A security group is a firewall provided by Tencent Cloud for controlling inbound traffic of TencentDB. You can associate a security group with a cluster when purchasing it or later in the console.
This document describes how to configure a security group for TDSQL-C for MySQL in the console.
Note:
Currently, security groups can be configured only for TDSQL-C for MySQL instances in VPCs.
TDSQL-C for MySQL allows you to configure different security groups for the read-write and read-only addresses respectively, which don't affect each other.
Configuring a security group
During cluster purchase
2. Configure the database and basic information, configure the security group in Advanced Configuration, and click Buy Now.
In the console
2. Select a region at the top and proceed according to the actually used view mode:
Click Target Cluster in the cluster list on the left to enter the cluster management page.
Find the target cluster in the cluster list and click the Cluster ID or Manage in the Operation column to enter the cluster management page.
3. On the cluster management page, select the Security Group tab, select the target read-write instance, RO group, read-only instance, or database proxy, and click Configure Security Group.
4. In the Configure Security Group window, select a security group rule (or search for the target security group by ID) and click OK.
Note:
You can configure up to five security group rules.
You can configure different access addresses with different security groups, which will control only sources that access the current address.
Adjusting the priority of a security group
If multiple security groups are bound to a TDSQL-C for MySQL instance, they will be executed based on their priorities such as 1 and 2. You can adjust the priorities as follows.
2. Select the region at the top, find the target cluster in the cluster list, and click the cluster ID or Manage in the Operation column to enter the cluster management page.
3. On the cluster management page, select the Security Group tab, select the target read-write instance, database proxy, or read-only instance, and click Edit below Associated Security Group.
4. In the Security Group column, adjust the priority of the security group by using the moveup/movedown/deletionicons and click Save.
Was this page helpful?