Connect to MariaDB
When prompted by the wizard, enter the appropriate connection details.
Where is the database located? If your source is an Amazon RDS for MariaDB instance, select that, otherwise leave set to the default.
Hostname: Enter the IP address or fully qualified network name of the instance (for example,
198.51.100.10
ormydb.123456789012.us-east-1.rds.amazonaws.com
) or, if you are connecting via an SSH tunnel, paste the string copied from Striim Cloud Console > Service details > Secure connection > Tunnel Address (see Configure Striim to use your SSH tunnel).Port: Enter the port for the specified host.
Username: Enter the name of the user you created when you Set up your MariaDB source.
Password: Enter the password associated with the specified user name.
Connect using SSL: Select if connecting to the source database using SSL. See the detailed instructions below.
Source connection name: Enter a descriptive name, such as
MariaDBConnection1
.
Acquire a certificate in .pem format as described in MariaDB > Enterprise Documentation > Security > Data in-transit encryption > Enabling TLS on MariaDB Server
Import the certificate into a custom Java truststore file:
keytool -importcert -alias MariaCACert -file <file name>.pem \ -keystore truststore.jks -storepass mypassword
Convert client keys/certificate files to PKCS#12:
openssl pkcs12 -export -in client-cert.pem -inkeyclient-key.pem \ -name “mysqlclient” -passoutpass:mypassword -out client-keystore.p12
Create a Java Keystore using the client-keystore.p12 file:
Create the truststore.jks file (replace
<file name>
with the name of the file you downloaded):keytool -importkeystore -srckeystore client-keystore.p12-srcstoretype pkcs12 \ -srcstorepass mypassword-destkeystore keystore.jks \ -deststoretype JKS-deststorepass mypassword
Set these properties in Striim:
Verify server certificate: Enable if you want Striim to verify all the following certificates while establishing the connection.
Trust certificate keystore URL: upload the truststore.jks file created in step 3
Trust certificate keystore type: enter the store type you specified in step 3
Trust certificate keystore password: enter the password you specified in step 3
Client certificate keystore URL: upload the keystore.jks file created in step 4
Client certificate keystore type: enter the store type you specified in step 4
Client certificate keystore password: enter the password you specified in step 4
Download the appropriate
.pem
file from AWS > Documentation > Amazon Relational Database Service (RDS) > User Guide > Using SSL/TLS to encrypt a connection to a DB instance.Create the truststore.jks file (replace
<file name>
with the name of the file you downloaded):keytool -importcert -alias MariaCACert -file server-ca.pem \ -keystore truststore.jks -storepass mypassword
Convert client keys/certificate files to PKCS#12:
openssl pkcs12 -export -in client-cert.pem -inkeyclient-key.pem \ -name “mysqlclient” -passoutpass:mypassword -out client-keystore.p12
Set these properties in Striim:
Verify server certificate: Enable if you want Striim to verify all the following certificates while establishing the connection.
Trust certificate keystore URL: upload the truststore.jks file created in step 3
Trust certificate keystore type: enter the store type you specified in step 3
Trust certificate keystore password: enter the password you specified in step 3