-u username-p old password New password

1. Example 1: Add a password ab12 to the root user. First, enter the directory mysqlbin in DOS, and then type the following command:

Mysqladmin-uroot-password ab12

Note: because the root account does not have a password at the beginning, the old-p password can be omitted.

2. Example 2: Change the root password to djg345.

Mysqladmin-uroot-pab12 password djg345

3. Add new users.

(Note: Unlike the above, the following commands in the MySQL environment are followed by a semicolon as the command Terminator)

Format: grant select on database. * to username @ login host identified by \ "password \"

Example 1: Add a user named "test1" with the password "abc" so that the user can log on to any host and have the permission to query, insert, modify, and delete all databases. First, use the root user to connect to MySQL, and then type the following command:

Grant select, insert, update,
Delete on *. * to test1 @ \ "% \" Identified by \ "abc \";

However, the User Added in Example 1 is very dangerous. If someone knows the password of test1, then he can log on to your MySQL database on any computer on the internet and do whatever he wants for your data. For the solution, see Example 2.

Example 2: Add a user named "test2" with the password "abc" so that the user can only log on to localhost, you can also query, insert, modify, and delete the database mydb (localhost refers to the local host, that is, the host where the MySQL database is located), so that the user knows the password of test2, he cannot access the database directly from the internet, but can only access the database through the web pages on the MySQL host.

Grant select, insert, update,
Delete on mydb. * to test2 @ localhost identified by \ "abc \";

If you do not want test2 to have a password, you can run another command to remove the password.

Grant select, insert, update, delete on mydb
. * To test2 @ localhost identified \"\";

Start: net start mySql;

Enter: mysql-u root-p/mysql-h localhost-u root-p databaseName;

List databases: show databases;

Select Database: use databaseName;

List tables: show tables;

Show columns from tableName;

Create a database: source fileName.txt;

Matching character: wildcard _ can be used to represent any character, and % represents any string;

Add a field: alter table tabelName add column fieldName dateType;

Add multiple fields: alter table tabelName add column fieldName1 dateType, add columns fieldName2 dateType;

Multi-line command input: note that words cannot be broken; when data is inserted or changed, the field strings cannot be expanded into multiple rows; otherwise, the hard press enter will be stored in the data;

Add an Administrator Account: grant all on *. * to user @ localhost identified by "password ";

After each statement is entered, enter the plus sign ';' At the end, or add '\ G;

Query time: select now ();

Query the current user: select user ();

Query the database version: select version ();

Query the currently used database: select database ();

1. Delete the students data table in the student_course database:

Rm-f student_course/students .*

2. Back up the database: (back up the database test)

Mysqldump-u root-p test> c: \ test.txt
Backup table: (back up the mytable table under the test database)
Mysqldump-u root-p test mytable> c: \ test.txt
Import the backup data to the database: (import back to the test database)
Mysql-u root-p test

3. Create a temporary table: (create a temporary table zengchao)

Create temporary table zengchao (name varchar (10 ));

4. To create a table, first determine whether the table exists.

Create table if not exists students (......);

5. Copy the table structure from an existing table

Create table table2 select * from table1 where 1 <> 1;

6. Copy a table

Create table table2 select * from table1;

7. Rename the table

Alter table table1 rename as table2;

8. Modify the column type

Alter table table1 modify id int unsigned; // modify the column id type to int unsigned
Alter table table1 change id sid int unsigned; // modify the column id name to sid and the attribute to int unsigned

9. Create an index

Alter table table1 add index ind_id (id );
Create index ind_id on table1 (id );
Create unique index ind_id on table1 (id); // create a unique index

10. delete an index

Drop index idx_id on table1;
Alter table table1 drop index ind_id;

11. Combine characters or multiple columns (link the column id with ":" And column name and "=)

Select concat (id, ':', name, '=') from students;

12. limit (10 to 20 records selected) <the number of the first record set is 0>

Select * from students order by id limit 9, 10;

