This site will be decommissioned on January 30th 2025. After that date content will be available at techdocs.broadcom.com.

This topic tells you how to enable service-gateway access.

Service-gateway access enables external clients to connect to a MySQL service. The clients are typically apps running external to the foundation, apps on a different foundation, and management tools such as MySQL Workbench.

For a more detailed overview, see About Service-Gateway access.

To enable service-gateway access for an on-demand offering:

  1. Activate TCP routing using the TAS for VMs tile.
  2. Configure the firewall to allow incoming traffic to the TCP router.
  3. Configure the load balancer in the IaaS to redirect traffic to the TCP router.
  4. Create a DNS record that maps to the load balancer.
  5. Activate service-gateway access.

VMware recommends that you configure Transport Layer Security (TLS) alongside service-gateway access to prevent man-in-the-middle attacks. For instructions on how to configure TLS, see Configure security.

Activate TCP Routing using the TAS for VMs tile

TCP routing is deactivated by default. To activate TCP routing:

  1. Go to the Networking pane of the TAS for VMs tile.
  2. Under Enable TCP requests to apps through specific ports on the TCP router, select Enable TCP routing.
  3. For TCP routing ports, enter one or more ports to which the load balancer forwards requests. For example, 1024 for a single port or 1024–1123 for a range of ports.
  4. Go back to Tanzu Operations Manager Installation Dashboard > Review Pending Changes.
  5. Click Apply Changes for the TAS for VMs tile to create the TCP router.
  6. From the status tab of the TAS for VMs tile, record the cloud identity (CID) of the TCP router. alt-text=Ops Manager UI with the Status tab selected.

Configure the firewall to allow incoming traffic to the TCP Router

These are the steps you take to allow traffic to the TCP router depend on your IaaS:

  1. Allow incoming traffic to the TCP router VM created in Activate TCP Routing using the TAS for VMs tile.

    For more detailed information, see the documentation for your IaaS.

Configure the Load Balancer in the IaaS to redirect traffic to the TCP Router

To configure the load balancer:

  1. Use the IaaS console and the CID that you recorded earlier to find the VM that runs the TCP router.
  2. Create an external TCP load balancer that points to the VM running the TCP router.
  3. Configure a distinct external port range that does not overlap with any of the following:

    For example, if your TCP routing port range is 1024–1123, and ports 1124–1223 are reserved for Tanzu RabbitMQ service instances, then your load balancer port range for service gateway must not overlap 1024-1223.

    Each VMware SQL with MySQL for TAS service instance using service-gateway access requires a unique port. Ensure that the port range configured has enough capacity to accommodate all the service instances that you need. The start port and the end port are both inclusive.

    alt-text=Service Gateway port ranges: Traffic flows to the apps from the Load Balancer
using ports in the TAS LB port range through the TCP Router using ports in the TAS TCP port range.
Traffic flows to the MySQL service instances from the Load Balancer using ports in the Service
Gateway LB port range through the TCP Router using ports in the Service Gateway TCP port
range.

  4. Record this port range.

Create a DNS record that maps to the Load Balancer

To create a DNS record and prepare to map it:

  1. Following the documentation for your IaaS, create a new DNS record of type A that maps to the external IP address of the load balancer created in Configure the Load Balancer in the IaaS to redirect traffic to the TCP Router.
  2. Record the domain used for this DNS record.

Enable Service-Gateway access

When service-gateway access is activated, all developers have the ability to create a service instance that is available to apps outside the foundation.

For VMware SQL with MySQL for TAS, service-gateway access is enabled globally. Access is not tied to certain service plans as in Tanzu RabbitMQ.

To configure service-gateway access for the foundation:

  1. Go to the Settings pane in the VMware SQL with MySQL for TAS tile.

  2. Under Enable off-platform access of MySQL service instances, click Enabled.

    alt-text=Example of the Settings pane. Enabled is selected to reveal the External TCP Domain field where the text tcp.turtlegreen.cf-app.com is entered and the External TCP Port Range field where the text 1024-1123 is entered.

    This activates the feature and makes the domain and port range fields visible.

  3. Configure the fields as follows:

    Field Instructions
    External TCP domain Set this to the DNS entry for the external load balancer that you recorded in Create a DNS Record That Maps to the Load Balancer.
    External TCP port range Set this to the range of ports you configured for the external load balancer for MySQL service instances in Configure the Load Balancer in the IaaS to Redirect Traffic to the TCP Router.

    If service-gateway access is deactivated and then activated again, app developers must create new service keys to obtain a new set of credentials for service-gateway access.

  4. Go back to Tanzu Operations Manager Installation Dashboard > Review Pending Changes.

  5. Click Apply Changes to apply the changes to the VMware SQL with MySQL for TAS tile.

Deactivate Service-Gateway access

Note If service-gateway access is deactivated and then activated again, app developers must create new service keys to obtain a new set of credentials for service-gateway access.

To deactivate service-gateway access:

  1. Go to the Settings pane in the VMware SQL with MySQL for TAS tile.

  2. Under Enable off-platform access of MySQL service instances, click Disabled.

  3. Go back to Tanzu Operations Manager Installation Dashboard > Review Pending Changes.

  4. Click Apply Changes to apply the changes to the VMware SQL with MySQL for TAS tile.

Developer workflow

For instructions for app developers, see Create a service instance with Service-Gateway access.

check-circle-line exclamation-circle-line close-line
Scroll to top icon