Solved

using mysql on fedora 6

Posted on 2006-11-11
12
195 Views
Last Modified: 2013-12-06
I've imported a database from another server it loaded up fine. Now I've added a user and am trying to run a php file the php file says cannot connect to database. Using the same login as specified in the php file I'm able to connect to mysql admintrator. The php file is on the localhost as is the sql server. Perissions have been set to allow the localhost to connect. Want to run down a list of reasons I may be not able to connect to the DB? I know my php code is correct as it can connect to my old server.
0
Comment
Question by:JPERKS1985
  • 6
  • 3
  • 3
12 Comments
 
LVL 14

Expert Comment

by:ygoutham
Comment Utility
is selinux running?  if so then it might create permission issues if not configured properly.

setenforce 0

the above command will disable selinux and try testing the code once again.
0
 
LVL 1

Author Comment

by:JPERKS1985
Comment Utility
i tried that, still can't get it to work.
0
 
LVL 14

Expert Comment

by:ygoutham
Comment Utility
0is the user added in mysql table with proper rights??

is the user added with the ip address of the machine rather than localhost????
0
 
LVL 5

Expert Comment

by:ircpamanager
Comment Utility
sounds like ygoutham is correct, you can check to see if that is the problem by typing:\
GRANT ALL PRIVILEGES ON *.* TO 'you'@'%'
    ->     IDENTIFIED BY 'some_pass' WITH GRANT OPTION;
this will give "you" access to all from any host. Make sure you delete this user after you are done.
0
 
LVL 1

Author Comment

by:JPERKS1985
Comment Utility
i'm using the gui mysql admin, for the user all the resource limits are set at 0 which is infinite I take it, the user was granted access to the proper database yet it still won't connect.
0
 
LVL 5

Expert Comment

by:ircpamanager
Comment Utility
try doing it from cli.
mysql -u user -p password
GRANT ALL PRIVILEGES ON *.* TO 'you'@'%'
    ->     IDENTIFIED BY 'some_pass' WITH GRANT OPTION;
0
Threat Intelligence Starter Resources

Integrating threat intelligence can be challenging, and not all companies are ready. These resources can help you build awareness and prepare for defense.

 
LVL 1

Author Comment

by:JPERKS1985
Comment Utility
[root@ip-207-145-62-4 ~]# mysql -u imgsrv -p imgsrv
Enter password:
Reading table information for completion of table and column names
You can turn off this feature to get a quicker startup with -A

Welcome to the MySQL monitor.  Commands end with ; or \g.
Your MySQL connection id is 22 to server version: 5.0.22

Type 'help;' or '\h' for help. Type '\c' to clear the buffer.

mysql>
0
 
LVL 1

Author Comment

by:JPERKS1985
Comment Utility
ERROR 1045 (28000): Access denied for user 'imgsrv'@'localhost' (using password: YES)
0
 
LVL 1

Author Comment

by:JPERKS1985
Comment Utility
second tried I logged in as root and did it


mysql> GRANT ALL PRIVILEGES ON *.* TO 'imgsrv'@'%'
    -> IDENTIFIED BY '*****' WITH GRANT OPTION;
Query OK, 0 rows affected (0.02 sec)

mysql>


I am not unsuccessful at connecting to the database.
0
 
LVL 1

Author Comment

by:JPERKS1985
Comment Utility
sorry i meant to say I am still unsuccesful.
0
 
LVL 14

Accepted Solution

by:
ygoutham earned 500 total points
Comment Utility
what does

connect to

mysql mysql

select * from user

and

select * from table_priv

does this have imgsrv?  see through the info.  these tables must have the user details and his rights list in them for the user to be able to connect.
0
 
LVL 5

Expert Comment

by:ircpamanager
Comment Utility
is the DB on the same server as Apache
0

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

1. Introduction As many people are interested in Linux but not as many are interested or knowledgeable (enough) to install Linux on their system, here is a safe way to try out Linux on your existing (Windows) system. The idea is that you insta…
It’s 2016. Password authentication should be dead — or at least close to dying. But, unfortunately, it has not traversed Quagga stage yet. Using password authentication is like laundering hotel guest linens with a washboard — it’s Passé.
Learn how to get help with Linux/Unix bash shell commands. Use help to read help documents for built in bash shell commands.: Use man to interface with the online reference manuals for shell commands.: Use man to search man pages for unknown command…
Learn how to find files with the shell using the find and locate commands. Use locate to find a needle in a haystack.: With locate, check if the file still exists.: Use find to get the actual location of the file.:

744 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

18 Experts available now in Live!

Get 1:1 Help Now