{"id":240396,"date":"2022-01-07T14:39:00","date_gmt":"2022-01-07T21:39:00","guid":{"rendered":"https:\/\/virtual-dba.com\/?p=240396"},"modified":"2022-01-07T15:05:56","modified_gmt":"2022-01-07T22:05:56","slug":"encrypted-replication-for-mysql","status":"publish","type":"post","link":"https:\/\/virtual-dba.com\/blog\/encrypted-replication-for-mysql\/","title":{"rendered":"Encrypted Replication for MySQL"},"content":{"rendered":"\n<p>Encrypted connections for MySQL replication are the default as of 8.0. The following simple example shows a basic setup for encrypted replication using Ubuntu 20.04 and MySQL Community 8.0.27. The steps may be similar for other Linux distributions.<\/p>\n\n\n\n<p>The necessary files for this example come installed with this version of MySQL and are found in the data directory (Figure 1). They are five different .pem files and two belong on the source server, two will be copied over to the replica server, and one will exist on both the source and replication servers (Table 1).<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"675\" height=\"147\" src=\"https:\/\/virtual-dba.com\/wp-content\/uploads\/VDBA_Encrypted_Replication_1.png\" alt=\"VDBA Encrypted Replication 1\" class=\"wp-image-240398\" srcset=\"https:\/\/virtual-dba.com\/wp-content\/uploads\/VDBA_Encrypted_Replication_1.png 675w, https:\/\/virtual-dba.com\/wp-content\/uploads\/VDBA_Encrypted_Replication_1-480x105.png 480w\" sizes=\"(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) 675px, 100vw\" \/><figcaption><em>Figure 1: Source data directory contents. Note the .pem files that are automatically included with a fresh install of MySQL.<\/em><\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td><strong>File<\/strong><\/td><td><strong>Original Location<\/strong><\/td><td><strong>Needed on Source<\/strong><\/td><td><strong>Needed on Replica<\/strong><\/td><td><strong>Permissions<\/strong><\/td><\/tr><tr><td><strong>ca.pem<\/strong><\/td><td>Source \u2013 data dir<\/td><td>Yes<\/td><td>Yes<\/td><td>-rw-r&#8211;r&#8211;<\/td><\/tr><tr><td><strong>client-cert.pem<\/strong><\/td><td>Source \u2013 data dir<\/td><td>No<\/td><td>Yes<\/td><td>-rw-r&#8211;r&#8211;<\/td><\/tr><tr><td><strong>client-key.pem<\/strong><\/td><td>Source \u2013 data dir<\/td><td>No<\/td><td>Yes<\/td><td>-rw&#8212;&#8212;-<\/td><\/tr><tr><td><strong>server-cert.pem<\/strong><\/td><td>Source \u2013 data dir<\/td><td>yes<\/td><td>No<\/td><td>-rw-r&#8211;r&#8211;<\/td><\/tr><tr><td><strong>server-key.pem<\/strong><\/td><td>Source data dir<\/td><td>yes<\/td><td>No<\/td><td>-rw&#8212;&#8212;-<\/td><\/tr><\/tbody><\/table><figcaption>Table 1: List of necessary .pem files with the permissions<\/figcaption><\/figure>\n\n\n\n<p>Once the necessary files have been located in the default data directory, the directory can be noted and client files can be copied to the replication server.<\/p>\n\n\n\n<p>For this example, a separate directory was created on the source and replication servers to better organize the .pem files, but this is not necessary. On the source this directory is called &#8220;\/var\/lib\/mysql\/repl_security&#8221; (Figure 2). For the replication .pem files the directory is called &#8220;\/var\/lib\/mysql\/repl_sec&#8221; (Figure 3).<\/p>\n\n\n\n<p>Now the files can be distributed appropriately.<\/p>\n\n\n\n<p>For the source the files ca.pem, server-cert.pem, and server-key.pem are moved locally into the repl_security directory (Figure 2).<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"531\" height=\"145\" src=\"https:\/\/virtual-dba.com\/wp-content\/uploads\/VDBA_Encrypted_Replication_2.png\" alt=\"VDBA Encrypted Replication 2\" class=\"wp-image-240399\" srcset=\"https:\/\/virtual-dba.com\/wp-content\/uploads\/VDBA_Encrypted_Replication_2.png 531w, https:\/\/virtual-dba.com\/wp-content\/uploads\/VDBA_Encrypted_Replication_2-480x131.png 480w\" sizes=\"(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) 531px, 100vw\" \/><figcaption><em>Figure 2: The directory (on source) for ssl server files necessary for replication. Check file permissions to ensure they can be used by MySQL.