Adding a MySQL Database Instance

When you need to manage a MySQL database, add an instance for the database.

When you add a MySQL instance, a default database group is automatically created. The default database group includes all the MySQL databases.

Note

  • You cannot delete the default database group.

  • The AD authentication for on-premise MySQL servers backup is not supported.

About This Task

When you discover instances, the newly discovered instances are assigned a backup plan as follows:

  • If the server is installed from the Command Center, then the newly discovered instances inherit the backup plan of the server.

  • If the server is not installed from the Command Center, then you must set a backup plan for the newly discovered instances.

Procedure

  1. From the navigation pane, go to Protect > Databases.

    The database Overview tab appears.

  2. From the Add Instance list, select Database Server.

    The Configure Database Instance page appears.

  3. Select MySQL and click Next.

    The Add MySQL instance dialog box appears.

  4. From the Server name list, select the server where you want to create the instance.

  5. In the Instance name box, enter the name for the instance.

  6. From the Plan list, select a backup plan.

  7. Under the Connection details section, enter the following details:

    1. From Credential list, select an existing credential or add a new credential. To add a new credential, do the following:

      Steps to add a credential
      1. Click +.

        The Add Credential dialog box appears.

      2. From the Account type list, select a database account type.

      3. From the Database credential type, select a database agent.

      4. From the Credential Vault list, select a credential vault to store, share, and update account credentials with shared resources in your environment.

      5. In the Credential name box, enter a unique name to access the credential.

      6. Under the Azure AD/AWS IAM Authentication section, enter the following details:

        • In the Username box, enter the user name to access the Azure Database for MySQL application.

        • In the Password box, enter the password to access the Azure Database for MySQL application.

        Note

        If you move the Azure AD/AWS IAM Authentication toggle to right, you only need to enter the user name detail.

      7. Move SSL certificate toggle key to right, and enter the following details:

        • In the SSL CA file field, provide the SSL CA file path on the proxy computer.

        • In the SSL Cert file field, provide the SSL certificate file path on the proxy computer.

        • In the SSL Key file field, provide the SSL key file path on the proxy computer.

      8. In the Description box, enter a brief description for the credential.

      9. Click Save.

    2. If you are using a Linux platform, then in the UNIX username box, enter the Linux operating system user name.

    3. In the Socket file/endpoint box, enter the following details:

      • For Windows, select the TCP/IP port number to open the communication between MySQL server and clients.

      • For UNIX, type the path to the socket file or provide the endpoint in hostname:port format, where 'hostname' is the hostname of the client and 'port' is where MySQL server is running on the client. Alternatively, click Browse to select the location for socket file.

  8. Under the MySQL configuration section, enter the following details:

    1. In the Binary Directory box, enter the path to the directory where the MySQL application files are stored.

    2. In the Log Data Directory box, enter the path to the directory where the log files are stored.

    3. In the Configuration file box, enter the path to the configuration file as shown in the following examples:

      • Windows: C:\Program Files\MySQL\MySQL Server 5.5\my.ini

      • UNIX: /etc/my.cnf

  9. Under the Advanced option section, enter the following details:

    1. To enable SSL, move the Use SSL options toggle key to the right. In the SSL CA file box, enter the SSL CA file path in the client computer.
  10. To enable XtraBackup or Enterprise Backup on a Linux client, move the Enable hot backup toggle key to the right.

  11. Click Add.

Note

To avoid inconsistencies in the non-InnoDB data, lock the non-InnoDB tables while running a backup operation.

×

Loading...