63

I was trying to use AWS Aurora Serverless for MySQL in my project, but I am impossible to connect to it, though I have the endpoint, username, password.

What I have done:

  1. From AWS console managment, I select RDS > Instances > Aurora > Serverless
  2. Leave the default settings
  3. Create database
  4. AWS will only create an AWS Cluster enter image description here
  5. I open MySQL Workbench, and use endpoint, username, password to connect the database

Ressult:

Your connection attempt failed for user 'admin' from your host to server at xxxxx.cluster-abcdefg1234.eu-west-1.rds.amazonaws.com:3306: Can't connect to MySQL server on 'xxxxx.cluster-abcdefg1234.eu-west-1.rds.amazonaws.com' (60)

Did I make any wrong steps ? Please advice me.

****EDIT****

I tried to create another Aurora database with capacity type: Provisioned. I can connect to the endpoint seamlessly with username and password by MySql workbench. It means that the port 3306 is opened for workbench.

About the security group: enter image description here

7
  • What security groups do you have in place to open up access to port 3306 from wherever you are running MySql Workbench? General info about seucirty groups on RDS: docs.aws.amazon.com/AmazonRDS/latest/UserGuide/… Commented Aug 6, 2018 at 22:58
  • 2
    I edited the question. I think the port is not the issue because I created another Aurora MySql database with type: provisioned and it works smoothly. But with type serverless, it doesn't work Commented Aug 6, 2018 at 23:50
  • Can you telnet to xxxxx.cluster-abcdefg1234.eu-west-1.rds.amazonaws.com on port 3306? If you can - you know its a config/auth problem, if not, you have a network issue. Depending on your Operating system, you may need to install Telnet and then issue a command like telnet xxxxx.cluster-abcdefg1234.eu-west-1.rds.amazonaws.com 3306 Commented Aug 7, 2018 at 0:22
  • 1
    Aurora Serverless appears to use Privatelink interface VPC endpoints (VPCEs) to actually provide the endpoint inside your VPC, so they aren't accessible from elsewhere. Where are you running workbench? Commented Aug 7, 2018 at 11:12
  • 1
    you can set up a data api for aurora serverless which can be reached from outside of the vpc. I will try this with mysql workbench when I have time. Commented Jun 4, 2020 at 10:59

13 Answers 13

48

From https://docs.aws.amazon.com/AmazonRDS/latest/UserGuide/aurora-serverless.html :

  • You can't give an Aurora Serverless DB cluster a public IP address.
  • You can access an Aurora Serverless DB cluster only from within a virtual private cloud (VPC) based on the Amazon VPC service.
  • You can't access an Aurora Serverless DB cluster's endpoint through an AWS VPN connection or an inter-region VPC peering connection. There are limitations in accessing a cluster's endpoint through an intra-region VPC peering connection; for more information, see Interface VPC Endpoints (AWS PrivateLink) in the Amazon VPC User Guide. However, you can access an Aurora Serverless cluster's endpoint through an AWS Direct Connect connection.

So, aside from SSH-ing through an EC2 instance, you can also access your serverless cluster with mySQL Workbench with AWS Direct Connect.

You can also set up a mySQL Workbench through a RDP connection to a Windows EC2 and access the Serverless cluster. This instance only needs to be up when you need to access the Aurora.

If one of the setups here don't work, the usual suspects are the VPC Security group, firewall rules vs port number configured on the cluster or IAM configuration if connecting using IAM.

Sign up to request clarification or add additional context in comments.

4 Comments

It seems as of now, Serverless DB is also accessible via AWS Client VPN docs.aws.amazon.com/vpn/latest/clientvpn-admin/…
@Yoga Do you have more info about how to use AWS Direct Connect with Aurora? Thanks.
Tailscale VPN sets up a reverse NAT and you can deploy that on an EC2 instance and follow the steps in this doc to set it as a subnet relay. With that, my team has been able to set up (took us 30 mins) and connect to Aurora Serverless from MySQL workbench and Sequel Pro. Hope it helps. :)
Following up on Justin Soliz comment, I was also able to connect to a Postgres Serverless Aurora db using AWS Client VPN
13

One way to connect to an Aurora Serverless DB cluster is by using an Amazon EC2 instance. You cannot create publicly accessible Aurora Serverless DB clusters in the Preview. This task walks you through creating a publicly accessible Amazon EC2 instance in your VPC. You can use this Amazon EC2 instance to connect to an Aurora Serverless DB cluster.

This is directly from the docs provided upon preview signup. Please try creating an EC2 instance and using SSH Tunnel method in your MYSQL Workbench or SQL UI of choice. During the preview the Aurora Serverless is not allowed to be set to publicly accessible.

