mysql - 无法将 VPS 上的 NodeJS 连接到另一个主机上的 MySQL
问题描述
我在 VPS 上部署了我的 nodejs 应用程序,但它无法连接到托管在另一台服务器上的 MySQL 数据库,但它可以在我的 PC 和另一个 VPS 上运行。
我决定测试这个连接:
nmap -p 3306 mysqlserver.com
PORT STATE SERVICE
3306/tcp filtered mysql
当我在我的个人电脑上尝试它时,我得到了:
nmap -p 3306 mysqlserver.com
PORT STATE SERVICE
3306/tcp open mysql
我可以成功连接到 PC 上的远程 mysql
iptables
Active Internet connections (only servers)
Proto Recv-Q Send-Q Local Address Foreign Address State PID/Program name
tcp 0 0 0.0.0.0:22 0.0.0.0:* LISTEN 1226/sshd
tcp 0 0 0.0.0.0:5432 0.0.0.0:* LISTEN 1282/postgres
tcp 0 0 127.0.0.1:25 0.0.0.0:* LISTEN 1543/master
tcp6 0 0 :::48937 :::* LISTEN 2572/node
tcp6 0 0 :::80 :::* LISTEN 1229/httpd
tcp6 0 0 :::22 :::* LISTEN 1226/sshd
tcp6 0 0 :::5432 :::* LISTEN 1282/postgres
tcp6 0 0 ::1:25 :::* LISTEN 1543/master
tcp6 0 0 :::47135 :::* LISTEN 2572/node
udp 0 0 0.0.0.0:5353 0.0.0.0:* 604/avahi-daemon: r
udp 0 0 0.0.0.0:54701 0.0.0.0:* 604/avahi-daemon: r
[root@host1 /]# iptables -L -n -v
Chain INPUT (policy ACCEPT 0 packets, 0 bytes)
pkts bytes target prot opt in out source destination
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:3306
84363 8756K ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0 ctstate RELATED,ESTABLISHED
3 180 ACCEPT all -- lo * 0.0.0.0/0 0.0.0.0/0
8791 554K INPUT_direct all -- * * 0.0.0.0/0 0.0.0.0/0
8791 554K INPUT_ZONES_SOURCE all -- * * 0.0.0.0/0 0.0.0.0/0
8791 554K INPUT_ZONES all -- * * 0.0.0.0/0 0.0.0.0/0
1163 41912 ACCEPT icmp -- * * 0.0.0.0/0 0.0.0.0/0
405 79341 REJECT all -- * * 0.0.0.0/0 0.0.0.0/0 reject-with icmp-host-prohibited
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp spt:3306
0 0 ACCEPT udp -- * * 0.0.0.0/0 0.0.0.0/0 udp spt:3306 dpt:3306
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp spt:3306 ctstate ESTABLISHED
0 0 ACCEPT tcp -- eth0 * 0.0.0.0/0 0.0.0.0/0 tcp dpt:3306 state NEW,ESTABLISHED
Chain FORWARD (policy ACCEPT 0 packets, 0 bytes)
pkts bytes target prot opt in out source destination
0 0 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0 ctstate RELATED,ESTABLISHED
0 0 ACCEPT all -- lo * 0.0.0.0/0 0.0.0.0/0
0 0 FORWARD_direct all -- * * 0.0.0.0/0 0.0.0.0/0
0 0 FORWARD_IN_ZONES_SOURCE all -- * * 0.0.0.0/0 0.0.0.0/0
0 0 FORWARD_IN_ZONES all -- * * 0.0.0.0/0 0.0.0.0/0
0 0 FORWARD_OUT_ZONES_SOURCE all -- * * 0.0.0.0/0 0.0.0.0/0
0 0 FORWARD_OUT_ZONES all -- * * 0.0.0.0/0 0.0.0.0/0
0 0 ACCEPT icmp -- * * 0.0.0.0/0 0.0.0.0/0
0 0 REJECT all -- * * 0.0.0.0/0 0.0.0.0/0 reject-with icmp-host-prohibited
Chain OUTPUT (policy ACCEPT 9878 packets, 1240K bytes)
pkts bytes target prot opt in out source destination
72617 11M OUTPUT_direct all -- * * 0.0.0.0/0 0.0.0.0/0
14 616 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:3306
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:3306
0 0 ACCEPT tcp -- * eth0 0.0.0.0/0 0.0.0.0/0 tcp spt:3306 state ESTABLISHED
Chain FORWARD_IN_ZONES (1 references)
pkts bytes target prot opt in out source destination
0 0 FWDI_public all -- ens160 * 0.0.0.0/0 0.0.0.0/0 [goto]
0 0 FWDI_public all -- + * 0.0.0.0/0 0.0.0.0/0 [goto]
Chain FORWARD_IN_ZONES_SOURCE (1 references)
pkts bytes target prot opt in out source destination
Chain FORWARD_OUT_ZONES (1 references)
pkts bytes target prot opt in out source destination
0 0 FWDO_public all -- * ens160 0.0.0.0/0 0.0.0.0/0 [goto]
0 0 FWDO_public all -- * + 0.0.0.0/0 0.0.0.0/0 [goto]
Chain FORWARD_OUT_ZONES_SOURCE (1 references)
pkts bytes target prot opt in out source destination
Chain FORWARD_direct (1 references)
