search
HomeOperation and MaintenanceDockerWhat to do if docker container mysql authorization fails

In recent years, Docker container technology has been more and more widely used in various application scenarios. It provides a lightweight, rapid deployment and management method, making application development and operation and maintenance more efficient. When using Docker container technology, we may encounter some problems, such as MySQL authorization failure in the container. This article explains how to resolve this issue.

MySQL authorization failure in the Docker container may lead to issues such as access denial. This situation is usually caused by user authorization not being set correctly in the container. In Docker containers, there are two main methods for MySQL user authorization: password-based authorization and authentication plug-in-based authorization.

Password-based authorization

In password-based authorization, MySQL users need to create an account password in the container and use these credentials for authorization when accessing the container from the outside. You can create a MySQL account through the following steps:

  1. Enter the MySQL server in the Docker container

First, we need to enter the MySQL server in the container, which can be done with the following command Implementation:

docker exec -it mysql-container mysql -u root -p

This command will start an interactive terminal and connect to the MySQL server in the container.

  1. Create a new user

In the MySQL terminal, you can use the following command to create a new user:

CREATE USER 'newuser'@'%' IDENTIFIED BY 'password';

Where, 'newuser' is the new user's Username, '%' means that the user can be accessed from any IP address, 'password' is the password of the new user.

  1. Authorize new users

Similarly, in the MySQL terminal, you can use the following command to authorize new users:

GRANT ALL PRIVILEGES ON *.* TO 'newuser'@'%';

This command will grant new users Access to all databases and tables.

  1. Refresh Permissions

Finally, in order for the changes to take effect, we need to refresh the permissions:

FLUSH PRIVILEGES;

Now, the new user has been successfully created and authorized, The MySQL container can be accessed externally using its username and password.

Authentication plug-in-based authorization

In authentication plug-in-based authorization, the MySQL server uses external authentication plug-ins for user authentication, such as using SSL certificates, Kerberos, etc., for more secure Authenticate the user. In a Docker container, the authentication plugin can be set up using the following steps:

  1. Install the plugin into the MySQL container

In order to use the authentication plugin, we need to install the plugin into the MySQL server in the Docker container. This can be achieved by following these steps:

docker cp auth_plugin.so mysql-container:/usr/lib/mysql/plugin/

This command copies the plugin file auth_plugin.so to the /usr/lib/mysql/plugin/ directory in the container.

  1. Enable plugin

Then, we need to enable the plugin in the MySQL configuration file. The configuration file can be modified with the following command:

docker exec -it mysql-container bash
vi /etc/mysql/my.cnf

In the section that enables the authentication plug-in, you need to add the following lines:

[mysqld]
plugin-load = auth_plugin.so
  1. Create user

In In the MySQL terminal, we need to create a user based on the plug-in. This can be achieved through the following command:

CREATE USER 'newuser'@'%' IDENTIFIED WITH auth_plugin AS 'cred';

Where, 'newuser' is the user name of the new user, and '%' means that the user can access from any IP address For access, 'cred' is a credential encrypted string used to authenticate the user when using the plugin.

  1. Authorize new users

Similarly, in the MySQL terminal, we need to use the following command to authorize the new user:

GRANT ALL PRIVILEGES ON *.* TO 'newuser'@'%';

This command will grant the new user User access to all databases and tables.

  1. Refresh permissions

Finally, we need to refresh permissions:

FLUSH PRIVILEGES;

Now, the plug-in-based user has been successfully created and authorized, and can be used Its credentials are used to access the MySQL container from outside.

Summary

In a Docker container, MySQL authorization failure may cause problems such as access denial. This article introduces two MySQL user authorization methods: password-based authorization and authentication plug-in-based authorization. Regardless of which method is used, user authorization needs to be set up correctly to access the MySQL server in the container from the outside.

The above is the detailed content of What to do if docker container mysql authorization fails. For more information, please follow other related articles on the PHP Chinese website!

Statement
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn
Kubernetes vs. Docker: Understanding the RelationshipKubernetes vs. Docker: Understanding the RelationshipMay 12, 2025 am 12:16 AM

The relationship between Docker and Kubernetes is: Docker is used to package applications, and Kubernetes is used to orchestrate and manage containers. 1.Docker simplifies application packaging and distribution through container technology. 2. Kubernetes manages containers to ensure high availability and scalability. They are used in combination to improve application deployment and management efficiency.

Docker: The Container Revolution and Its ImpactDocker: The Container Revolution and Its ImpactMay 10, 2025 am 12:17 AM

Docker solves the problem of consistency in software running in different environments through container technology. Its development history has promoted the evolution of the cloud computing ecosystem from 2013 to the present. Docker uses Linux kernel technology to achieve process isolation and resource limitation, improving the portability of applications. In development and deployment, Docker improves resource utilization and deployment speed, supports DevOps and microservice architectures, but also faces challenges in image management, security and container orchestration.