4 Comments

Hi cmtzco, if so, it's currently not the time to use Aurora Serverless DB for production until it's official release. Am I correct?
@PeterPham Yeah I'd suggest just testing it for possible use. It looks like it got announced for public use 5 days ago though. aws.amazon.com/blogs/aws/aurora-serverless-ga
@cmtzco The tunneling part is what has stumped me: stackoverflow.com/questions/52448301/…
@cmtzco here are some pretty clear instructions: aws.amazon.com/es/getting-started/tutorials/…
12

To connect to Aurora serverless or any database in private subnet you will need a 'jump host' which can be any EC2 instance in a public subnet.

Follow Below Steps:

  1. Open the security group attached to the database, and add new rule as below:-

Type:MYSQL/Aurora, Protocol:TCP, PortRange:3306,
Source:securitygroupofEC2 (you can all security group by entering 'sg-')

  1. Open the security group attached to the EC2, and make port 22 is open. If not, add a new rule as below:-

Type:SSH, Protocol:TCP, PortRange:22, Source:MY IP

  1. Open Workbench, Click New connection
- Standard TCP/IP over SSH
 - SSH Hostname : < your EC2 Public IP >  #34.3.3.1
 - SSH Username : < your username > #common ones are : ubuntu, ec2-user, admin
 - SSH KeyFile: < attach your EC2 .pem file>

 - MYSQL Hostname: <database endpoint name> #mydb.tbgvsblc6.eu-west-1.rds.amazonaws.com

 - MYSQL Port: 3306
 - Username : <database username>
 - Password: <database password>

Click 'test connection' and boom done!!

2 Comments

Same thing with video tutorials if some of having some queries. youtube.com/watch?v=qI4hlUrAkAU
This should be the accepted answer with maybe a link to the AWS docs as Yoga above pointed out. Doing this gets you up and running quick especially if your end goal is a development project. Spend more time coding, leave the admin to the admins... ;)
9

A common pattern used by customers for connecting to VPC only services (like Aurora Serverless, Amazon Neptune, Amazon DocDB etc) is to have a middle layer (EC2 instance, or ALB etc) and making the middle layer accessible from outside the VPC. If your use case is just trying out some queries or connecting a workbench, then the easiest thing to do is:

  1. Resolve the DNS of the serverless db and obtain its IP
  2. Create an ALB in your VPC, with a target group to the IP that you found in #1
  3. Create a new security group and attach that to your ALB
  4. Update the SG to allow inbound from where ever you want. If you want public internet access, then allow inbound from all IPs, enable an internet gateway in your VPC, and use a public subnet for your ALB.

Once all of this is done, you would end up with a new DNS - that points to your ALB. Make sure that your ALB is set up correctly by:

  1. Using telnet to connect to your ALB endpoint. telnet alb-endpoint alb-port. If it succeeds, then you have a full end to end connection (not jsut to your ALB, but all the way through).
  2. Verify ALB metrics to make sure that all health checks are passing.

Once this is done, use the ALB endpoint in workbench, and you are good to go.

This pattern is recommended only for non production systems. The concerning step is the one where you resolve the DNS to an IP - that IP is ephemeral, it can change when scale compute or failover happens in the background.

Hope this helps, let me know if you need more details on any step. Here is a related answer for Neptune:

Connect to Neptune on AWS from local machine

4 Comments

ALB doesn't fit for this use case, since ALB supports HTTP/HTTPS protocol only, but connecting to Aurora from MySQL Workbench requires MySQL protocol.
Then use an NLB?
As far as I understand, NLB also doesn't fit because Aurora doesn't provide IP address or instance id for the target.
@TakayukiSato that's what's "Resolve the DNS of the serverless db and obtain its IP" for . But the IP addresses may change so it's definitely short term/development solution
8
  • We can't connect Aurora Serverless directly from MySQL Workbench as only private IPs assigned to Aurora Serverless, not public IP ones.

  • We can connect Aurora Serverless from EC2 but can't connect Aurora Serverless through the Mysql Workbench SSH tunnel.

  • We can't connect Aurora Serverless through ALB as ALB allow only HTTP and HTTPS traffic. you can telnet ALB-RDS-DNS from local but can't connect to MySQL Workbench

Then what is a solution here;

  • We can connect Aurora Serverless through NLB as NLB allow traffic over TCP protocol;

Steps 1: Create NLB and add listener Load Balancer Protocol: TCP, and Load Balancer Port :3306

Step 2: Select the VPC (It should be the same VPC of Aurora Serverless Cluster), and add subnets (public)

Step 3: Navigate to Configure Routing, select Target type: IP, and Protocol: TCP,Port:3306

Step 4: Use DNS Checker to get private IP of Aurora Serverless Cluster, and add those IPs with port 3306

Step 5: Create NLB

Now modify the Security group of Aurora Serverless Cluster, allow traffic from either 0.0.0.0 (not recommended) or VPC CIDR

Now, go to Mysql Workbench and use the NLB DNS name, and try to connect using the correct username and password of Aurora Serverless Cluster.