<\/em><\/figcaption><\/figure>\n\n\n\n<p>Any files that are needed on the replication server must be sent over from the source to the replication server. The necessary files (shown in Table 1) are: ca.pem, client-cert.pem, and client-key.pem. In this case the linux command &#8220;scp&#8221; was used to move the client .pem files to the replication server. Once on the server the files were moved to the repl_sec directory. After that the file owner and permissions were changed (via chown, chgrp, and chmod) to those shown in Figure 3.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"532\" height=\"147\" src=\"https:\/\/virtual-dba.com\/wp-content\/uploads\/VDBA_Encrypted_Replication_3.png\" alt=\"VDBA Encrypted Replication 3\" class=\"wp-image-240400\" srcset=\"https:\/\/virtual-dba.com\/wp-content\/uploads\/VDBA_Encrypted_Replication_3.png 532w, https:\/\/virtual-dba.com\/wp-content\/uploads\/VDBA_Encrypted_Replication_3-480x133.png 480w\" sizes=\"(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) 532px, 100vw\" \/><figcaption><em>Figure 3: The replica files with their permissions in the directory found in the configuration file. Be sure the permissions match what is shown here.<\/em><\/figcaption><\/figure>\n\n\n\n<p>After all the files are in the desired directories it is time to set up the configuration files.<\/p>\n\n\n\n<p>Source:<\/p>\n\n\n\n<p>Figure 4 shows the default directory containing the configuration file to be edited, and Figure 5 shows the changes to be made. It is important to note that the .pem file directories be located under the [mysqld] section (as seen in Figure 5).<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"218\" height=\"99\" src=\"https:\/\/virtual-dba.com\/wp-content\/uploads\/VDBA_Encrypted_Replication_4.png\" alt=\"VDBA Encrypted Replication 4\" class=\"wp-image-240401\"\/><figcaption><em>Figure 4: Directory containing configuration file on source<\/em><\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"481\" height=\"281\" src=\"https:\/\/virtual-dba.com\/wp-content\/uploads\/VDBA_Encrypted_Replication_5.png\" alt=\"VDBA Encrypted Replication 5\" class=\"wp-image-240402\" srcset=\"https:\/\/virtual-dba.com\/wp-content\/uploads\/VDBA_Encrypted_Replication_5.png 481w, https:\/\/virtual-dba.com\/wp-content\/uploads\/VDBA_Encrypted_Replication_5-300x175.png 300w\" sizes=\"(max-width: 481px) 100vw, 481px\" \/><figcaption><em>Figure 5: Source configuration file. The options beginning with &#8220;ssl&#8221; pertain to the secure connection.<\/em><\/figcaption><\/figure>\n\n\n\n<p>Replica:<\/p>\n\n\n\n<p>Figure 6 shows the default directory containing the configuration file to be edited, and Figure 7 shows the changes to be made. It is important to note that the .pem file directories be located under the [client] section (as seen in Figure 7).<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"218\" height=\"91\" src=\"https:\/\/virtual-dba.com\/wp-content\/uploads\/VDBA_Encrypted_Replication_6.png\" alt=\"VDBA Encrypted Replication 6\" class=\"wp-image-240403\"\/><figcaption><em>Figure 6: The replica configuration file location.<\/em><\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"455\" height=\"316\" src=\"https:\/\/virtual-dba.com\/wp-content\/uploads\/VDBA_Encrypted_Replication_7.png\" alt=\"VDBA Encrypted Replication 7\" class=\"wp-image-240404\" srcset=\"https:\/\/virtual-dba.com\/wp-content\/uploads\/VDBA_Encrypted_Replication_7.png 455w, https:\/\/virtual-dba.com\/wp-content\/uploads\/VDBA_Encrypted_Replication_7-300x208.png 300w\" sizes=\"(max-width: 455px) 100vw, 455px\" \/><figcaption><em>Figure 7: The replica configuration file. The necessary ssl files are under [client] and begin with &#8220;ssl.&#8221;<\/em><\/figcaption><\/figure>\n\n\n\n<p>After both configuration files are set be sure to restart the MySQL instance on both servers.&nbsp;<\/p>\n\n\n\n<p>Now the encrypted replication connection is setup and ready to use.