Location Connection for MariaDB - DSS 6 | Data Source Solutions Documentation

Documentation: Location Connection for MariaDB - DSS 6 | Data Source Solutions Documentation

Location Connection for MariaDB

This section describes the connection details required for creating MariaDB location in Data Source Solutions DSS. For information about the pre-requisites, access privileges, and other configuration requirements for creating MariaDB location, see MariaDB Requirements.

DSS uses MariaDB's native Connector/C interface to connect, read, and write data to MariaDB. DSS connects to the MariaDB server using the TCP protocol.

If the managed secrets feature is enabled, option USE TOKEN INSTEAD is displayed in the fields designated for entering secrets.

Field Description Equivalent Location Property
HOST

Hostname or IP-address of the server on which the MariaDB database is running.

Example: 192.168.127.129
Database_Host
PORT

Port number on which the MariaDB server is expecting connections.

Example: 3306
Database_Port
DATABASE

Name of the MariaDB database.

Example: mytestdb
Database_Name
USER

Username for connecting DSS to the MariaDB database.

Example: dssuser
Database_User
PASSWORD Password for the USER. Database_Password
Use SSL
Since v6.1.5/3
Enable/disable (one way) SSL. If enabled, DSS authenticates the MariaDB connection by validating the SSL certificate shared by the MariaDB database server. MySQL_Use_SSL
MINIMUM TLS VERSION
Since v6.1.5/3

Minimum TLS protocol version that the client allows for establishing a secure (TLS) connection.

Available options are:

  • TLS v1
  • TLS v1.1
  • TLS v1.2
  • TLS v1.3
MySQL_SSL_Min_TLS_Version
CA CERTIFICATE FILE
Since v6.1.5/3
Absolute path of the Certificate Authority (CA) certificate file. The value in this field must point to the same certificate used by the server. If a value is specified in this field, the server's Common Name (CN) in its certificate is verified against the hostname used for the connection. If there is a mismatch between the CN and the hostname, the connection will be rejected. MySQL_CA_Certificate_File
CLIENT CERTIFICATE
Since v6.1.5/3
Absolute path of the client public key certificate file. MySQL_Client_Pub_Cert_File
CLIENT PRIVATE KEY
Since v6.1.5/3
The path name of the client private key file. MySQL_Client_Priv_Key_File
CRL FILE
Since v6.1.5/3
Absolute path to a file containing one or more revoked X.509 certificates to use for TLS. An absolute path must be provided; relative paths are not supported. MySQL_SSL_CRL_File
CIPHER
Since v6.1.5/3
Specify the encryption algorithms (ciphers) permitted for establishing a secure connection between DSS and the database server. If this field is left empty, a default set of ciphers will be used. To specify multiple ciphers, list them as comma-separated values.
For the connection to succeed, both DSS and the database server must support at least one common cipher from the specified list. The SSL/TLS library will then select the highest-priority cipher compatible with the provided certificate.
MySQL_SSL_Cipher
SERVER PUBLIC KEY
Since v6.1.5/3
Absolute path to a .pem file containing the client-side copy of the public key required by the server for RSA key pair-based password exchange.
This is relevant only for clients using the sha256_password authentication plugin. It is ignored for accounts using other authentication plugins or when RSA-based password exchange is not in use, such as when the client connects to the server via a secure connection.
MySQL_Server_Pub_Key_File

Staging

DSS supports staging for MariaDB location. For information about the location properties for staging, see Staging for MariaDB.