pkts bytes target prot opt in out source destination
Chain FWDI_public (2 references)
pkts bytes target prot opt in out source destination
0 0 FWDI_public_log all -- * * 0.0.0.0/0 0.0.0.0/0
0 0 FWDI_public_deny all -- * * 0.0.0.0/0 0.0.0.0/0
0 0 FWDI_public_allow all -- * * 0.0.0.0/0 0.0.0.0/0
Chain FWDI_public_allow (1 references)
pkts bytes target prot opt in out source destination
Chain FWDI_public_deny (1 references)
pkts bytes target prot opt in out source destination
Chain FWDI_public_log (1 references)
pkts bytes target prot opt in out source destination
Chain FWDO_public (2 references)
pkts bytes target prot opt in out source destination
0 0 FWDO_public_log all -- * * 0.0.0.0/0 0.0.0.0/0
0 0 FWDO_public_deny all -- * * 0.0.0.0/0 0.0.0.0/0
0 0 FWDO_public_allow all -- * * 0.0.0.0/0 0.0.0.0/0
Chain FWDO_public_allow (1 references)
pkts bytes target prot opt in out source destination
Chain FWDO_public_deny (1 references)
pkts bytes target prot opt in out source destination
Chain FWDO_public_log (1 references)
pkts bytes target prot opt in out source destination
Chain INPUT_ZONES (1 references)
pkts bytes target prot opt in out source destination
8791 554K IN_public all -- ens160 * 0.0.0.0/0 0.0.0.0/0 [goto]
0 0 IN_public all -- + * 0.0.0.0/0 0.0.0.0/0 [goto]
Chain INPUT_ZONES_SOURCE (1 references)
pkts bytes target prot opt in out source destination
Chain INPUT_direct (1 references)
pkts bytes target prot opt in out source destination
Chain IN_public (2 references)
pkts bytes target prot opt in out source destination
8791 554K IN_public_log all -- * * 0.0.0.0/0 0.0.0.0/0
8791 554K IN_public_deny all -- * * 0.0.0.0/0 0.0.0.0/0
8791 554K IN_public_allow all -- * * 0.0.0.0/0 0.0.0.0/0
Chain IN_public_allow (1 references)
pkts bytes target prot opt in out source destination
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:21 ctstate NEW
230 13572 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:22 ctstate NEW
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:3306 ctstate NEW
25 1120 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:80 ctstate NEW
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:5025 ctstate NEW
6968 418K ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:5432 ctstate NEW
0 0 ACCEPT udp -- * * 0.0.0.0/0 0.0.0.0/0 udp dpt:80 ctstate NEW
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:3306 ctstate NEW
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:3001 ctstate NEW
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:3030 ctstate NEW
Chain IN_public_deny (1 references)
pkts bytes target prot opt in out source destination
Chain IN_public_log (1 references)
pkts bytes target prot opt in out source destination
Chain OUTPUT_direct (1 references)
pkts bytes target prot opt in out source destination
我需要在我的 VPS 中请求 mysqlserver.com : 3306
这是被防火墙阻止了吗?
我在 mysql 访问主机列表中使用 %
节点JS连接
var db_config = {
host: "mysqlserver.com",
port: 3306,
user: "user",
password: "pass",
database: "database",
};
我试图向另一台服务器请求,但我得到了“打开”
nmap -p 3306 myOtherHosting.com
PORT STATE SERVICE
3306/tcp open mysql
解决方案
推荐阅读
- angular-ng-if - *ngIf 在不影响子元素的情况下切换父 div
- c++ - 为具有两个参数(一个是非类型)的模板化类方法提供特化
- vim - Vim:如何从选定的列表中随机分配颜色方案?
- java - 使用另一个类从 Java 中的二维数组中打印出用户输入
- r - R:如何循环查询以避免服务器(BOLD)过载
- javascript - UnhandledPromiseRejectionWarning: TypeError: res.status is not a function (NEXT JS)
- wordpress - 尝试覆盖搜索查询没有任何效果
- php - 解析错误:语法错误,第 601 行 C:\xampp\php\pear\HTML\QuickForm.php 中的意外“新”(T_NEW)
- javascript - 通过单击按钮更改整个 CSS
- python - 查找最接近 0 的值的索引时出错