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-summary\">Summary<\/h2>\n\n\n\n<p>A quick reference to the steps involved in the process of setting up encrypted replication for MySQL using the automatically created .pem files:<\/p>\n\n\n\n<ol class=\"wp-block-list\"><li>Locate necessary .pem files<\/li><li>Distribute client files to replication server<\/li><li>Ensure correct permissions and owners on all .pem files<\/li><li>Edit configuration files for source and replica to point ssl options at appropriate directories<\/li><li>Restart source and replication MySQL instances.<\/li><\/ol>\n","protected":false},"excerpt":{"rendered":"<p>Encrypted connections for MySQL replication are the default as of 8.0. The following simple example shows a basic setup for encrypted replication using Ubuntu 20.04 and MySQL Community 8.0.27. The steps may be similar for other Linux distributions. The necessary files for this example come installed with this version of MySQL and are found in [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":240410,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","content-type":"","footnotes":""},"categories":[4166,39],"tags":[40,4144,3962],"class_list":["post-240396","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","category-mysql","tag-mysql","tag-mysql-replication","tag-ubuntu"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.1 (Yoast SEO v27.1.1) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Encrypted Replication for MySQL<\/title>\n<meta name=\"description\" content=\"Basic single-source single-replica encrypted connection setup using default files included in MySQL Community installation.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/virtual-dba.com\/blog\/encrypted-replication-for-mysql\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Encrypted Replication for MySQL\" \/>\n<meta property=\"og:description\" content=\"Basic single-source single-replica encrypted connection setup using default files included in MySQL Community installation.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/virtual-dba.com\/blog\/encrypted-replication-for-mysql\/\" \/>\n<meta property=\"og:site_name\" content=\"Virtual-DBA Remote DBA Services &amp; Support - Certified Database Experts\" \/>\n<meta property=\"article:published_time\" content=\"2022-01-07T21:39:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-01-07T22:05:56+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/virtual-dba.com\/media\/Encrypted-Replication-for-MySQL.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"557\" \/>\n\t<meta property=\"og:image:height\" content=\"291\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"XTIVIA\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@virtual_dba\" \/>\n<meta name=\"twitter:site\" content=\"@virtual_dba\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"XTIVIA\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/virtual-dba.com\/blog\/encrypted-replication-for-mysql\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/virtual-dba.com\/blog\/encrypted-replication-for-mysql\/\"},\"author\":{\"name\":\"XTIVIA\",\"@id\":\"https:\/\/virtual-dba.com\/#\/schema\/person\/2d86f74bed0c3f1b49100f7fdf7d78d1\"},\"headline\":\"Encrypted Replication for MySQL\",\"datePublished\":\"2022-01-07T21:39:00+00:00\",\"dateModified\":\"2022-01-07T22:05:56+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/virtual-dba.com\/blog\/encrypted-replication-for-mysql\/\"},\"wordCount\":646,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/virtual-dba.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/virtual-dba.com\/blog\/encrypted-replication-for-mysql\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/virtual-dba.com\/wp-content\/uploads\/Encrypted-Replication-for-MySQL.jpg\",\"keywords\":[\"mysql\",\"mysql replication\",\"Ubuntu\"],\"articleSection\":[\"Blog\",\"MySQL\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/virtual-dba.com\/blog\/encrypted-replication-for-mysql\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/virtual-dba.com\/blog\/encrypted-replication-for-mysql\/\",\"url\":\"https:\/\/virtual-dba.com\/blog\/encrypted-replication-for-mysql\/\",\"name\":\"Encrypted Replication for MySQL\",\"isPartOf\":{\"@id\":\"https:\/\/virtual-dba.