Open eahrend opened 3 years ago
Actually, being able to do it a per host level is a requirement to enable SSL on Google Cloud SQL, and we're using proxysql to enable read/write splitting on GCP.
Each read replica creates it's own CA/KEY/CERT upon request, see https://registry.terraform.io/providers/hashicorp/google/latest/docs/resources/sql_ssl_cert
So ideally in the mysql_servers table we should be able to specify a cert/key/ca pairing for each hostname.
EDIT: In a worst case scenario, I can see about making a PR to enable this myself. Are there any docs for getting started in regards to developing for proxysql?
I'm also encountering with the same issue. Any guidance or help would be greatly appreciated.
Hey,
In my current setup with proxysql, it's acting as the proxy to multiple instances, each with their own set of readers/writers, using the username + digest for routing to the correct backend in the mysql_query_rules. I'd like to encrypt traffic to the readers/writers using SSL, with a different cert for each group of readers/writers, however it looks like proxysql only allows on cert/key pairing to exist and uses it for all backend connections.
If doing this is an anti-pattern and not recommended, that's also acceptable.
Ideally I'd like to have something like: