MySQLStudy-MySQL User and permission management MySQL server uses the MySQL permission table to control user access to the database. the MySQL permission table is stored in the mysql database and initialized by the mysql_install_db script. These
Henan College of Traditional Chinese Medicine
Course Design Report of MySQL Database Management
Title: Research and Implementation of MySQL Clusters
Completion date:2012January 1, December 31
Contents
1. Course Design overview 3
2. research
**************************************** ******************
The first part is to build a multi-mysql service on a server.
**************************************** ******************
I. xuyan
There is a mysqld_multi command in Mysql that can be used
After installing MySQL, configure the environment variables and then
Input MySQL
Go to MySQL
Then you can
Use MySQL;
Select * from user;
To view all users;
Execute the script file in MySQL:
Mysql> source XXX. SQL;
1.1 add users in two ways: (convert)
After installing MySQL, configure the environment variables, and then
Typing MySQL
Enter MySQL
Then you can
Use MySQL;
Select * from user;
To see all the users;
Execute script file under Mysql:
Mysql > Source xxx.sql;
1.1 Two ways to increase the
MySQL has become one of the most widely used databases on the network, especially for Web applications. it occupies the absolute advantage of small and medium applications. All of this comes from its small and easy-to-use, secure and effective, open
User Rights Management mainly has the following functions:1. You can restrict which libraries a user accesses, which tables2. You can restrict which tables the user performs for select, CREATE, delete, delete, alter, etc.3. The IP or domain name
MySQL groups and mysql users have been set in MySQL.
When MySQL is used, it is found that mysql-H 127.0.0.1-u mysql-P cannot access the database.
Root # mysql-H 127.0.0.1-u mysql-PEnter Password :******Error 1045: Access denied for user: 'mysql @ 1
MySQL supports unidirectional and asynchronous replication. One server acts as the master server during the replication process, and one or more other servers act as slave servers. The master server writes updates to the binary log file and
When an slave server is connected to the master server, it notifies the master server of the last successful update location read from the server in the log. The slave server receives any updates from that time, blocks them, and waits for the master
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.