MySQL grant user authorization and MySQL bin-log log practice explained

Source: Internet
Author: User
Tags log log mysql login

This time I will briefly explain the actual operation of grant user authorization and Bin-log log, blog post with a lot of operations in the process of the diagram as a step flow, we follow the process of their own computer operation, basically understand the relevant knowledge. Not much to say, directly into the knowledge to explain.

Remote host connection User Authorization example: 192.168.1.111mysql server and 192.168.1.112mysql server

  One, MySQL grant user authorization192.168.1.111 Login to MySQL, grant the user authorization

whether to add this user under querythis will succeed to the IP 192.168.1.112 host authorized MySQL login account for the user2 password for 123456 of the management users; At this point we are connecting in the 192.168.1.112  An error will be reported: "Unable to connect to 192.168.1.111mysql serverThe reason: 192.168.1.111 Firewall is turned on, only need to turn off the firewall to   then connect to the 192.168.1.112mysql server Authorized Success!

Second, MYSQL Bin-log log

MYSQL Bin-log logs are used primarily for data backup and recovery, and its files save all additions and deletions to the database.

1. Open Bin-log log:  2. View Bin-log logafter connecting to a successful databaseto see if the Log_bin is open successfully View Bin-log Logs  3. Log refresh related to Bin_logat this point, there will be one more up-to-date Bin_log log you can see more mysql-bin.xxxxxx in the/usr/local/mysql/var.  View the last Bin-log log 
Clear all Bin-log logs  Everyone just follow the steps to operate their own, basically can succeed, if you encounter problems, you can leave a message, I will take the time to answer. The next blog post will focus on data backup and recovery, as well as master-slave replication technology. Welcome attention.    

If there is something in this blog that is difficult to understand, please contact the message, if there is a wrong place to welcome the point.

  If you feel that you can get a new knowledge of this blog, please give me the top one , as explained in the article in the wrong place, welcome to point out.

Learn from each other and make progress together!

MySQL grant user authorization and MySQL bin-log log practice explained

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.