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/virtual-dba.com\/blog\/encrypted-replication-for-mysql\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/virtual-dba.com\/blog\/encrypted-replication-for-mysql\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/virtual-dba.com\/wp-content\/uploads\/Encrypted-Replication-for-MySQL.jpg\",\"datePublished\":\"2022-01-07T21:39:00+00:00\",\"dateModified\":\"2022-01-07T22:05:56+00:00\",\"description\":\"Basic single-source single-replica encrypted connection setup using default files included in MySQL Community installation.\",\"breadcrumb\":{\"@id\":\"https:\/\/virtual-dba.com\/blog\/encrypted-replication-for-mysql\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/virtual-dba.com\/blog\/encrypted-replication-for-mysql\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/virtual-dba.com\/blog\/encrypted-replication-for-mysql\/#primaryimage\",\"url\":\"https:\/\/virtual-dba.com\/wp-content\/uploads\/Encrypted-Replication-for-MySQL.jpg\",\"contentUrl\":\"https:\/\/virtual-dba.com\/wp-content\/uploads\/Encrypted-Replication-for-MySQL.jpg\",\"width\":557,\"height\":291,\"caption\":\"Encrypted Replication for MySQL\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/virtual-dba.com\/blog\/encrypted-replication-for-mysql\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/virtual-dba.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Encrypted Replication for MySQL\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/virtual-dba.com\/#website\",\"url\":\"https:\/\/virtual-dba.com\/\",\"name\":\"Virtual-DBA Remote DBA Services &amp; Support - Certified Database Experts\",\"description\":\"Remote Database Administration\",\"publisher\":{\"@id\":\"https:\/\/virtual-dba.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/virtual-dba.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/virtual-dba.com\/#organization\",\"name\":\"Virtual-DBA: Remote DBA | Remote Database Administration\",\"alternateName\":\"Virtual-DBA powered by XTIVIA\",\"url\":\"https:\/\/virtual-dba.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/virtual-dba.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/virtual-dba.com\/wp-content\/uploads\/V-DBA-Database-Services-and-Support-Featured-Logo.jpg\",\"contentUrl\":\"https:\/\/virtual-dba.com\/wp-content\/uploads\/V-DBA-Database-Services-and-Support-Featured-Logo.jpg\",\"width\":557,\"height\":291,\"caption\":\"Virtual-DBA: Remote DBA | Remote Database Administration\"},\"image\":{\"@id\":\"https:\/\/virtual-dba.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/virtual_dba\",\"https:\/\/www.linkedin.com\/showcase\/36220649\/\",\"https:\/\/www.youtube.com\/channel\/UCx3AIeUQ2ziTLKZSJDZ-SEg\"],\"description\":\"Eliminate database downtime and spiraling costs with XTIVIA\u2019s Virtual-DBA. In today\u2019s always-on business world, gaps in 24x7 on-call DBA support, neglected maintenance and security, or a stretched team struggling with overwhelming workloads can lead to costly disruptions and threaten business continuity. XTIVIA\u2019s Virtual-DBA provides the immediate, expert database administration you need, exactly when you need it, ensuring optimal performance, ironclad security, and significant cost savings without the burden of expanding your in-house team. The goal of Virtual-DBA is to provide a cost-effective solution for organizations seeking to optimize the security, management, maintenance, availability, and performance of their critical business systems, whether self-managed or cloud-managed (e.g., AWS RDS, Azure SQL Database). We accomplish this through a comprehensive remote DBA service offering designed specifically to meet the Oracle\u00ae, DB2\u00ae, Informix\u00ae, MySQL\u2122, PostgreSQL\u00ae, MongoDB\u00ae, MariaDB, and Microsoft SQL Server\u00ae, CockroachDB, Databricks, AWS, and Azure needs of our clients.\",\"email\":\"info@xtivia.com\",\"telephone\":\"8886853101\",\"legalName\":\"XTIVIA, Inc\",\"foundingDate\":\"1992-05-01\",\"numberOfEmployees\":{\"@type\":\"QuantitativeValue\",\"minValue\":\"201\",\"maxValue\":\"500\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/virtual-dba.com\/#\/schema\/person\/2d86f74bed0c3f1b49100f7fdf7d78d1\",\"name\":\"XTIVIA\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/virtual-dba.