Learn to install phpmyadmin with Docker in one minute (share)
This article gives you a minute to learn how to install phpmyadmin with Docker (share). It has certain reference value. Friends in need can refer to it. I hope it will be helpful to everyone.
Our MySQL database on the cloud server is very unsafe when the port is exposed and the remote connection is opened. Yes, one of my servers was attacked by a ransomware virus yesterday, and I was asked to pay 0.06 Bitcoin to redeem my data. Fortunately, there was no important data in that database. It was just a database that had been abandoned for half a year. I had forgotten the password. Fortunately, I found the password through some means. After I logged in, I was dumbfounded. So what should we do if we don’t want to enable remote login but still want to operate the database? what to do? It can be solved with phpmyadmin, but phpmyadmin also has certain risks. Let's see how to play it below.
Use Docker to publish phpmyadmin and connect to the existing MySQL container
-
First download the docker image of phpmyadmin
# 先查询镜像仓库里有哪些镜像 docker search phpmyadmin # 拉取star最多的镜像or拉取你想用的镜像 docker pull docker.io/phpmyadmin/phpmyadmin 拉取镜像需要一段时间,这个要看服务器的带宽网速了
Copy after login Start the image and connect to the existing MySQL container
# 启动镜像 docker run --name myadmin -p 80:80 -d --link mysql-db:db docker.io/phpmyadmin/phpmyadmin # 修改容器配置文件 ## 将配置文件复制到宿主机中 docker cp myadmin:/etc/phpmyadmin/config.inc.php . ## 修改配置文件信息(这里修改的db就是在启动的时候--link后面指定的别名) $cfg['Servers'][$i]['host'] = 'localhost' ——> $cfg['Servers'][$i]['host'] = 'db' ## 将修改后的配置文件复制回容器中 docker cp ./config.inc.php myadmin:/etc/phpmyadmin/ # 重启phpmyadmin容器
Copy after loginYou can connect here. Of course, you can also modify the configuration file to limit the connected users, and then in MySQL Authorize the connection user
Use docker-compose to create
Install docker-compose, I won’t go into details here,
Write the docker-compose.yml file
version: "2" services: mysql: image: hub.c.163.com/library/mysql container_name: test-mysql restart: always ports: - "3306:3306" environment: MYSQL_USER: "root" MYSQL_PASSWORD: "root" MYSQL_ROOT_PASSWORD: "root" networks: - net-mysql phpmyadmin: image: docker.io/phpmyadmin/phpmyadmin container_name: test-myadmin ports: - "80:80" environment: MYSQL_USER: "root" MYSQL_PASSWORD: "root" MYSQL_ROOT_PASSWORD: "root" networks: - net-mysql networks: net-mysql:
Copy after loginPublish the container
# 使用命令发布容器 docker-compose up -d
Copy after loginThen you can use it without modification. Any configuration file
Recommended learning: "PHP Video Tutorial"
The above is the detailed content of Learn to install phpmyadmin with Docker in one minute (share). For more information, please follow other related articles on the PHP Chinese website!

Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

AI Hentai Generator
Generate AI Hentai for free.

Hot Article

Hot Tools

Notepad++7.3.1
Easy-to-use and free code editor

SublimeText3 Chinese version
Chinese version, very easy to use

Zend Studio 13.0.1
Powerful PHP integrated development environment

Dreamweaver CS6
Visual web development tools

SublimeText3 Mac version
God-level code editing software (SublimeText3)

Hot Topics



Alipay PHP...

JWT is an open standard based on JSON, used to securely transmit information between parties, mainly for identity authentication and information exchange. 1. JWT consists of three parts: Header, Payload and Signature. 2. The working principle of JWT includes three steps: generating JWT, verifying JWT and parsing Payload. 3. When using JWT for authentication in PHP, JWT can be generated and verified, and user role and permission information can be included in advanced usage. 4. Common errors include signature verification failure, token expiration, and payload oversized. Debugging skills include using debugging tools and logging. 5. Performance optimization and best practices include using appropriate signature algorithms, setting validity periods reasonably,

Article discusses late static binding (LSB) in PHP, introduced in PHP 5.3, allowing runtime resolution of static method calls for more flexible inheritance.Main issue: LSB vs. traditional polymorphism; LSB's practical applications and potential perfo

Article discusses essential security features in frameworks to protect against vulnerabilities, including input validation, authentication, and regular updates.

Sending JSON data using PHP's cURL library In PHP development, it is often necessary to interact with external APIs. One of the common ways is to use cURL library to send POST�...

The application of SOLID principle in PHP development includes: 1. Single responsibility principle (SRP): Each class is responsible for only one function. 2. Open and close principle (OCP): Changes are achieved through extension rather than modification. 3. Lisch's Substitution Principle (LSP): Subclasses can replace base classes without affecting program accuracy. 4. Interface isolation principle (ISP): Use fine-grained interfaces to avoid dependencies and unused methods. 5. Dependency inversion principle (DIP): High and low-level modules rely on abstraction and are implemented through dependency injection.

The article discusses adding custom functionality to frameworks, focusing on understanding architecture, identifying extension points, and best practices for integration and debugging.

Session hijacking can be achieved through the following steps: 1. Obtain the session ID, 2. Use the session ID, 3. Keep the session active. The methods to prevent session hijacking in PHP include: 1. Use the session_regenerate_id() function to regenerate the session ID, 2. Store session data through the database, 3. Ensure that all session data is transmitted through HTTPS.
