


"connectionOrResourceAdapterProperties" => 'db=DB_NAME,user-name=USER,password=PASSWORD,host=localhost,port=5000'

These are the steps to do it:Ĭreate an SSH Tunnel between the local 5000 port and 3306 port on a remote machine via SSH protocol: Let us assume that the MySQL server is listening to the standard 3306 port on the remote machine, and we would like to use the local 5000 port for connecting to the MySQL server. Let us create a local port forwarding via SSH protocol for a MySQL server installed on a remote machine. All history is stored in the relevant SYSLOG.SSHCredentialsHistory table. The Data Virtuality Server also supports SSH credentials history of changes. This functionality is supported by the SYSADMIN_VDB.SSHCredentials table, which holds and controls all key pairs generated by the Data Virtuality Server and used by SSH tunnels, and dedicated procedures - please see SYSADMIN_VDB Procedures for more information on them. In order to facilitate SSH tunnels creation and usage, the Data Virtuality Server provides key generation and management functionality. All history is stored in the relevant SYSLOG.SSHTunnelHistory table. The Data Virtuality Server also logs history of changes for the SSH tunnel. To work with SSH tunnels, the Data Virtuality Server provides a special SYSADMIN_VDB.SSHTunnel table and several stored procedures - please see SYSADMIN_VDB Procedures for more information on them. The local port does not have to be the same as the remote port. Once the SSH tunnel has been established, you can connect to the specified local port to access the network service. To set up a local SSH tunnel, configure an SSH client to forward a specified local port to a port on the remote machine. You can set up SSH tunnels to transfer unencrypted traffic over a network through an encrypted channel. In computer networks, a tunnelling protocol allows a network user to access or provide a network service that the underlying network does not support or provide directly.Ī Secure Shell (SSH) tunnel consists of an encrypted tunnel created through an SSH protocol connection.