Docker vs. Virtual Machines: A ComparisonDocker vs. Virtual Machines: A ComparisonMay 09, 2025 am 12:19 AM

Docker and virtual machines have their own advantages and disadvantages, and the choice should be based on specific needs. 1.Docker is lightweight and fast, suitable for microservices and CI/CD, fast startup and low resource utilization. 2. Virtual machines provide high isolation and multi-operating system support, but they consume a lot of resources and slow startup.

Docker's Architecture: Understanding Containers and ImagesDocker's Architecture: Understanding Containers and ImagesMay 08, 2025 am 12:17 AM

The core concept of Docker architecture is containers and mirrors: 1. Mirrors are the blueprint of containers, including applications and their dependencies. 2. Containers are running instances of images and are created based on images. 3. The mirror consists of multiple read-only layers, and the writable layer is added when the container is running. 4. Implement resource isolation and management through Linux namespace and control groups.

The Power of Docker: Containerization ExplainedThe Power of Docker: Containerization ExplainedMay 07, 2025 am 12:07 AM

Docker simplifies the construction, deployment and operation of applications through containerization technology. 1) Docker is an open source platform that uses container technology to package applications and their dependencies to ensure cross-environment consistency. 2) Mirrors and containers are the core of Docker. The mirror is the executable package of the application and the container is the running instance of the image. 3) Basic usage of Docker is like running an Nginx server, and advanced usage is like using DockerCompose to manage multi-container applications. 4) Common errors include image download failure and container startup failure, and debugging skills include viewing logs and checking ports. 5) Performance optimization and best practices include mirror optimization, resource management and security improvement.

Kubernetes and Docker: Deploying and Managing Containerized AppsKubernetes and Docker: Deploying and Managing Containerized AppsMay 06, 2025 am 12:13 AM

The steps to deploy containerized applications using Kubernetes and Docker include: 1. Build a Docker image, define the application image using Dockerfile and push it to DockerHub. 2. Create Deployment and Service in Kubernetes to manage and expose applications. 3. Use HorizontalPodAutoscaler to achieve dynamic scaling. 4. Debug common problems through kubectl command. 5. Optimize performance, define resource limitations and requests, and manage configurations using Helm.

Docker: An Introduction to Containerization TechnologyDocker: An Introduction to Containerization TechnologyMay 05, 2025 am 12:11 AM

Docker is an open source platform for developing, packaging and running applications, and through containerization technology, solving the consistency of applications in different environments. 1. Build the image: Define the application environment and dependencies through the Dockerfile and build it using the dockerbuild command. 2. Run the container: Use the dockerrun command to start the container from the mirror. 3. Manage containers: manage container life cycle through dockerps, dockerstop, dockerrm and other commands.

Docker and Linux: Building Portable ApplicationsDocker and Linux: Building Portable ApplicationsMay 03, 2025 am 12:17 AM

How to build portable applications with Docker and Linux? First, use Dockerfile to containerize the application, and then manage and deploy the container in a Linux environment. 1) Write a Dockerfile and package the application and its dependencies into a mirror. 2) Build and run containers on Linux using dockerbuild and dockerrun commands. 3) Manage multi-container applications through DockerCompose and define service dependencies. 4) Optimize the image size and resource configuration, enhance security, and improve application performance and portability.

See all articles

Hot AI Tools

Undresser.AI Undress

Undresser.AI Undress

AI-powered app for creating realistic nude photos

AI Clothes Remover

AI Clothes Remover

Online AI tool for removing clothes from photos.

Undress AI Tool

Undress AI Tool

Undress images for free

Clothoff.io

Clothoff.io

AI clothes remover

Video Face Swap

Video Face Swap

Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Article

Hot Tools

SecLists

SecLists

SecLists is the ultimate security tester's companion. It is a collection of various types of lists that are frequently used during security assessments, all in one place. SecLists helps make security testing more efficient and productive by conveniently providing all the lists a security tester might need. List types include usernames, passwords, URLs, fuzzing payloads, sensitive data patterns, web shells, and more. The tester can simply pull this repository onto a new test machine and he will have access to every type of list he needs.

ZendStudio 13.5.1 Mac

ZendStudio 13.5.1 Mac

Powerful PHP integrated development environment

MantisBT

MantisBT

Mantis is an easy-to-deploy web-based defect tracking tool designed to aid in product defect tracking. It requires PHP, MySQL and a web server. Check out our demo and hosting services.

MinGW - Minimalist GNU for Windows

MinGW - Minimalist GNU for Windows

This project is in the process of being migrated to osdn.net/projects/mingw, you can continue to follow us there. MinGW: A native Windows port of the GNU Compiler Collection (GCC), freely distributable import libraries and header files for building native Windows applications; includes extensions to the MSVC runtime to support C99 functionality. All MinGW software can run on 64-bit Windows platforms.

SublimeText3 Linux new version

SublimeText3 Linux new version

SublimeText3 Linux latest version