This article outlines the steps required to configure an encrypted SSL connection between the MySQL Agent and a MySQL server. It assumes basic familiarity with SSL certificates and Java keystore tools.
To enable SSL, the MySQL server must be compiled with OpenSSL or yaSSL and properly configured to support encrypted connections. If certificates are missing or improperly formatted, the agent will fail to establish a secure connection.
SHOW VARIABLES LIKE 'have_ssl';
If the result is YES, SSL is supported. If DISABLED, start the server with appropriate SSL options and generate required certificates.
openssl x509 -outform DER -in client-cert.pem -out client.cert
Use the bundled keytool located in [FGLAM_HOME]\jre.8.0.72\jrein
or equivalent:
keytool.exe -import -file client.cert -keystore ..\..\..\..\keystore -alias mysqlClientCertificate
keytool.exe -import -file ca.pem -keystore ..\lib\security\cacerts -alias mysqlServerCACert
Default keystore password is changeit.
To preserve the truststore across upgrades, copy cacerts to a custom location (e.g., [FGLAM_HOME] \truststore
).
Edit baseline.jvmargs.config in [FGLAM_HOME]\state\default\config
:
vmparameter.0 = "-Djavax.net.ssl.keyStore="C:/Foglight Agent Manager/keystore"";
vmparameter.1 = "-Djavax.net.ssl.keyStorePassword=changeit";
vmparameter.2 = "-Djavax.net.ssl.trustStore="C:/Foglight Agent Manager/truststore/cacerts"";
vmparameter.3 = "-Djavax.net.ssl.trustStorePassword=changeit";
Restart the Foglight Agent Manager to apply the new SSL configuration.
Set Use SSL to true in the MySQL Agent configuration.
© 2025 Quest Software Inc. ALL RIGHTS RESERVED. Termini di utilizzo Privacy Cookie Preference Center