首页 > 代码库 > mysql/mariadb基于ssl的主从复制
mysql/mariadb基于ssl的主从复制
当mysql/mariadb跨越互联网进行复制时别人可以窃取到mysql/mariadb的复制信息, 这些信息是明文的, 因此存在不安全性, 这里通过ssl对复制的信息进行加密
1. 创建证书中心
在主服务器上创建证书中心
cd /etc/pki/CA生成私钥(umask 077;openssl genrsa -out private/cakey.pem 2048)生成自签名证书openssl req -new -x509 -key /etc/pki/CA/private/cakey.pem -out /etc/pki/CA/cacert.pem -days 7300创建证书编号mkdir certs crl newcertstouch index.txtecho 00 > serial
2. 为主服务器创建证书
服务器的名称必须固定, 在申请证书时要输入服务器名称, 这书和服务器名称对应;
创建私钥mkdir /usr/lcoal/mysql/sslcd /usr/local/mysql/ssl(umask 077;openssl genrsa -out /etc/mysql/ssl/master.key 2048)生成证书申请openssl req -new -key master.key -out master.csr在证书服务器上对master的证书进行签发openssl ca -in master.csr -out master.crt -days 365
3. 创建从服务器证书
(umask 077;openssl genrsa -out /etc/mysql/ssl/slave.key 2048)openssl req -new -key slave.key -out slave.csr将从服务器的证书申请文件复制到证书服务器上进行签发openssl ca -in slave.csr -out slave.crt -days 365
4. 修改证书权限和mysql配置文件
将证书的公钥cacert.pem复制到主从服务器的目录下cd /etc/mysql/sslcp /etc/pki/CA/cacert.pem ./chown -R mysql.mysql master.crt master.key cacert.pemchmod 600 master.crt master.key cacert.pemvim /etc/my.cnflog-bin=master-logserver-id=1skip_name_resolve = ONinnodb_file_per_table = ONsslssl_ca = /etc/mysql/ssl/cacert.pemssl_cert = /etc/mysql/ssl/master.crtssl_key = /etc/mysql/ssl/master.key修改从服务器配置 cd /etc/mysql/sslcp /etc/pki/CA/cacert.pem ./chown -R mysql.mysql slave.crt slave.key cacert.pemchmod 600 slave.crt slave.key cacert.pemvim /etc/my.cnfrelay-log=relay-logserver-id=2skip_name_resolve = ONinnodb_file_per_table = ONsslssl_ca = /etc/mysql/ssl/cacert.pemssl_cert = /etc/mysql/ssl/slave.crtssl_key = /etc/mysql/ssl/slave.key
5. 在主服务上创建复制用户
MariaDB [(none)]> GTANT REPLICATION SLAVE,REPLICATION CLIENT ON *.* TO ‘repluser‘@‘10.1.52.%‘ IDENTIFIED BY ‘replpass‘ REQUIRE SSL;MariaDB [(none)]> FLUSH PRIVILEGES;查看主服务器当前二进制位置MariaDB [(none)]> SHOW MASTER STATUS;+-------------------+----------+--------------+------------------+| File | Position | Binlog_Do_DB | Binlog_Ignore_DB |+-------------------+----------+--------------+------------------+| master-log.000005 | 7918 | | |+-------------------+----------+--------------+------------------+1 row in set (0.00 sec)
6. 在从服务器上开始复制
MariaDB [(none)]> CHANGE MASTER TO -> MASTER_HOST=‘10.1.52.11‘, -> MASTER_USER=‘repluser‘, -> MASTER_PASSWORD=‘replpass‘, -> MASTER_LOG_FILE=‘master-log.000001‘, -> MASTER_LOG_POS=495, -> MASTER_SSL=1, -> MASTER_SSL_CA=‘/etc/mysql/ssl/cacert.pem‘, -> MASTER_SSL_CERT=‘/etc/mysql/ssl/slave.crt‘, -> MASTER_SSL_KEY=‘/etc/mysql/ssl/slave.key‘;MariaDB [(none)]> START SLAVE;
7. 查看从服务器的状态
MariaDB [(none)]> SHOW SLAVE STATUS\G*************************** 1. row *************************** Slave_IO_State: Waiting for master to send event Master_Host: 10.1.52.11 Master_User: repluser Master_Port: 3306 Connect_Retry: 60 Master_Log_File: master-log.000005 Read_Master_Log_Pos: 7918 Relay_Log_File: relay-log.000002 Relay_Log_Pos: 7940 Relay_Master_Log_File: master-log.000005 Slave_IO_Running: Yes Slave_SQL_Running: Yes Replicate_Do_DB: Replicate_Ignore_DB: Replicate_Do_Table: Replicate_Ignore_Table: Replicate_Wild_Do_Table: Replicate_Wild_Ignore_Table: Last_Errno: 0 Last_Error: Skip_Counter: 0 Exec_Master_Log_Pos: 7918 Relay_Log_Space: 8228 Until_Condition: None Until_Log_File: Until_Log_Pos: 0 Master_SSL_Allowed: Yes Master_SSL_CA_File: /etc/mysql/ssl/cacert.pem Master_SSL_CA_Path: Master_SSL_Cert: /etc/mysql/ssl/slave.crt Master_SSL_Cipher: Master_SSL_Key: /etc/mysql/ssl/slave.key Seconds_Behind_Master: 0Master_SSL_Verify_Server_Cert: No Last_IO_Errno: 0 Last_IO_Error: Last_SQL_Errno: 0 Last_SQL_Error: Replicate_Ignore_Server_Ids: Master_Server_Id: 11 row in set (0.00 sec)
mysql/mariadb基于ssl的主从复制
声明:以上内容来自用户投稿及互联网公开渠道收集整理发布,本网站不拥有所有权,未作人工编辑处理,也不承担相关法律责任,若内容有误或涉及侵权可进行投诉: 投诉/举报 工作人员会在5个工作日内联系你,一经查实,本站将立刻删除涉嫌侵权内容。