To manage a database, you can either use an existing instance or add a new instance.
Before You Begin
- Configure the permissions to access AWS resources. Download the amazon_rds_dumpbased_backup_restore_permissions.json file and use it on the AWS command line to apply all the permissions.
Procedure
-
From the Command Center navigation pane, go to Protect > Databases.
The Overview page appears.
-
In the upper-right area of the page, click Add instance, and then select Cloud database service.
The Vendor page appears.
-
Select Amazon Web Services, and then click NEXT.
The Select A Database Service page appears.
-
Select RDS (Export), and then click NEXT.
The Select Database page appears.
-
Select Aurora MySQL, and then click NEXT.
The Configure permissions pages appears.
-
Select the confirmation checkbox, and then click Next.
-
From the Region list, select a region where the Amazon database is located, and then click next.
The Backup Gateway page appears.
-
From the Backup gateways list, select an existing backup gateway or add a new one using AWS Cloud formation Stacks, and then click Next.
The Configure cloud storage for added protection page appears.
-
From the Storage location list, select a storage location of primary copy.
-
Optional: Move the Secondary copy toggle key to the right for long term retention of your data.
-
Click Next.
The Select A Plan page appears.
-
From the list of backup plans, select a backup plan, and then click NEXT.
The Cloud Account page appears.
-
From the Cloud account list, select an existing AWS account or create a new account, and then click NEXT.
To configure a new cloud account, complete the following steps:
-
Click +.
The Add cloud account page appears.
-
In the Name box, type the name for the account.
-
In the Regions box, type the region where the Amazon RDS instance is located.
-
Enter the host or account authentication information:
-
IAM role: To authenticate the Amazon RDS cloud account, select this option.
-
STS assume role with IAM policy: To authenticate the Amazon RDS cloud account using a security token service (STS) assume role, select this option, and from the Credentials list, select the credential for the Amazon RDS cloud account.
To apply an IAM policy for the hypervisor when you use this authentication method, you can attach an IAM policy with sts:AssumeRole to the access node in the AWS Console. For more information about STS role authentication, see Configuring STS Role Authentication.
-
Access and secret key: To authenticate the Amazon RDS cloud account using an access key and a secret key, select this option, and from the Credentials list, select the credential for the Amazon RDS cloud account.
-
-
From the Access nodes list, select the access nodes to use for the instance.
-
Click SAVE.
-
-
Click NEXT.
The Backup content page appears.
-
From the Instance name list, select an instance.
-
Under the Connection details section, enter the following details:
-
From the Credential list, select a saved credential or add a new credential.
-
To specify the endpoint, in the Endpoint box, enter the name of the endpoint to connect to the database instance.
The endpoint value is automatically discovered and displayed, based on the instance you previously selected. By default, the discovered endpoint is the cluster endpoint and is used for both read-only access (backups) and write access (restores). For more information, refer to the Amazon Aurora endpoint connections documentation.
Note
For Amazon Aurora Global Database cluster, enter the endpoint name of the global writer.
-
-
Click NEXT.
A summary page is displayed to show the instance information.
-
Click FINISH.
Results
The new instance contains a default database group. The default database group includes all the data in the Amazon Aurora MySQL database. You cannot delete the default database group.