![]() Grant all privileges on *.* to with grant option In this example, the created user is named sqlsa and a strong password is used: mysql -u root -p Create a new admin user and replace and as required for your environment. Run the following commands to log in to MySQL as root, using the root password which is recorded in ~/bitnami_credentials. sudo service bitnami restartĬreate a remote access user account to be used by the Azure Stack Hub MySQL Hosting Server to connect to MySQL. Restart the bitnami service and make sure the bitnami service is running properly. ĭefault_authentication_plugin=mysql_native_password Set the property default_authentication_plugin with value mysql_native_password. Take Bitnami MySQL as example, the configuration file is under /opt/bitnami/mysql/conf/my.cnf. If the MySQL version is below 8.0, this step can be skipped. If the MySQL hosting server is version 8.0 or above, you need to change the authentication method to mysql_native_password. Provide the bitnami password again when prompted: In the SSH client window, use the following command to ensure the bitnami service is active and running. Use the public IP and log in to the VM with the username and the application password you created earlier without special characters. Using an SSH client (this example uses PuTTY) log in to the MySQL server from a computer that can access the public IP. Take Bitnami MySQL, which is available in Azure Stack Hub marketplace as an example, you can take the following steps to configure the external access. Select Add to close the inbound security rule dialog.Ĭonfigure external access to the MySQL hosting serverīefore the MySQL server can be added as an Azure Stack Hub MySQL Server host, external access must be enabled. Select Inbound security rules and then select Add.Įnter 3306 in the Destination port range and optionally provide a description in the Name and Description fields. ![]() ![]() In the administrator portal, go to the resource group created when deploying the MySQL server and select the network security group ( default-subnet-sg): ![]() For the Azure Stack Hub MySQL resource provider to connect and manage the MySQL server, an inbound network security group (NSG) rule needs to be created. Prepare a MySQL hosting server Create a network security group ruleīy default, no public access is configured for MySQL into the host VM. MySQL 8.0 servers must be configured to use mysql_native_password. The MySQL RP doesn't support caching_sha2_password authentication. MySQL versions 5.6, 5.7 and 8.0 may be used for your hosting servers. The resource provider server shouldn't be used to host user databases. The MySQL resource provider should be created in the default provider subscription while MySQL hosting servers should be created in billable, user subscriptions. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |