Updated on 2024-04-03 GMT+08:00

Enabling or Disabling Access Control

If load balancing is enabled for a database proxy instance, the security group associated with the proxy instance does not apply. You need to use access control to grant access from specific IP addresses.

If access control is not displayed on the RDS console, the security group associated with the proxy instance is used.

Enabling Access Control

  1. Log in to the management console.
  2. Click in the upper left corner and select a region and a project.
  3. Click in the upper left corner of the page and choose Databases > Relational Database Service.
  4. On the Instances page, click the target DB instance.
  5. On the Database Proxy page, in the proxy instance information area, click in the Access Control field.
  6. Click Configure. In the displayed dialog box, set the access control mode and IP addresses or CIDR blocks.

    • Access Control: The blocklist and allowlist cannot be configured at the same time. If you switch between lists, your previously entered settings will be lost. IP addresses or CIDR blocks in the blocklist are not allowed to access proxy instances.
    • IP Address or CIDR Block: Enter valid IP addresses or CIDR blocks that meet the following requirements:
      • Each line contains an IP address or a CIDR block and ends with a line break.
      • Each IP address or CIDR block can include a description separated by a vertical bar symbol (|), for example, 192.168.10.10|RDS01. The description can include up to 50 characters but cannot contain angle brackets (<>).
      • Up to 300 IP addresses or CIDR blocks can be added.
    Figure 1 Configuring access control

Disabling Access Control

  1. Log in to the management console.
  2. Click in the upper left corner and select a region and a project.
  3. Click in the upper left corner of the page and choose Databases > Relational Database Service.
  4. On the Instances page, click the target DB instance.
  5. On the Database Proxy page, in the proxy information area, click next to the Access Control field.