Win a copy of Zero to AI - A non-technical, hype-free guide to prospering in the AI era this week in the Artificial Intelligence and Machine Learning forum!
  • Post Reply Bookmark Topic Watch Topic
  • New Topic
programming forums Java Mobile Certification Databases Caching Books Engineering Micro Controllers OS Languages Paradigms IDEs Build Tools Frameworks Application Servers Open Source This Site Careers Other all forums
this forum made possible by our volunteer staff, including ...
Marshals:
  • Campbell Ritchie
  • Liutauras Vilda
  • Paul Clapham
  • Bear Bibeault
  • Jeanne Boyarsky
Sheriffs:
  • Ron McLeod
  • Tim Cooke
  • Devaka Cooray
Saloon Keepers:
  • Tim Moores
  • Tim Holloway
  • Jj Roberts
  • Stephan van Hulst
  • Carey Brown
Bartenders:
  • salvin francis
  • Scott Selikoff
  • fred rosenberger

Changing database via DNS Cname adjustment?

 
Ranch Hand
Posts: 31
1
  • Mark post as helpful
  • send pies
  • Quote
  • Report post to moderator
Problem/Question

"Application developers need to update their connection strings to point to the new server, and your customers need to know the new server address as well."

I have a desktop software. This java software has the following logic:

1-User inserts username and password. He presses "login" button.The data is then sent to a web server for validation.

2-In case of success, a JSON is sent back to the java app with the database url, username, password and most importantly THE SCHEMA etc. Note that, while the server IP is normally the same, the schema changes, thats why the JSON sents the correct schema URL for the client.

3-The java app then uses information from the JSON to connect to the MySQL directly.

Thats how it works. However, Theres a problem:
When the software was installed, I had to ask the IT of a few companies  to make sure the mysql address, which is typically the same, to be allowed through the firewall.
And now, we are currently in need of changing our current database from Hosting X to Hosting Y.

So basically it falls to this:
If I want to move a database from one server to another, or stand up a new server and move everything over to it, I will have to ask each IT to allow the new IP on their firewalls.


Proposed Solution

Researching, Ive come up with a solution. Im not sure its valid So thats why I came here in the first place heh.

So here's the thing.

On step 2, described above, the JSON sends the database URL like this:

jdbc:mysql://192.X.X.X:3306/ACME_SCHEMA1

Where X was a number but Ive just redacted for the topic.

The solution is, for the JSON to deliver this instead:


jdbc:mysql://db.acme.com.br:3306/ACME_SCHEMA1


By doing that, I can change the Register of db.acme.com.br from hg.acme.com.br TO aws.acme.com.br.

And I can just ask every IT to allow db.acme.com.br in their firewalls. So whenever I change databases, their firewall wont disrupt the connection.

Will this work? I know its not perfect but im working with a Legacy software so the structure has to make do.

Thanks a lot!






References:


https://www.techrepublic.com/blog/data-center/use-the-dns-cname-for-database-connectivity/

https://port1433.com/2016/08/03/using-dns-aliases-to-manage-database-connections/

https://coderanch.com/t/731125/engineering/Encrypt-JAVA-jasypt-Decrypt-PHP
 
Saloon Keeper
Posts: 22634
153
Android Eclipse IDE Tomcat Server Redhat Java Linux
  • Mark post as helpful
  • send pies
  • Quote
  • Report post to moderator
Couple of things here. Unless your webapp is a database editor, you generally should not be connecting to a different database for each user. More commonly, if multiple client organizations are going to use the same webapp, you'd either create a separate webapp instance for each client and thus each webapp connects to a statically-referenced database OR you'd design your schema so that the client ID is part of the primary key (using compound keys) and keep everything in one database.  The first solution tends to be more mahine overhead, but the schema is simpler and there's no danger of cross-client data leakage. The second approach is likely to be less overhead but it does complicate the database logic.

Als, it sounds like you are not using the JEE standard container-managed security system. In which case odds are extremely high you could be hacked quickly and easily, Based on a depressingly-high sample of systems that I and others here have seen. If at all possible, use JEE's own security. I've never heard of anyone breaking it. Plus it's built into the JEE API.

DNS is the phonebook of the Internet. All a CNAME does is map a fully-qualified domain name (FQDN) to a specific IPv4 and/or IPV6 address(es). You can change those target addresses at any time, although it can take some time before other users see the new address(es). If you're using a cloud provider, they'll usually also provide DNS services. Note that DNS doesn't define ports, only addresses. Port numbers use well-known port numbers or URL overrides.

It is extremely bad practice to expose a database over the open Internet. The infamous SQL Slammer attack on Microsoft SQL Server invaded innumerable Windows machines, including some that were serving as the controllers for cashpoint (ATM) machines. Plus network latency adds a LOT of overhead. If at all possible, keep the database machine on the same LAN as the webapp server(s) that it supports. Better yet, keep them talking on a VPN. Cloud providers will offer VPNs that isolate you not only from Internet attack, but also from other users in the cloud. You can even run multiple VPNs to isolate different workflows within your organization. The cloud provider will offer internal DNS for the VPN so that you can keep the same machine names and have the flexibility to adjust the network topology.

 
I've never won anything before. Not even a tiny ad:
the value of filler advertising in 2020
https://coderanch.com/t/730886/filler-advertising
reply
    Bookmark Topic Watch Topic
  • New Topic