MySQL :: MySQL 8.0 Reference Manual :: 7.1.12.2 Administrative Connection Management (original) (raw)

7.1.12.2 Administrative Connection Management

As mentioned inConnection Volume Management, to allow for the need to perform administrative operations even when max_connections connections are already established on the interfaces used for ordinary connections, the MySQL server permits a single administrative connection to users who have theCONNECTION_ADMIN privilege (or the deprecated SUPER privilege).

Additionally, as of MySQL 8.0.14, the server permits dedicating a TCP/IP port for administrative connections, as described in the following sections.

Administrative Interface Characteristics

The administrative connection interface has these characteristics:

These lines in the server my.cnf file enable the administrative interface on the loopback interface and configure it to use port number 33064 (that is, a port different from the default):

[mysqld]
admin_address=127.0.0.1
admin_port=33064

MySQL client programs connect to either the main or administrative interface by specifying appropriate connection parameters. If the server running on the local host is using the default TCP/IP port numbers of 3306 and 33062 for the main and administrative interfaces, these commands connect to those interfaces:

mysql --protocol=TCP --port=3306
mysql --protocol=TCP --port=33062
Administrative Interface Support for Encrypted Connections

Prior to MySQL 8.0.21, the administrative interface supports encrypted connections using the connection-encryption configuration that applies to the main interface. As of MySQL 8.0.21, the administrative interface has its own configuration parameters for encrypted connections. These correspond to the main interface parameters but enable independent configuration of encrypted connections for the administrative interface:

For general information about configuring connection-encryption support, seeSection 8.3.1, “Configuring MySQL to Use Encrypted Connections”, andSection 8.3.2, “Encrypted Connection TLS Protocols and Ciphers”. That discussion is written for the main connection interface, but the parameter names are similar for the administrative connection interface. Use that discussion together with the following remarks, which provide information specific to the administrative interface.

TLS configuration for the administrative interface follows these rules:

[mysqld]  
admin_tls_version=''  

Examples:

[mysqld]  
admin_address=127.0.0.1  

As a result, the administrative interface supports encrypted connections (because encryption is supported by default when the administrative interface is enabled), and uses the main interface TLS context. When clients connect to the administrative interface, they should use the same certificate and key files as for ordinary connections on the main interface. For example (enter the command on a single line):

mysql --protocol=TCP --port=33062  
      --ssl-ca=ca.pem  
      --ssl-cert=client-cert.pem  
      --ssl-key=client-key.pem  
[mysqld]  
admin_address=127.0.0.1  
admin_ssl_ca=admin-ca.pem  
admin_ssl_cert=admin-server-cert.pem  
admin_ssl_key=admin-server-key.pem  

As a result, the administrative interface supports encrypted connections using its own TLS context. When clients connect to the administrative interface, they should use certificate and key files specific to that interface. For example (enter the command on a single line):

mysql --protocol=TCP --port=33062  
      --ssl-ca=admin-ca.pem  
      --ssl-cert=admin-client-cert.pem  
      --ssl-key=admin-client-key.pem