Client Configuration for Secure Client Connections
Warning
SingleStore 9.0 gives you the opportunity to preview, evaluate, and provide feedback on new and upcoming features prior to their general availability. In the interim, SingleStore 8.9 is recommended for production workloads, which can later be upgraded to SingleStore 9.0.
Note
As of SingleStore 8.
To ensure secure connections, clients must be properly configured to require a secure connection and verify the appropriate server certificate.
The instructions below describe how to configure the MySQL command-line client to connect to SingleStore with a secure connection.
Copy ca-cert.
to your client machine.ca-cert.
with the --ssl-ca
option.--ssl-ca=path/ca-cert.
, or by setting the appropriate option in the configuration files for the MySQL command-line client.--ssl-mode=REQUIRED
option to require a secure connection (this is necessary in older versions of the MySQL client, even when --ssl-ca
is specified).
You can use the status
command to print connection details.
mysql -uroot -h1.2.3.4 --ssl-ca=ca-cert.pem -e 'status'
--------------
mysql Ver 14.14 Distrib 5.6.19, for osx10.9 (x86_64) using EditLine wrapper
Connection id: 13
Current database:
Current user: root@4.5.6.7
SSL: Cipher in use is AES256-SHA
Current pager: stdout
Using outfile: ''
Using delimiter: ;
Server version: 5.5.8 MemSQL source distribution (compatible; MySQL Enterprise & MySQL Commercial)
Protocol version: 10
Connection: 1.2.3.4 via TCP/IP
Server characterset: utf8
Db characterset: utf8
Client characterset: utf8
Conn. characterset: utf8
TCP port: 3306
--------------
Last modified: May 9, 2023