Register a MySQL Connection
Requirements
Amazon RDS or Amazon Aurora for MySQL
Permissions
The user registering the connection must have the permissions below.
APPLICATION_ADMINImmuta permissionThe MySQL user registering the connection must be the root user or have the
GRANT OPTIONMySQL privilege.
Create a database user account
Create a new database user in MySQL to serve as the Immuta system account. Immuta will use this system account continuously to crawl the database you register. How you create this user depends on your database authentication method. Follow the instructions linked below to create this user:
Password authentication: Follow the MySQL documentation to create the database user in and assign that user a password.
Grant this account the following MySQL privileges. A sample command that provides all these privileges to all databases and views is provided below:
SHOW DATABASESon all databases in the serverSELECTon all databases, tables, and views in the serverSHOW VIEWon all views in the server
GRANT SELECT, SHOW DATABASES, SHOW VIEW ON *.* TO '<user>'@'%';
Register a MySQL connection
In Immuta, click Data and select Connections in the navigation menu.
Click the + Add Connection button.
Select the MySQL tile.
Select your deployment type:
Aurora
RDS
Enter the host connection information:
Display Name: This is the name of your new connection. This name will be used in the API (
connectionKey), in data source names from the host, and on the connections page.Hostname: The URL of your MySQL instance.
Port: The port configured for MySQL.
Region: The region of the AWS account with your MySQL instance.
Select an authentication method from the dropdown menu.
AWS Access Key: Provide the access key ID and secret access key for the database user account you created above.
AWS Assumed Role (recommended): Immuta will assume this IAM role from Immuta's AWS account to request temporary credentials that it can use to perform operations in the registered MySQL database. Before proceeding, contact your Immuta representative and provide your service principal's IAM role. Immuta will allowlist the service principal so that Immuta can successfully assume that role. Your Immuta representative will provide the account to add to your trust relationship. Then, complete the steps below.
Enter the Username of the database user account you created above
Enter the Role ARN of the database user account you created above.
Set the External ID provided in a condition on the trust relationship for the role specified above. See the AWS documentation for guidance.
Username and Password: Enter the credentials for the MySQL database user account you created above.
Click Save connection.
Last updated
Was this helpful?

