How to configure your MySQL database
Run the following command to install the connector from the root of your project:
The sources files must be inside the queries/
folder.
To know how the source hierarchy works, please, visit How to configure sources.
To configure the connection with your MySQL database follow these steps:
Create the source `.yaml` file within the `queries` folder if you haven't already
/queries/source.yml
Add the following code for your MySQL connection
Replace the details section with your info and save
Done, now you can test your connection
true
boolean for the default SSL strategy. This should work most of the timesA Certificate Authority (CA) is a trusted party that signs digital certificates used to identify websites and other services. Their most well known use is signing the certificates used by websites serving content over HTTPS. Using a signed certificate means that you can trust that you really are communicating with the website that you think you are, without someone else listening in.
Encryption alone won’t provide trust, only confidentiality. Without a way to verify the entity at the other end of a secure connection, you risk establishing an encrypted connection to a malicious party. This means that TLS / SSL only provides real security when certificates are validated against specific trusted Certificate Authorities.
In day-to-day browsing you don’t need to specify which CAs to trust, your operating system and / or browser come with a list of trusted authorities. These trusted authorities verify the identities of domain owners creating HTTPS certificates, and sign those certificates so that you can trust them as well. The root store of certificates from Certificate Authorities is a collection of certificates that are trusted to sign other certificates.
Operating systems all come with CA root stores. Below we have listed common paths on which the CA root store can be found in various operating systems and distributions.
Linux On Linux, the path to the system CA roots depends on the distribution that you are using.
Debian / Ubuntu / Gentoo / Arch / Slackware This path also applies to Debian or Ubuntu derivatives. You need to make sure the ca-certificates package is installed.
/etc/ssl/certs/ca-certificates.crt
RedHat / Fedora / CentOS / Mageia / Vercel / Netlify This path also applies to RedHat or Fedora derivatives like Amazon Linux and Oracle Linux. This is the path to use for applications deployed on Vercel and Netlify.
/etc/pki/tls/certs/ca-bundle.crt
Alpine This is a commonly used distribution for Docker containers.
/etc/ssl/cert.pem
OpenSUSE This also applies to OpenSUSE derivatives.
/etc/ssl/ca-bundle.pem
MacOS / FreeBSD / OpenBSD MacOS provides an extracted version of the system roots on disk that can be used for the CA roots. On FreeBSD you need to install the ca_root_nss package for this path to be available.
/etc/ssl/cert.pem
Windows Windows does not provide a file with the CA roots. You’ll need to obtain CAs either from your DB provider or others. The curl project provides an extracted bundle of root certificates from the Mozilla CA Certificate program. You can download the bundle at https://curl.se/docs/caextract.html. Once you download the file, you can point at it from the connectors’ configuration.
To test the connection you can:
.sql
in the queries
directory that points to a table of your new connection in the FROM
clause. See the section SQL Syntax Basics to learn more.latitude run query_file_name
where query_file_name
is the name of your .sql
file. This will display the results in your terminal. See the section Running queries to learn more about how to query your data.How to configure your MySQL database
Run the following command to install the connector from the root of your project:
The sources files must be inside the queries/
folder.
To know how the source hierarchy works, please, visit How to configure sources.
To configure the connection with your MySQL database follow these steps:
Create the source `.yaml` file within the `queries` folder if you haven't already
/queries/source.yml
Add the following code for your MySQL connection
Replace the details section with your info and save
Done, now you can test your connection
true
boolean for the default SSL strategy. This should work most of the timesA Certificate Authority (CA) is a trusted party that signs digital certificates used to identify websites and other services. Their most well known use is signing the certificates used by websites serving content over HTTPS. Using a signed certificate means that you can trust that you really are communicating with the website that you think you are, without someone else listening in.
Encryption alone won’t provide trust, only confidentiality. Without a way to verify the entity at the other end of a secure connection, you risk establishing an encrypted connection to a malicious party. This means that TLS / SSL only provides real security when certificates are validated against specific trusted Certificate Authorities.
In day-to-day browsing you don’t need to specify which CAs to trust, your operating system and / or browser come with a list of trusted authorities. These trusted authorities verify the identities of domain owners creating HTTPS certificates, and sign those certificates so that you can trust them as well. The root store of certificates from Certificate Authorities is a collection of certificates that are trusted to sign other certificates.
Operating systems all come with CA root stores. Below we have listed common paths on which the CA root store can be found in various operating systems and distributions.
Linux On Linux, the path to the system CA roots depends on the distribution that you are using.
Debian / Ubuntu / Gentoo / Arch / Slackware This path also applies to Debian or Ubuntu derivatives. You need to make sure the ca-certificates package is installed.
/etc/ssl/certs/ca-certificates.crt
RedHat / Fedora / CentOS / Mageia / Vercel / Netlify This path also applies to RedHat or Fedora derivatives like Amazon Linux and Oracle Linux. This is the path to use for applications deployed on Vercel and Netlify.
/etc/pki/tls/certs/ca-bundle.crt
Alpine This is a commonly used distribution for Docker containers.
/etc/ssl/cert.pem
OpenSUSE This also applies to OpenSUSE derivatives.
/etc/ssl/ca-bundle.pem
MacOS / FreeBSD / OpenBSD MacOS provides an extracted version of the system roots on disk that can be used for the CA roots. On FreeBSD you need to install the ca_root_nss package for this path to be available.
/etc/ssl/cert.pem
Windows Windows does not provide a file with the CA roots. You’ll need to obtain CAs either from your DB provider or others. The curl project provides an extracted bundle of root certificates from the Mozilla CA Certificate program. You can download the bundle at https://curl.se/docs/caextract.html. Once you download the file, you can point at it from the connectors’ configuration.
To test the connection you can:
.sql
in the queries
directory that points to a table of your new connection in the FROM
clause. See the section SQL Syntax Basics to learn more.latitude run query_file_name
where query_file_name
is the name of your .sql
file. This will display the results in your terminal. See the section Running queries to learn more about how to query your data.