Solved

mysql telnet error

Posted on 2009-04-09
2
783 Views
Last Modified: 2013-11-08
i am trying to test mysql connection  on a linux mach. i have created the user in mysql and given that user all privilages to connect from any host'%'. and i am able to connect to that linux mach.'s mysql server and able to work but when i try to telnet it form the same mach i am getting error

command:
telnet localhost 3306

ho can i over come this error my  web applicaion is giving error.
error is 
Trying 127.0.0.1 ...
Connected to localhost.localdomain (127.0.0.1).
Escape character is '^]'.
4
5.0.22BCLT"JIR,#f^$4z,fCYsConenction closed by foreign host.

Open in new window

0
Comment
Question by:serveradmin
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 19

Accepted Solution

by:
jools earned 500 total points
ID: 24106302
what do you expect to happen? The application uses this port to connect, you don't get a login prompt there!

to test mysql you would use the command;
    mysql -u <userid> -p<password> <database>

<userid> must be configured to connect using the GRANT option, I believe there is also a mysqladmin command that can do this;

0
 
LVL 7

Expert Comment

by:mchkorg
ID: 24114054
jools is right.
"Telneting" your server will just make sure it's available on your network (here, locally)
Here's mine :
telnet localhost 3306
Trying 127.0.0.1...
Connected to localhost.localdomain.
Escape character is '^]'.
8
5.0.51a-24U.R0B,ZaZ,|$;;X*d=CuHD^]
telnet> quit
Connection closed.

What is the web application you're talking about? why should it be doing a telnet connection? O_o
If it's something like a PHP web-application, you'll have to enable PHP for your web server and so on...

First of all, check if you can connect with the regular mysql command-line tool
0

Featured Post

Resolve Critical IT Incidents Fast

If your data, services or processes become compromised, your organization can suffer damage in just minutes and how fast you communicate during a major IT incident is everything. Learn how to immediately identify incidents & best practices to resolve them quickly and effectively.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
reverse engineer .sql from php files 11 65
MySQL recovery 7 57
how to include conditional log rotate in liunx. 17 103
embadded search engine in website 4 46
Password hashing is better than message digests or encryption, and you should be using it instead of message digests or encryption.  Find out why and how in this article, which supplements the original article on PHP Client Registration, Login, Logo…
When it comes to security, there are always trade-offs between security and convenience/ease of administration. This article examines some of the main pros and cons of using key authentication vs password authentication for hosting an SFTP server.
Viewers will learn how to properly install and use Secure Shell (SSH) to work on projects or homework remotely. Download Secure Shell: Follow basic installation instructions: Open Secure Shell and use "Quick Connect" to enter credentials includi…
How to Install VMware Tools in Red Hat Enterprise Linux 6.4 (RHEL 6.4) Step-by-Step Tutorial

737 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question