3 Comments

Nice it works! One potential downside of this might be that the NLB's healthcheck will prevent the Aurora instance to ever shut down completely (if this is relevant).
In step 4, how can i get the private IP of my aurora serverless cluster?
@FernandoSantiago You can perform nslookup ****.rds.amazonaws.com and add all the IPv4 addresses to the NLB target group.
5

New AWS Feature: Aurora Serverless v2.0 Public IP Address Available

Like many of you I've been waiting and hoping for this for some time.

As of today April 27, 2022 RDS Aurora MySQL Serverless now has a Public option. You must create a separate security group for that option and set inbound rules.

Copy your endpoint, user, and password and you're good to go.

Look at the Comparison of Aurora Serverless v2 and Aurora Serverless v1 requirements

Worked like a charm for me.

1 Comment

Hi there, any example how to do it with cdk ? Thanks
2

You should be using an EC2 instance that has access to your dbinstance.
This EC2 instance should have port 22 opened for ssh.
Now use port forwarding from local to EC2 to db instance.
Now in your work bench give hostname 127.0.0.1 and port <forwarded port>.

Comments

1

Data API and Query Editor for connecting to Aurora Serverless are now available in some more regions.

https://aws.amazon.com/about-aws/whats-new/2020/05/amazon-rds-data-api-and-query-editor-available-additional-regions/

2 Comments

MySQL Workbench cannot use either
This works well enough but it doesn't allow mysqldump for example.
1

Aurora serverless does not have public endpoint to connect from any of the ide like MYSQL workbench,Sequel pro etc. But we can connect through cli by launching an instance in same vpc in which aurora serverless resides.

Besides you can checkout cloud9 an aws cloud ide. This is in turn ec2 only but will have UI also and can be shared with teams and bunch of other features.

Comments

0

This can be achieved using haproxy

Install Haproxy on Centos-> yum install haproxy

delete existing configuration in this file /etc/haproxy/haproxy.cfg and add the below lines(make sure you replace your RDS endpoint url in below configuration)

global user haproxy group haproxy

defaults retries 2 timeout connect 3000 timeout server 5000 timeout client 5000

listen mysql-cluster bind 0.0.0.0:3307 mode tcp server mysql-1 test.cluster-crkxsds.us-west-2.rds.amazonaws.com:3306

After modifying the file,start the haproxy -> service haproxy start

You can connect Aurora RDS in MYSQL Workbench using Public IP with port no 3307

Comments

0

We have installed softether vpn in one of ec2 instance in vpc public subnet. We connected the softether vpn from linux / mac os / windows like regualr vpn. After then we were able to access all the private resources like aws aurora serverless as like regualr endpoints from mysql workbench, pgadmin, etc tools, even the django admin shell commands from local computer.

Hope this should help.

https://www.softether.org/4-docs/1-manual/2._SoftEther_VPN_Essential_Architecture/2.4_VPN_Server_Manager

Comments

-1

Initially, I was got stuck in the same scenario Points to be noted while connecting AWS RDS Aurora

  • Cant connect Public, you need an EC2 instance with the same region where Aurora is been created.

  • Aurora Public access should be checked No(it worked for me).

  • You need to create the security group, where you should add Inbound and Outbound rules(IpAddress of EC2 instances).

Ex: Type = MYSQL/AURORA, Protocol=TCP, PortRange=3306,Source=Custom and your IP Address Range,

  • modify instance and security group to the instance and apply the changes immediately.

  • While creating Aurora, u will create MasterName, Pwd, and default schema to connect.

  • After creating, go to cluster and take the cluster endpoint and log in with your EC2 Instance and with MySQL Workbench, Hostname as your cluster endpoint, username and pwd entered while creating aurora database.

1 Comment

He's asking about Aurora Serverless, which doesn't have the "Publicly Accessible" option
-6

My guess is your security group is not correctly setup for access. You need to explicitly allow remote access on that port to that instance.

From the official docs:

Two common causes of connection failures to a new DB instance are:

  • The DB instance was created using a security group that does not authorize connections from the device or Amazon EC2 instance where the MySQL application or utility is running. If the DB instance was created in a VPC, it must have a VPC security group that authorizes the connections. If the DB instance was created outside of a VPC, it must have a DB security group that authorizes the connections.

  • The DB instance was created using the default port of 3306, and your company has firewall rules blocking connections to that port from devices in your company network. To fix this failure, recreate the instance with a different port.

See here for more information:

https://docs.aws.amazon.com/AmazonRDS/latest/UserGuide/USER_ConnectToInstance.html

2 Comments

Thanks for advice, however it's not the case ( please refer my update on question)
AWS created only cluster for Aurora MySql type Serverless, no instance at all.

Your Answer

By clicking “Post Your Answer”, you agree to our terms of service and acknowledge you have read our privacy policy.

Start asking to get answers

Find the answer to your question by asking.

Ask question

Explore related questions

See similar questions with these tags.