Table of Contents
视图
视图操作
创建或修改视图:
删除视图
查看视图
Home Database Mysql Tutorial MySQL管理与优化(8)_MySQL

MySQL管理与优化(8)_MySQL

Jun 01, 2016 pm 01:08 PM

视图

  • 视图是一种虚拟存在的表,对于使用视图的用户来说基本是透明的。
  • 视图相对于普通表的优势:

        1. 简单:使用视图的用户完全不需要关心后面对应的表的结构,关联条件和筛选条件,对用户来说已经是               过滤好的符合条件的结果集。

        2. 安全:使用视图的用户只能访问他们被允许查询的结果集,对表的权限管理并不能限制到某个行某个                 列,但是通过视图就可简单地实现。

        3. 数据独立:一旦视图的结构确定了,可以屏蔽表结构变化对用户的影响,源表增加列对视图没有影响;             源表修改列名,则可以通过修改视图来解决,不会造成对访问的影响。

视图操作

创建或修改视图:

  • 创建视图的语法:
CREATE    [OR REPLACE]    [ALGORITHM = {UNDEFINED | MERGE | TEMPTABLE}]    [DEFINER = { user | CURRENT_USER }]    [SQL SECURITY { DEFINER | INVOKER }]    VIEW view_name [(column_list)]    AS select_statement    [WITH [CASCADED | LOCAL] CHECK OPTION]
Copy after login
  • 修改视图的语法:
ALTER    [ALGORITHM = {UNDEFINED | MERGE | TEMPTABLE}]    [DEFINER = { user | CURRENT_USER }]    [SQL SECURITY { DEFINER | INVOKER }]    VIEW view_name [(column_list)]    AS select_statement    [WITH [CASCADED | LOCAL] CHECK OPTION]
Copy after login
  • 范例:
-- 创建或更新视图mysql> CREATE OR REPLACE VIEW city_list_view AS    -> SELECT id, city FROM city;Query OK, 0 rows affected (0.07 sec)
Copy after login
  • MySQL视图定义有一些限制:

1. FROM关键字后面不能包含子查询。

2. 包含以下关键字的SQL语句:聚合函数(SUM, MIN,MAX,COUNT等),(DISTINCT, GROUP BY,HAVING, UNION, UNION ALL)。

3. 常量视图。

4. SELECT中包含子查询。

5. JOIN。

6. FROM一个不能更新的视图。

7. WHERE子句的子查询引用了FROM子句中的表。

  • 对于WITH [CASCADED|LOCAL] CHECK OPTION:

1. LOCAL是只要满足本视图的条件就可以更新;

2. CASCADED则是必须满足所有针对该视图的所有视图的条件才可以更新。如,

删除视图

  • 删除视图语法:
DROP VIEW [IF EXISTS]    view_name [, view_name] ...    [RESTRICT | CASCADE]
Copy after login
mysql> drop view city_list_view;Query OK, 0 rows affected (0.00 sec)
Copy after login

查看视图

-- MySQL5.1后, show tables也会列出视图mysql> show tables;+---------------------+| Tables_in_mysqltest |+---------------------+| blob_test           || city                || city_list_view1     || city_list_view2     || city_list_view3     |+---------------------+5 rows in set (0.00 sec)-- 模糊查询视图mysql> show table status like 'city_list%' /G
Copy after login
具体视图相关的细节可参考:

http://dev.mysql.com/doc/refman/5.7/en/views.html

不吝指正。

Statement of this Website
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn

Hot AI Tools

Undresser.AI Undress

Undresser.AI Undress

AI-powered app for creating realistic nude photos

AI Clothes Remover

AI Clothes Remover

Online AI tool for removing clothes from photos.

Undress AI Tool

Undress AI Tool

Undress images for free

Clothoff.io

Clothoff.io

AI clothes remover

AI Hentai Generator

AI Hentai Generator

Generate AI Hentai for free.

Hot Article

R.E.P.O. Energy Crystals Explained and What They Do (Yellow Crystal)
3 weeks ago By 尊渡假赌尊渡假赌尊渡假赌
R.E.P.O. Best Graphic Settings
3 weeks ago By 尊渡假赌尊渡假赌尊渡假赌
R.E.P.O. How to Fix Audio if You Can't Hear Anyone
3 weeks ago By 尊渡假赌尊渡假赌尊渡假赌

Hot Tools

Notepad++7.3.1

Notepad++7.3.1

Easy-to-use and free code editor

SublimeText3 Chinese version

SublimeText3 Chinese version

Chinese version, very easy to use

Zend Studio 13.0.1

Zend Studio 13.0.1

Powerful PHP integrated development environment

Dreamweaver CS6

Dreamweaver CS6

Visual web development tools

SublimeText3 Mac version

SublimeText3 Mac version

God-level code editing software (SublimeText3)

How do you alter a table in MySQL using the ALTER TABLE statement? How do you alter a table in MySQL using the ALTER TABLE statement? Mar 19, 2025 pm 03:51 PM

The article discusses using MySQL's ALTER TABLE statement to modify tables, including adding/dropping columns, renaming tables/columns, and changing column data types.

How do I configure SSL/TLS encryption for MySQL connections? How do I configure SSL/TLS encryption for MySQL connections? Mar 18, 2025 pm 12:01 PM

Article discusses configuring SSL/TLS encryption for MySQL, including certificate generation and verification. Main issue is using self-signed certificates' security implications.[Character count: 159]

How do you handle large datasets in MySQL? How do you handle large datasets in MySQL? Mar 21, 2025 pm 12:15 PM

Article discusses strategies for handling large datasets in MySQL, including partitioning, sharding, indexing, and query optimization.

What are some popular MySQL GUI tools (e.g., MySQL Workbench, phpMyAdmin)? What are some popular MySQL GUI tools (e.g., MySQL Workbench, phpMyAdmin)? Mar 21, 2025 pm 06:28 PM

Article discusses popular MySQL GUI tools like MySQL Workbench and phpMyAdmin, comparing their features and suitability for beginners and advanced users.[159 characters]

How do you drop a table in MySQL using the DROP TABLE statement? How do you drop a table in MySQL using the DROP TABLE statement? Mar 19, 2025 pm 03:52 PM

The article discusses dropping tables in MySQL using the DROP TABLE statement, emphasizing precautions and risks. It highlights that the action is irreversible without backups, detailing recovery methods and potential production environment hazards.

How do you create indexes on JSON columns? How do you create indexes on JSON columns? Mar 21, 2025 pm 12:13 PM

The article discusses creating indexes on JSON columns in various databases like PostgreSQL, MySQL, and MongoDB to enhance query performance. It explains the syntax and benefits of indexing specific JSON paths, and lists supported database systems.

How do you represent relationships using foreign keys? How do you represent relationships using foreign keys? Mar 19, 2025 pm 03:48 PM

Article discusses using foreign keys to represent relationships in databases, focusing on best practices, data integrity, and common pitfalls to avoid.

How do I secure MySQL against common vulnerabilities (SQL injection, brute-force attacks)? How do I secure MySQL against common vulnerabilities (SQL injection, brute-force attacks)? Mar 18, 2025 pm 12:00 PM

Article discusses securing MySQL against SQL injection and brute-force attacks using prepared statements, input validation, and strong password policies.(159 characters)

See all articles