Home Operation and Maintenance Linux Operation and Maintenance How to configure and manage database services on Linux

How to configure and manage database services on Linux

Nov 07, 2023 pm 12:40 PM
Configuration: linux database service settings Management: linux database service management

How to configure and manage database services on Linux

In modern computer application development, databases are an integral part. In addition to installing the database software in the operating system, it also needs to be configured and managed. In this article, we will detail how to configure and manage database services on Linux and provide specific code examples.

In this article, we will focus on the MySQL database as it is one of the most popular open source relational databases. We will also use MySQL server on Linux operating system. How to install MySQL server varies by operating system, but an increasing number of Linux distributions include it in their default software repositories, so it can be easily installed from the package manager.

Once you have installed the MySQL server, you need to configure it to run. First, you need to assign a MySQL system user and ensure that the user has the appropriate permissions.

sudo useradd mysql
sudo passwd mysql
Copy after login

Next, you need to install the MySQL package and start the MySQL server when the system starts. The following are the commands to install and start the MySQL server on Ubuntu:

sudo apt-get update
sudo apt-get install mysql-server
sudo systemctl start mysql
sudo systemctl enable mysql
Copy after login

Once the installation is complete, you can connect to the MySQL server using the following command:

mysql -u root -p
Copy after login

Then, you can start creating and managing databases , and add data to the table. Here are some example commands:

  • Create a new database
CREATE DATABASE mydatabase;
Copy after login
  • Delete a database
DROP DATABASE mydatabase;
Copy after login
  • Create A new table
CREATE TABLE mytable (id int, name VARCHAR(255));
Copy after login
  • Delete a table
DROP TABLE mytable;
Copy after login
  • Insert data into a table
INSERT INTO mytable (id, name) VALUES (1, 'John');
Copy after login
  • Display all data in the table
SELECT * FROM mytable;
Copy after login

In addition, you can also use the following command to configure the MySQL server:

  • Change the listening port of the MySQL server

In the MySQL configuration file (located in /etc/mysql/mysql.conf.d/mysqld.cnf), find the following line:

port = 3306
Copy after login

Change "3306" to the desired port number, Then restart the MySQL server.

  • Create a new MySQL user

Use the following command to create a new MySQL user (replace the name and password with what you want):

CREATE USER 'newuser'@'localhost' IDENTIFIED BY 'password';
Copy after login
  • Assign permissions to new users

Assign permissions to new users using the following command:

GRANT ALL PRIVILEGES ON *.* TO 'newuser'@'localhost';
Copy after login
  • Change the password of an existing MySQL user

Use the following command to change the password of an existing MySQL user (replace the name and password with your own username and new password):

SET PASSWORD FOR 'username'@'localhost' = PASSWORD('newpassword');
Copy after login

In summary, to configure and manage a MySQL server on Linux, you Need to know how to create and manage databases, tables, and users. The example commands provided above can help you get started. By combining these basic commands with more advanced MySQL features, you will be able to build a stable, reliable database server that provides reliable data storage and management for your applications.

The above is the detailed content of How to configure and manage database services on Linux. For more information, please follow other related articles on the PHP Chinese website!

Statement of this Website
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn

Hot AI Tools

Undresser.AI Undress

Undresser.AI Undress

AI-powered app for creating realistic nude photos

AI Clothes Remover

AI Clothes Remover

Online AI tool for removing clothes from photos.

Undress AI Tool

Undress AI Tool

Undress images for free

Clothoff.io

Clothoff.io

AI clothes remover

AI Hentai Generator

AI Hentai Generator

Generate AI Hentai for free.

