Using Secrets Manager to interact with RDS
In this section, we will learn how to use the AWS Secrets Manager service to perform periodic password changes for the internal RDS Database.
Content
We will proceed to store RDS Credential values through the AWS Secret Manager service.
Store a new secret
.Credentials for RDS database
button.
Username
box: enter the value of DBUser.Password
box: enter the value of DBPassword.Select the encryption key
box, select DefaultEncryptionKey
.Next
button.Next
button.Disable automatic rotation
button. Then, select the Next
button.Store
button.With AWS SDK supporting multiple languages, we can easily integrate Secrets Manager with existing application, for example Java(https://docs.aws.amazon.com/code) -samples/latest/catalog/code-catalog-javav2-example_code-secretsmanager.html) or [Python](https://docs.aws.amazon.com/code-samples/latest/catalog/code-catalog-python- example_code-secretsmanager.html).
Now, we will use Bastion Host, which is allowed access to the RDS Database to execute the prepared shell scripts.
Access to Bastion Host with Session Manager
Start Session
button.Start Session
button.Before running the scripts, we need to make sure the account used is ec2-user
.
Proceed to switch to the ec2-user
account with the following command:
sudo su - ec2-user
Execute Shell Scripts
mysql.oldway.sh
: this code is used to access the RDS database through the old way - hard-coded password
.mysql.newway.sh
: this code is used to access the RDS database through the new way - Secrets Manager
.For mysql.oldway.sh
, the content inside the code will be similar to the following, where the following values will be pre-filled.
#/bin/bash
# mysql.oldway.sh
# This is the old way of accessing a database, with a hard-coded password.
# This script will only work right after the CloudFormation template runs.
# After you store and rotate the secret, you will need to use the
# mysql.newway.sh script.
mysql\
-pPASSWORD\
-u USER \
-P 3306\
-h ENDPOINT
mysql.oldway.sh
to access the RDS Database.
./mysql.oldway.sh
Then execute SQL statements to check the existing data.
use smdemo;
show tables;
select * from bookinfo;
quit;
The result will be similar to the following.
For mysql.newway.sh
, the content inside the code will be similar to the following.
$1
.mysql
command.getsecretvalue() {
aws secretsmanager get-secret-value --secret-id $1 | \
jq .SecretString | \
jq fromjson
}
secret=`getsecretvalue $1`
user=$(echo $secret | jq -r .username)
password=$(echo $secret | jq -r .password)
endpoint=$(echo $secret | jq -r .host)
port=$(echo $secret | jq -r .port)
mysql\
-p$password \
-u $user \
-P $port \
-h $endpoint
The return value of the getsecretvalue() function is a JSON String.
The result will be similar to this:
{
"engine": "mysql",
"username": "myuser",
"password": "mypassword",
"host": "my-database-endpoint.us-east-1.rds.amazonaws.com",
"dbname": "myDatabase",
"port": "3306"
}
mysql.newway.sh
to access the RDS Database.
./mysql.newway.sh <SECRET_NAME>
use smdemo;
show tables;
select * from bookinfo;
quit;
After accessing the RDS Database through both ways, we will proceed with the Secret Rotation process. This is a periodic process to comply with security rules.
Edit rotation
button.Enable automatic rotation
.Use this secret
.Save
button.Retrieve secret value
button.Secrets Manager will use AWS Severless Application Repository to install Lambda Function.
After completing the Key Rotation process, through the old and new access methods, we in turn access the RDS Database and observe the results.
For mysql.oldway.sh
, the output will be as follows:
For mysql.newway.sh
, the output will be as follows:
For the old way, because we used hard-coded password
, when the password is changed, an error will appear and prevent access. For the new way, through Secrets Manager service, we can easily access RDS Database before and after Key Rotation process.