azure-templatesmariadb

Connect to MySQL/MariaDB from a different machine or network

IMPORTANT: By default, the database port for the nodes in this solution cannot be accessed over a public IP address. As a result, you will only be able to connect to your database nodes from machines that are running in the same network. For security reasons, we do not recommend making the database port accessible over a public IP address. If you must make it accessible over a public IP address, we recommend restricting access to a trusted list of source IP addresses using firewall rules. Refer to the FAQ for information on opening ports in the server firewall.

Connect from the same network

To connect to the database server from a different machine in the same network, use a command like the one below:

$ mysql -h SERVER-IP -u root -p

You will be prompted to enter the root user password. This is the same password entered during the server deployment process.

If you wish to connect to the primary database host from a different network using its public IP address, we recommend creating an SSH tunnel, as described in the FAQ. However, you should only do this if you wish to temporarily connect to, or use, the CLI. This approach is not recommended to permanently connect your application to the database cluster, as a connectivity failure in the SSH tunnel would affect your application’s functionality.

Connect from a different network

If you must connect to the database from a machine that it is not running in the same network as the MariaDB cluster, you can follow these approaches (these are shown in order of preference, from the most secure to the least recommended solution):

  • Option 1: Peer both virtual networks to secure the connections between the two instances. Learn how to connect instances in different networks using network peering.
  • Option 2: Create an SSH tunnel to connect the database console to perform administrative tasks using the primary host’s public IP address. Refer to the FAQ for more information on this.

    NOTE: You should only access the primary server using an SSH tunnel if you wish to temporarily connect to, or use, the MariaDB console. This approach is not recommended to permanently connect your application to the MariaDB cluster, as a connectivity failure in the SSH tunnel would affect your application’s functionality.

  • Option 3: Make the server publicly accessible and restrict access to a trusted list of source IP addresses using firewall rules. Refer to the FAQ for information on opening ports in the server firewall.

Last modification October 1, 2018