Hot Article

R.E.P.O. Energy Crystals Explained and What They Do (Yellow Crystal)
4 weeks ago By 尊渡假赌尊渡假赌尊渡假赌
R.E.P.O. Best Graphic Settings
4 weeks ago By 尊渡假赌尊渡假赌尊渡假赌
R.E.P.O. How to Fix Audio if You Can't Hear Anyone
1 months ago By 尊渡假赌尊渡假赌尊渡假赌
R.E.P.O. Chat Commands and How to Use Them
1 months ago By 尊渡假赌尊渡假赌尊渡假赌

Hot Tools

Notepad++7.3.1

Notepad++7.3.1

Easy-to-use and free code editor

SublimeText3 Chinese version

SublimeText3 Chinese version

Chinese version, very easy to use

Zend Studio 13.0.1

Zend Studio 13.0.1

Powerful PHP integrated development environment

Dreamweaver CS6

Dreamweaver CS6

Visual web development tools

SublimeText3 Mac version

SublimeText3 Mac version

God-level code editing software (SublimeText3)

How do I use regular expressions (regex) in Linux for pattern matching? How do I use regular expressions (regex) in Linux for pattern matching? Mar 17, 2025 pm 05:25 PM

The article explains how to use regular expressions (regex) in Linux for pattern matching, file searching, and text manipulation, detailing syntax, commands, and tools like grep, sed, and awk.

How do I implement two-factor authentication (2FA) for SSH in Linux? How do I implement two-factor authentication (2FA) for SSH in Linux? Mar 17, 2025 pm 05:31 PM

The article provides a guide on setting up two-factor authentication (2FA) for SSH on Linux using Google Authenticator, detailing installation, configuration, and troubleshooting steps. It highlights the security benefits of 2FA, such as enhanced sec

How do I monitor system performance in Linux using tools like top, htop, and vmstat? How do I monitor system performance in Linux using tools like top, htop, and vmstat? Mar 17, 2025 pm 05:28 PM

The article discusses using top, htop, and vmstat for monitoring Linux system performance, detailing their unique features and customization options for effective system management.

How do I manage software packages in Linux using package managers (apt, yum, dnf)? How do I manage software packages in Linux using package managers (apt, yum, dnf)? Mar 17, 2025 pm 05:26 PM

Article discusses managing software packages in Linux using apt, yum, and dnf, covering installation, updates, and removals. It compares their functionalities and suitability for different distributions.

How do I use sudo to grant elevated privileges to users in Linux? How do I use sudo to grant elevated privileges to users in Linux? Mar 17, 2025 pm 05:32 PM

The article explains how to manage sudo privileges in Linux, including granting, revoking, and best practices for security. Key focus is on editing /etc/sudoers safely and limiting access.Character count: 159

Key Linux Operations: A Beginner's Guide Key Linux Operations: A Beginner's Guide Apr 09, 2025 pm 04:09 PM

Linux beginners should master basic operations such as file management, user management and network configuration. 1) File management: Use mkdir, touch, ls, rm, mv, and CP commands. 2) User management: Use useradd, passwd, userdel, and usermod commands. 3) Network configuration: Use ifconfig, echo, and ufw commands. These operations are the basis of Linux system management, and mastering them can effectively manage the system.

How to interpret the output results of Debian Sniffer How to interpret the output results of Debian Sniffer Apr 12, 2025 pm 11:00 PM

DebianSniffer is a network sniffer tool used to capture and analyze network packet timestamps: displays the time for packet capture, usually in seconds. Source IP address (SourceIP): The network address of the device that sent the packet. Destination IP address (DestinationIP): The network address of the device receiving the data packet. SourcePort: The port number used by the device sending the packet. Destinatio

How to check Debian OpenSSL configuration How to check Debian OpenSSL configuration Apr 12, 2025 pm 11:57 PM

This article introduces several methods to check the OpenSSL configuration of the Debian system to help you quickly grasp the security status of the system. 1. Confirm the OpenSSL version First, verify whether OpenSSL has been installed and version information. Enter the following command in the terminal: If opensslversion is not installed, the system will prompt an error. 2. View the configuration file. The main configuration file of OpenSSL is usually located in /etc/ssl/openssl.cnf. You can use a text editor (such as nano) to view: sudonano/etc/ssl/openssl.cnf This file contains important configuration information such as key, certificate path, and encryption algorithm. 3. Utilize OPE

See all articles