Want this feature implemented, too? Please upvote by clicking Thumbs up!
(Posts as a reply won't be published in this feature request thread. Read Me!)
User Story
PCI-compliant databases must enforce encrypted communications, which is implemented for GCP MySQL databases via client SSL certificates. This needs to be a supported authentication method for the MySQL sensor in PRTG so that it can interact with these databases.
Details of User Story
MySQL instances hosted in Google Cloud Platform can be set to permit only secure encrypted connections. Doing so is a requirement for PCI compliance. These connections are secured and authenticated using SSL certificates, but the only authentication method available for the MySQL sensor is username/password. As a result, this sensor can only be used to interact with insecure MySQL databases.
Authentication by client SSL certificate is standard functionality in the MySQL client (the --ssl-ca, --ssl-cert and --ssl-key parameters). More information is available via the following links: https://cloud.google.com/sql/docs/mysql/configure-ssl-instance#client-certs https://cloud.google.com/sql/docs/mysql/connect-admin-ip#connect-ssl
Acceptance criteria
- The MySQL sensor must support using a client SSL certificate to authenticate.
- The MySQL sensor must be able to connect to a Google Cloud Platform MySQL instance that requires client SSL authentication.
Status
Open