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/0d3648a00e319a37cf8d6d19f762acfbbb4fd0320fd8a6d6b1e64f44a2a6f259?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/0d3648a00e319a37cf8d6d19f762acfbbb4fd0320fd8a6d6b1e64f44a2a6f259?s=96&d=mm&r=g\",\"caption\":\"XTIVIA\"},\"url\":\"https:\/\/virtual-dba.com\/author\/xtivia\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Encrypted Replication for MySQL","description":"Basic single-source single-replica encrypted connection setup using default files included in MySQL Community installation.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/virtual-dba.com\/blog\/encrypted-replication-for-mysql\/","og_locale":"en_US","og_type":"article","og_title":"Encrypted Replication for MySQL","og_description":"Basic single-source single-replica encrypted connection setup using default files included in MySQL Community installation.","og_url":"https:\/\/virtual-dba.com\/blog\/encrypted-replication-for-mysql\/","og_site_name":"Virtual-DBA Remote DBA Services &amp; Support - Certified Database Experts","article_published_time":"2022-01-07T21:39:00+00:00","article_modified_time":"2022-01-07T22:05:56+00:00","og_image":[{"width":557,"height":291,"url":"https:\/\/virtual-dba.com\/media\/Encrypted-Replication-for-MySQL.jpg","type":"image\/jpeg"}],"author":"XTIVIA","twitter_card":"summary_large_image","twitter_creator":"@virtual_dba","twitter_site":"@virtual_dba","twitter_misc":{"Written by":"XTIVIA","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/virtual-dba.com\/blog\/encrypted-replication-for-mysql\/#article","isPartOf":{"@id":"https:\/\/virtual-dba.com\/blog\/encrypted-replication-for-mysql\/"},"author":{"name":"XTIVIA","@id":"https:\/\/virtual-dba.com\/#\/schema\/person\/2d86f74bed0c3f1b49100f7fdf7d78d1"},"headline":"Encrypted Replication for MySQL","datePublished":"2022-01-07T21:39:00+00:00","dateModified":"2022-01-07T22:05:56+00:00","mainEntityOfPage":{"@id":"https:\/\/virtual-dba.com\/blog\/encrypted-replication-for-mysql\/"},"wordCount":646,"commentCount":0,"publisher":{"@id":"https:\/\/virtual-dba.com\/#organization"},"image":{"@id":"https:\/\/virtual-dba.com\/blog\/encrypted-replication-for-mysql\/#primaryimage"},"thumbnailUrl":"https:\/\/virtual-dba.com\/wp-content\/uploads\/Encrypted-Replication-for-MySQL.jpg","keywords":["mysql","mysql replication","Ubuntu"],"articleSection":["Blog","MySQL"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/virtual-dba.com\/blog\/encrypted-replication-for-mysql\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/virtual-dba.com\/blog\/encrypted-replication-for-mysql\/","url":"https:\/\/virtual-dba.com\/blog\/encrypted-replication-for-mysql\/","name":"Encrypted Replication for MySQL","isPartOf":{"@id":"https:\/\/virtual-dba.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/virtual-dba.com\/blog\/encrypted-replication-for-mysql\/#primaryimage"},"image":{"@id":"https:\/\/virtual-dba.com\/blog\/encrypted-replication-for-mysql\/#primaryimage"},"thumbnailUrl":"https:\/\/virtual-dba.com\/wp-content\/uploads\/Encrypted-Replication-for-MySQL.jpg","datePublished":"2022-01-07T21:39:00+00:00","dateModified":"2022-01-07T22:05:56+00:00","description":"Basic single-source single-replica encrypted connection setup using default files included in MySQL Community installation.","breadcrumb":{"@id":"https:\/\/virtual-dba.com\/blog\/encrypted-replication-for-mysql\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/virtual-dba.com\/blog\/encrypted-replication-for-mysql\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/virtual-dba.com\/blog\/encrypted-replication-for-mysql\/#primaryimage","url":"https:\/\/virtual-dba.com\/wp-content\/uploads\/Encrypted-Replication-for-MySQL.jpg","contentUrl":"https:\/\/virtual-dba.com\/wp-content\/uploads\/Encrypted-Replication-for-MySQL.jpg","width":557,"height":291,"caption":"Encrypted Replication for MySQL"},{"@type":"BreadcrumbList","@id":"https:\/\/virtual-dba.com\/blog\/encrypted-replication-for-mysql\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/virtual-dba.com\/"},{"@type":"ListItem","position":2,"name":"Encrypted Replication for MySQL"}]},{"@type":"WebSite","@id":"https:\/\/virtual-dba.com\/#website","url":"https:\/\/virtual-dba.com\/","name":"Virtual-DBA Remote DBA Services &amp; Support - Certified Database Experts","description":"Remote Database Administration","publisher":{"@id":"https:\/\/virtual-dba.