13. functions not supported by MySQL

Transaction, view, foreign key and reference integrity, stored procedure and trigger
14. MySQL uses the index operator symbol

<, <=, >=, >,=, Between, in, like without the start of % or _

15. disadvantages of using Indexes
1) slowing down the speed of adding, deleting, and modifying data;
2) occupied disk space;
3) increase the burden on the query optimizer;
When the query optimizer generates an execution plan, it will consider indexes. Too many indexes will increase the workload for the query optimizer, resulting in the inability to select the optimal query solution;

16. Analyze index Efficiency

Method: Add explain before a general SQL statement;
Meaning of analysis results:
1) table: The table name;
2) type: Connection type (ALL/Range/Ref ). Among them, ref is the most ideal;
3) possible_keys: query the available index names;
4) key: actually used index;
5) key_len: the length (in bytes) of the used part in the index );
6) ref: displays the column name or "const" (I don't understand what it means );
7) rows: displays the number of rows that MySQL considers to be scanned before finding the correct results;
8) extra: MySQL recommendations;

17. Use a short fixed-length Column

1) try to use a shorter data type;
2) use the fixed-length data type as much as possible;
A) Replace varchar with char, and process data with a fixed length faster than that with a variable length;
B) For tables that are frequently modified, disks are easy to form fragments, which affects the overall performance of the database;
C) In case of a data table crash, it is easier to reconstruct a table with a fixed length of data rows. When a data row with a fixed length is used, the start position of each record is a multiple of the fixed record length, which can be easily detected. However, it is not necessary to use a variable length data row;
D) For MyISAM data tables, although converting to a fixed-length data column can improve performance, it occupies a large space;

18. Use not null and enum

Define the column as not null as much as possible, so that data can be generated faster and less space is required. In addition, MySQL does not need to check whether there is a special case, that is, the null value, optimize the query;
If a column contains only a limited number of specific values, such as gender, validity, or enrollment year, you should consider converting it to the value of the enum column, mySQL processes faster, because all enum values are represented by an Identifier value in the system;

19. Use optimize table

For tables that are frequently modified, fragments are easily generated, so that more disk blocks must be read during database query to reduce query performance. All tables with variable lengths have disk fragmentation issues. This problem is more prominent FOR blob data types because of its large size changes. You can use optimize table to organize fragments to ensure that the database performance is not degraded and optimize the data tables affected by fragments. Optimize table can be used for MyISAM and BDB data tables. In fact, any fragment method uses mysqldump to store data tables, and then creates a new data table using the converted files;

20. Use procedure analyze ()

Procedure analyze () can be used to display the best type of recommendations. It is easy to use. Add procedure analyze () after the select statement. For example:
Select * from students procedure analyze ();
Select * from students procedure analyze (16,256 );
The second statement requires that procedure analyze () should not contain more than 16 values or enum types containing more than 256 bytes. If there is no limit, the output may be very long;

21. Use query Cache

1) How to query the cache:
When a select statement is executed for the first time, the server remembers the text content and query results of the query and stores them in the cache. When this statement is executed for the next time, the server returns the results directly from the cache; when a data table is updated, any cache query of the data table becomes invalid and is discarded.
2) Configure cache parameters:
Variable: query_cache _ type, the operation mode of the query cache. There are 3 moderate modes, 0: no cache; 1: cache query, unless it starts with select SQL _no_cache; 2: only queries starting with select SQL _cache are cached as needed; query_cache_size: set the maximum result set size of the query cache, which is greater than this value and will not be cached.

22. Adjust hardware

1) add more memory to the machine;
2) increase the speed of the hard disk to reduce the I/O wait time;
Track-seeking time is the main factor that determines performance. The speed of moving the head is the slowest word by word. Once the head is located, it is fast to read from the track;
3) re-allocate disk activities on different physical hard disk devices;
If possible, the busiest data inventory should be placed on different physical devices, which is different from using different partitions of the same physical device, because they will compete for the same physical resources (head ).

This article permanently updates the link address:

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.