For how to configure SSL please see official document: Configure MySQL encrypted connectionsĬlick Create Datasource to complete adding the data source.Īppendix: Generates SSH Tunnel Key Files .Options for different types of data sources are different, please refer to the console.If SSL encrypted connection is forced by data sources, this switch must be turned on, otherwise the connection failed.Ĭlick on the right switch to turn on or off encrypted transfer.Click > on the left side of Encryption to show detailed configuration. Whether to access data sources using SSL encryption. Select the region/location closer to data source for better network performance. Prompt error message: Indicates that the connection fails, please check the account and password.Prompt Connection Succeeded: Indicates that the data source connection is successful.The password corresponding to the user name used to log in to the data source. Note: Since it is a connection to the server of data source is located via SSH Tunnel, user can directly enter localhost or 127.0.0.1, and fill in the port number of the target data source. Prompt error message: indicates that the connection failed, please troubleshoot the cause of the failure according to the prompt and try again.Ĭonnection address and port for data source.please see Appendix, for instruction to generate the key.ĭisplayed when SSH Authentication Method is Key, enter the password set when generating the key file.If you did not set a passphrase in step 1 of key generation, leave it blank here. Prompt error message: indicates that the connection fails, please check the userid and password.ĭisplayed when SSH Authentication Method is Key, click Upload Upload the private key file, that is, the key file without the suffix.Prompt Connection Succeeded: indicates SSH Tunnel is open. Note: Click Connection Test on the right, and the following two results may appear: Only displayed when SSH Authentication Method is Password, enter the login password of the server where the target data source is located. For how to generate, see Appendix.Įnter the login username of the server where the target data source is located. This option requires generated key files.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |