Back to Guides

How to Connect MySQL to MCP for AI Agents

Connect MySQL databases directly to AI agents via MCP. Query tables and run reports through natural language with AnythingMCP's read-only database connector.

MySQL: Direct Database Access for AI

MySQL is one of the most popular relational databases worldwide. With AnythingMCP's database connector, you can expose your MySQL data directly as MCP tools — letting AI agents interact with your data using natural language.

Important: Read-Only Access

AnythingMCP's database connector is read-only by design. It supports only SELECT queries, with a maximum of 1000 rows per query. This ensures AI agents cannot accidentally modify or delete data.

Auto-Generated Tools

When you create a MySQL database connector, AnythingMCP automatically generates three tools:

| Tool | Description | |---|---| | get_database_schema | Returns all tables, columns, and types | | get_example_queries | Suggests useful queries based on the schema | | execute_query | Executes a read-only SELECT query (max 1000 rows) |

Step-by-Step Guide

Step 1: Deploy AnythingMCP

git clone https://github.com/HelpCode-ai/anythingmcp.git
cd anythingmcp && docker compose up -d

Step 2: Create a Database Connector

Open the AnythingMCP dashboard at http://localhost:3000 and create a new Database connector. Select MySQL as the database type.

Step 3: Configure Connection

Enter your MySQL host, port, database name, username, and password. Always use SSL for production connections.

Step 4: Test the Connection

Use the dashboard to verify the connection and review the auto-discovered schema. The AI agent will use get_database_schema to understand your data structure.

Step 5: Connect to AI Agents

{
  "mcpServers": {
    "mysql": {
      "url": "http://localhost:4000/mcp"
    }
  }
}

AI Agent Use Cases

  • "Show me all customers from the last month"
  • "What are the top selling products this quarter?"
  • "Search for orders by customer email"
  • "List all pending invoices"
  • "How many active subscriptions do we have?"

Security Best Practices

  1. Dedicated DB user — Create a MySQL user with SELECT-only permissions
  2. SSL connections — Always use require_secure_transport=ON for production
  3. Restrict databases — Only expose databases that are safe for AI access
  4. Connection limits — Set MAX_USER_CONNECTIONS on the MySQL user
  5. Network restrictions — Limit MySQL access to the AnythingMCP server IP

Next Steps