Soldato
Been banging my head against the wall on this one for a few hours now.
What I want ultimately is to ssh through an EC2 instance in a public subnet to an RDS MySQL instance in a private subnet.
I've been using SQL work bench for this.
I've configure the NACLs and security groups etc to the best of my knowledge but it isn't working.
So I thought keep it simple and SSH on to the EC2 instance first then test the connectivity to the RDS MySQL database.
However even from the EC2 instance I cannot connect to the RDS MySQL database.
telnet aws.endpoint.rds.example 3306
The Database has a security group which has opened up port 3306 to the world. But I still cannot connect even from an EC2 instance in the same VPC.
What am I missing?
I opened up the security rules for everything from everything and I still cannot connect from EC2 to RDS.
At this point it should be working.
What I want ultimately is to ssh through an EC2 instance in a public subnet to an RDS MySQL instance in a private subnet.
I've been using SQL work bench for this.
I've configure the NACLs and security groups etc to the best of my knowledge but it isn't working.
So I thought keep it simple and SSH on to the EC2 instance first then test the connectivity to the RDS MySQL database.
However even from the EC2 instance I cannot connect to the RDS MySQL database.
telnet aws.endpoint.rds.example 3306
The Database has a security group which has opened up port 3306 to the world. But I still cannot connect even from an EC2 instance in the same VPC.
What am I missing?
I opened up the security rules for everything from everything and I still cannot connect from EC2 to RDS.
At this point it should be working.
Last edited: