Table of Contents
Use Docker to publish phpmyadmin and connect to the existing MySQL container
Use docker-compose to create
Home Backend Development PHP Tutorial Learn to install phpmyadmin with Docker in one minute (share)

Learn to install phpmyadmin with Docker in one minute (share)

Jun 15, 2021 am 09:43 AM

This article gives you a minute to learn how to install phpmyadmin with Docker (share). It has certain reference value. Friends in need can refer to it. I hope it will be helpful to everyone.

Learn to install phpmyadmin with Docker in one minute (share)

Our MySQL database on the cloud server is very unsafe when the port is exposed and the remote connection is opened. Yes, one of my servers was attacked by a ransomware virus yesterday, and I was asked to pay 0.06 Bitcoin to redeem my data. Fortunately, there was no important data in that database. It was just a database that had been abandoned for half a year. I had forgotten the password. Fortunately, I found the password through some means. After I logged in, I was dumbfounded. So what should we do if we don’t want to enable remote login but still want to operate the database? what to do? It can be solved with phpmyadmin, but phpmyadmin also has certain risks. Let's see how to play it below.

Use Docker to publish phpmyadmin and connect to the existing MySQL container

  1. First download the docker image of phpmyadmin

    # 先查询镜像仓库里有哪些镜像
    docker search phpmyadmin
    
    # 拉取star最多的镜像or拉取你想用的镜像
    docker pull docker.io/phpmyadmin/phpmyadmin
    
    拉取镜像需要一段时间,这个要看服务器的带宽网速了
    Copy after login
  2. Start the image and connect to the existing MySQL container

    # 启动镜像
    docker run --name myadmin -p 80:80 -d --link mysql-db:db docker.io/phpmyadmin/phpmyadmin
    
    # 修改容器配置文件
    ## 将配置文件复制到宿主机中
    docker cp myadmin:/etc/phpmyadmin/config.inc.php .
    
    ## 修改配置文件信息(这里修改的db就是在启动的时候--link后面指定的别名)
    $cfg['Servers'][$i]['host'] = 'localhost' ——> $cfg['Servers'][$i]['host'] = 'db'
    
    ## 将修改后的配置文件复制回容器中
    docker cp ./config.inc.php myadmin:/etc/phpmyadmin/
    
    # 重启phpmyadmin容器
    Copy after login
  3. You can connect here. Of course, you can also modify the configuration file to limit the connected users, and then in MySQL Authorize the connection user

Use docker-compose to create

  1. Install docker-compose, I won’t go into details here,

  2. Write the docker-compose.yml file

    version: "2"
    services:
      mysql:
        image: hub.c.163.com/library/mysql
        container_name: test-mysql
        restart: always
        ports:
          - "3306:3306"
        environment:
          MYSQL_USER: "root"
          MYSQL_PASSWORD: "root"
          MYSQL_ROOT_PASSWORD: "root"
        networks:
          - net-mysql
    
      phpmyadmin:
        image: docker.io/phpmyadmin/phpmyadmin
        container_name: test-myadmin
        ports:
          - "80:80"
        environment:
          MYSQL_USER: "root"
          MYSQL_PASSWORD: "root"
          MYSQL_ROOT_PASSWORD: "root"
        networks:
          - net-mysql
    
    networks:
      net-mysql:
    Copy after login
  3. Publish the container

    # 使用命令发布容器
    docker-compose up -d
    Copy after login
  4. Then you can use it without modification. Any configuration file

Recommended learning: "PHP Video Tutorial"

The above is the detailed content of Learn to install phpmyadmin with Docker in one minute (share). For more information, please follow other related articles on the PHP Chinese website!

Statement of this Website
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn

Hot AI Tools

Undresser.AI Undress

Undresser.AI Undress

AI-powered app for creating realistic nude photos

AI Clothes Remover

AI Clothes Remover

Online AI tool for removing clothes from photos.

Undress AI Tool

Undress AI Tool

Undress images for free

Clothoff.io

Clothoff.io

AI clothes remover

AI Hentai Generator

AI Hentai Generator

Generate AI Hentai for free.

Hot Article

R.E.P.O. Energy Crystals Explained and What They Do (Yellow Crystal)
4 weeks ago By 尊渡假赌尊渡假赌尊渡假赌
R.E.P.O. Best Graphic Settings
4 weeks ago By 尊渡假赌尊渡假赌尊渡假赌
R.E.P.O. How to Fix Audio if You Can't Hear Anyone
1 months ago By 尊渡假赌尊渡假赌尊渡假赌
R.E.P.O. Chat Commands and How to Use Them
1 months ago By 尊渡假赌尊渡假赌尊渡假赌

Hot Tools

Notepad++7.3.1

Notepad++7.3.1

Easy-to-use and free code editor

SublimeText3 Chinese version

SublimeText3 Chinese version

Chinese version, very easy to use

Zend Studio 13.0.1

Zend Studio 13.0.1

Powerful PHP integrated development environment

Dreamweaver CS6

Dreamweaver CS6

Visual web development tools

SublimeText3 Mac version

SublimeText3 Mac version

God-level code editing software (SublimeText3)

Explain JSON Web Tokens (JWT) and their use case in PHP APIs. Explain JSON Web Tokens (JWT) and their use case in PHP APIs. Apr 05, 2025 am 12:04 AM

JWT is an open standard based on JSON, used to securely transmit information between parties, mainly for identity authentication and information exchange. 1. JWT consists of three parts: Header, Payload and Signature. 2. The working principle of JWT includes three steps: generating JWT, verifying JWT and parsing Payload. 3. When using JWT for authentication in PHP, JWT can be generated and verified, and user role and permission information can be included in advanced usage. 4. Common errors include signature verification failure, token expiration, and payload oversized. Debugging skills include using debugging tools and logging. 5. Performance optimization and best practices include using appropriate signature algorithms, setting validity periods reasonably,

Explain the concept of late static binding in PHP. Explain the concept of late static binding in PHP. Mar 21, 2025 pm 01:33 PM

Article discusses late static binding (LSB) in PHP, introduced in PHP 5.3, allowing runtime resolution of static method calls for more flexible inheritance.Main issue: LSB vs. traditional polymorphism; LSB's practical applications and potential perfo

Framework Security Features: Protecting against vulnerabilities. Framework Security Features: Protecting against vulnerabilities. Mar 28, 2025 pm 05:11 PM

Article discusses essential security features in frameworks to protect against vulnerabilities, including input validation, authentication, and regular updates.

How to send a POST request containing JSON data using PHP's cURL library? How to send a POST request containing JSON data using PHP's cURL library? Apr 01, 2025 pm 03:12 PM

Sending JSON data using PHP's cURL library In PHP development, it is often necessary to interact with external APIs. One of the common ways is to use cURL library to send POST�...

Describe the SOLID principles and how they apply to PHP development. Describe the SOLID principles and how they apply to PHP development. Apr 03, 2025 am 12:04 AM

The application of SOLID principle in PHP development includes: 1. Single responsibility principle (SRP): Each class is responsible for only one function. 2. Open and close principle (OCP): Changes are achieved through extension rather than modification. 3. Lisch's Substitution Principle (LSP): Subclasses can replace base classes without affecting program accuracy. 4. Interface isolation principle (ISP): Use fine-grained interfaces to avoid dependencies and unused methods. 5. Dependency inversion principle (DIP): High and low-level modules rely on abstraction and are implemented through dependency injection.

Customizing/Extending Frameworks: How to add custom functionality. Customizing/Extending Frameworks: How to add custom functionality. Mar 28, 2025 pm 05:12 PM

The article discusses adding custom functionality to frameworks, focusing on understanding architecture, identifying extension points, and best practices for integration and debugging.

How does session hijacking work and how can you mitigate it in PHP? How does session hijacking work and how can you mitigate it in PHP? Apr 06, 2025 am 12:02 AM

Session hijacking can be achieved through the following steps: 1. Obtain the session ID, 2. Use the session ID, 3. Keep the session active. The methods to prevent session hijacking in PHP include: 1. Use the session_regenerate_id() function to regenerate the session ID, 2. Store session data through the database, 3. Ensure that all session data is transmitted through HTTPS.

See all articles