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/virtual-dba.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/virtual-dba.com\/#organization","name":"Virtual-DBA: Remote DBA | Remote Database Administration","alternateName":"Virtual-DBA powered by XTIVIA","url":"https:\/\/virtual-dba.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/virtual-dba.com\/#\/schema\/logo\/image\/","url":"https:\/\/virtual-dba.com\/wp-content\/uploads\/V-DBA-Database-Services-and-Support-Featured-Logo.jpg","contentUrl":"https:\/\/virtual-dba.com\/wp-content\/uploads\/V-DBA-Database-Services-and-Support-Featured-Logo.jpg","width":557,"height":291,"caption":"Virtual-DBA: Remote DBA | Remote Database Administration"},"image":{"@id":"https:\/\/virtual-dba.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/virtual_dba","https:\/\/www.linkedin.com\/showcase\/36220649\/","https:\/\/www.youtube.com\/channel\/UCx3AIeUQ2ziTLKZSJDZ-SEg"],"description":"Eliminate database downtime and spiraling costs with XTIVIA\u2019s Virtual-DBA. In today\u2019s always-on business world, gaps in 24x7 on-call DBA support, neglected maintenance and security, or a stretched team struggling with overwhelming workloads can lead to costly disruptions and threaten business continuity. XTIVIA\u2019s Virtual-DBA provides the immediate, expert database administration you need, exactly when you need it, ensuring optimal performance, ironclad security, and significant cost savings without the burden of expanding your in-house team. The goal of Virtual-DBA is to provide a cost-effective solution for organizations seeking to optimize the security, management, maintenance, availability, and performance of their critical business systems, whether self-managed or cloud-managed (e.g., AWS RDS, Azure SQL Database). We accomplish this through a comprehensive remote DBA service offering designed specifically to meet the Oracle\u00ae, DB2\u00ae, Informix\u00ae, MySQL\u2122, PostgreSQL\u00ae, MongoDB\u00ae, MariaDB, and Microsoft SQL Server\u00ae, CockroachDB, Databricks, AWS, and Azure needs of our clients.","email":"info@xtivia.com","telephone":"8886853101","legalName":"XTIVIA, Inc","foundingDate":"1992-05-01","numberOfEmployees":{"@type":"QuantitativeValue","minValue":"201","maxValue":"500"}},{"@type":"Person","@id":"https:\/\/virtual-dba.com\/#\/schema\/person\/2d86f74bed0c3f1b49100f7fdf7d78d1","name":"XTIVIA","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/virtual-dba.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/0d3648a00e319a37cf8d6d19f762acfbbb4fd0320fd8a6d6b1e64f44a2a6f259?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0d3648a00e319a37cf8d6d19f762acfbbb4fd0320fd8a6d6b1e64f44a2a6f259?s=96&d=mm&r=g","caption":"XTIVIA"},"url":"https:\/\/virtual-dba.com\/author\/xtivia\/"}]}},"_links":{"self":[{"href":"https:\/\/virtual-dba.com\/wp-json\/wp\/v2\/posts\/240396","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/virtual-dba.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/virtual-dba.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/virtual-dba.com\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/virtual-dba.com\/wp-json\/wp\/v2\/comments?post=240396"}],"version-history":[{"count":0,"href":"https:\/\/virtual-dba.com\/wp-json\/wp\/v2\/posts\/240396\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/virtual-dba.com\/wp-json\/wp\/v2\/media\/240410"}],"wp:attachment":[{"href":"https:\/\/virtual-dba.com\/wp-json\/wp\/v2\/media?parent=240396"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/virtual-dba.com\/wp-json\/wp\/v2\/categories?post=240396"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/virtual-dba.com\/wp-json\/wp\/v2\/tags?post=240396"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}