'RDS MySQL Connection via external SSH tunnel
I have a MySQL database running in AWS and I would like to set up a SSH tunnel into it. I cannot use AWS EC2 instance as a remote host due to internal work constrains and can only use a jumpbox hosted outside of this RDS's VPC.
- Is it an acceptable practice?
- Is the connection's IP address going to be defined by the jumpbox? So it's IP address can be whitelisted in AWS Security Groups.
Solution 1:[1]
Is it an acceptable practice?
Usually you would use ssh tunnels to connect to a private subnet. But having public RDS with strictly limited allowed IP addresses is also good.
Is the connection's IP address going to be defined by the jumpbox? So it's IP address can be whitelisted in AWS Security Groups.
Yes. But if the IP address is not static, anytime it changes you will have to update the SGs.
Sources
This article follows the attribution requirements of Stack Overflow and is licensed under CC BY-SA 3.0.
Source: Stack Overflow
| Solution | Source |
|---|---|
| Solution 1 | Marcin |
