Version: 1.0.0
Category: Database
Tier: 2
Type: Source, Target
Authentication:
Standard Authentication:
Host
Port
Username
Database name
Password
IAM Authentication
Host
Port
Username
Access Key
Secret Key
Region
Supported Save Mode as Target:
Append
Overwrite
See: Target Connector Save Modes
Connection Properties:
Name | Mandatory | Description |
---|---|---|
Connection Name | Yes | Name of the connection |
Description | No | Description of the connection |
Host Name | Yes | Host or “Endpoint“ |
Port | Yes | Port number |
Database | Yes | Name of the database for the connection |
Username | Yes | Username of the database |
Authentication | Yes | Type of authentication:
|
Password | Yes | Password of the database |
STANDARD AUTHENTICATION:
Log in to your AWS account console.
On the search bar type RDS and select the RDS service
Once you are in the RDS service page, Click on Databases tab on the side bar to see all your databases.
Select your RDS MySQL database.
To Connect your Database to EazyDi app using the STANDARD authentication, you will need:
Host
Port
Username
Database name
Password
Once you have clicked your RDS MySQL database, You will see the “ENDPOINT” which will be your HOST. And the PORT number
To Get your USERNAME and DATABASE NAME, go to the “CONFIGURATION” Tab and there you will see your DBNAME and MASTER USERNAME which you will use as your USERNAME and DATABASE NAME
Once you have all your credentials, you can now connect your database to EazyDi app. Create a connection. Select the AWS RDS MySQL connector
Input all the required connection properties that you got from Step 6 and 7. The Host, Port, DBNAME, Master Username. The password is the one you set when creating your database.
Reading Objects:
Once you have created a connection, you can now select a table from the list of connection objects
IAM AUTHENTICATION:
First, make sure that your database allows IAM Authentication. Do Pre requisites steps 1 through 3 then Navigate to Configuration Tab. Confirm that IAM DB authentication is Enabled
To allow an IAM user or role to connect to your database instance or database cluster, you must create an IAM policy. After that, attach the policy to an IAM user or role. For more information, see Create and Attach Your First Customer Managed Policy.
You construct the policy document from the following four key pieces of data:
The Region of your cluster
Your AWS account number
The database resource ID or the cluster resource ID
Your database user name
For RDS and AURORA:
After you have your IAM user created and your IAM policy attached to the user, you must create a database user with the same name as you specified in the policy. In this policy It’s all dbusers. Grant all privileges to the user you created using these statements
CREATE USER mydbuser IDENTIFIED WITH AWSAuthenticationPlugin AS 'RDS';
GRANT ALL ON`%`.*
TO mydbuser@`%`;
Go back to dashboard and search for AWS RDS MySQL and click connect
Click add new connection
Choose Authentication as IAM authentication and fill in the required fields. The username used should be the created in step 3, add the access key and secret key of the IAM user that has the policy created in step 2, then click create connection
Verify that credentials and setup are correct by checking if connection object lists will show similar to standard authentication