What is this?

This knowledgebase contains questions and answers about PRTG Network Monitor and network monitoring in general.

Learn more

PRTG Network Monitor

Intuitive to Use. Easy to manage.
More than 500,000 users rely on Paessler PRTG every day. Find out how you can reduce cost, increase QoS and ease planning, as well.

Free Download

Top Tags

View all Tags

MySQL sensor - SSL certificate authentication



Want this feature implemented, too? Please upvote by clicking Thumbs up!

(Posts as a reply won't be published in this feature request thread. Read Me!)

User Story

PCI-compliant databases must enforce encrypted communications, which is implemented for GCP MySQL databases via client SSL certificates. This needs to be a supported authentication method for the MySQL sensor in PRTG so that it can interact with these databases.

Details of User Story

MySQL instances hosted in Google Cloud Platform can be set to permit only secure encrypted connections. Doing so is a requirement for PCI compliance. These connections are secured and authenticated using SSL certificates, but the only authentication method available for the MySQL sensor is username/password. As a result, this sensor can only be used to interact with insecure MySQL databases.

Authentication by client SSL certificate is standard functionality in the MySQL client (the --ssl-ca, --ssl-cert and --ssl-key parameters). More information is available via the following links: https://cloud.google.com/sql/docs/mysql/configure-ssl-instance#client-certs https://cloud.google.com/sql/docs/mysql/connect-admin-ip#connect-ssl

Acceptance criteria

  • The MySQL sensor must support using a client SSL certificate to authenticate.
  • The MySQL sensor must be able to connect to a Google Cloud Platform MySQL instance that requires client SSL authentication.



improve-prtg mysql-v2-sensor prtg-kbtracker ssl

Created on Feb 26, 2019 10:45:18 AM


Nobody has replied yet

Disclaimer: The information in the Paessler Knowledge Base comes without warranty of any kind. Use at your own risk. Before applying any instructions please exercise proper system administrator housekeeping. You must make sure that a proper backup of all your data is available.