About Network Access to MySQL Cloud Service

By default, network access to the compute nodes associated with MySQL Cloud Service is provided by Secure Shell (SSH) connections on port 22. To access other network protocols and services requires additional configuration.

SSH Access on Port 22

SSH is a cryptographic network protocol that uses two keys, one public and one private, to provide secure communication between two networked computers. Port 22 is the standard TCP/IP port that is assigned to SSH servers.

Note:

Only the opc user can connect to MySQL Cloud Service over SSH. For more information on the opc user, see Linux User Accounts.

When a database deployment is being created, the public key is specified on the Details page of the Create MySQL Cloud Service wizard by:

  • Uploading the public key file.

    When the public key file is uploaded during the database deployment creation process, the key is added to the Oracle Compute Cloud Service environment that supports MySQL Cloud Service and given a unique name.

  • Entering the full hierarchical name of an existing public key using the format /domain/user/keyname.

    An existing public key is one that has already been added to the Oracle Compute Cloud Service environment that supports MySQL Cloud Service, either as the result of an earlier database deployment creation process or by manual addition to Oracle Compute Cloud Service. To discover the full hierarchical name of a key, view the list of keys on the Oracle Compute Cloud Service SSH Public Keys page and hover over the short name of the key. For more information, see Viewing an SSH Public Key in Using Oracle Compute Cloud Service.

    For information on manually adding a public key to Oracle Compute Cloud Service, see Adding an SSH Public Key in Using Oracle Compute Cloud Service.

When you access a compute node using SSH, you must provide the private key that matches the public key specified when the database deployment was created.

To generate the SSH public/private key pairs needed to access MySQL Cloud Service, see Generating a Secure Shell (SSH) Public/Private Key Pair.

Access to Other Ports

Not Oracle Cloud Infrastructure This topic does not apply to Oracle Cloud Infrastructure.

To access network protocols and services on a compute node by using a port other than port 22, you must either:

  • Enable network access to the port

    You can use the MySQL Cloud Service console to enable access to a port on a compute node. For more information, see Enabling Access to a Compute Node Port

  • Create an SSH tunnel to the port

    Creating an SSH tunnel enables you to access a specific compute node port by using an SSH connection as the transport mechanism. To create the tunnel, you must have the SSH private key file that matches the public key specified during the database deployment creation process. For more information, see Creating an SSH Tunnel to a Compute Node Port.