The AWS Advanced JDBC Driver leverages community JDBC drivers and enables support of AWS and Aurora functionalities. Currently, the PostgreSQL JDBC Driver, MySQL JDBC Driver, and MariaDB JDBC Driver are supported. The JDBC Wrapper also supports connection pooling.
It is possible to use the AWS JDBC Driver with plain RDS databases, but individual features may or may not be compatible. For example, failover handling and enhanced failure monitoring are not compatible with plain RDS databases and the relevant plugins must be disabled. Plugins can be enabled or disabled as seen in the Connection Plugin Manager Parameters section. Please note that some plugins have been enabled by default. Plugin compatibility can be verified in the plugins table.
The AWS JDBC Driver uses the protocol prefix jdbc:aws-wrapper:
. Internally, the JDBC Wrapper will replace this protocol prefix with jdbc:
, making the final protocol jdbc:aws-wrapper:{suffix}
where suffix
is specific to the desired underlying protocol. For example, to connect to a PostgreSQL database, you would use the protocol jdbc:aws-wrapper:postgresql:
, and inside the AWS JDBC Driver, the final protocol that will be used to connect to a database will be jdbc:postgresql:
.
To get a connection from the AWS JDBC Driver, the user application can either connect with a DriverManager or with a DataSource.
The process of getting a connection with a DriverManager will remain the same as with other JDBC Drivers; this example demonstrates establishing a connection with the PostgreSQL JDBC driver. Note that when connection properties are configured in both the connection string and with a Properties object, the connection string values will take precedence.
Establishing a connection with a DataSource may require some additional steps. For detailed information and examples, review the Datasource documentation.
It is recommended that user applications use different settings for connections or connection pools that execute queries of varying lengths. Long and short running queries have different preferred settings. For example, if the network timeout is set to 1 minute, given an application that executes both short running (~5 seconds) and long running (~1 minute) queries, the user would be waiting a large amount of time for the short running queries to time out. Alternatively, if the timeout is set to 5 seconds, the user would experience large numbers of false negatives in which the long queries are consistently failing due to the timeout.
Note: User applications with queries of varying lengths should also take into consideration any plugin configuration parameters that could be utilized to facilitate the needs of the application.
The JDBC Wrapper can be used with different frameworks and tools. More details for some frameworks can be found here.
There are multiple ways to enable logging when using the AWS JDBC Driver, some ways include:
- using the built-in Java Util Logger library
- using an external logger
To enable logging with the Java Util Logger library to log information, you can use either the .properties
file or the wrapperLoggerLevel
connection parameter:
- Create a
.properties
file and configure the logging level. - Specify the
.properties
file with thejava.util.logging.config.file
option; for example,-Djava.util.logging.config.file=absolute\path\to\logging.properties
.
An example .properties
file is as follows:
# Possible values for log level (from most detailed to less detailed): FINEST, FINER, FINE, CONFIG, INFO, WARNING, SEVERE
.level=INFO
handlers=java.util.logging.ConsoleHandler
java.util.logging.ConsoleHandler.level=ALL
software.amazon.jdbc.Driver.level=FINER
software.amazon.jdbc.plugin.level=FINER
The AWS JDBC Driver also has a parameter, wrapperLoggerLevel
, to configure the logging level.
final Properties properties = new Properties();
properties.setProperty("wrapperLoggerLevel", "finest");
Connection conn = DriverManager.getConnection(CONNECTION_STRING, properties);
The two methods above are more suitable for simple Java applications that do not have a 3rd party logging library configured. If you are using the AWS JDBC Driver with Spring or Spring Boot, you can enable logging by adding the following to your configuration file.
For application.yml
:
logging:
level:
software.amazon.jdbc: TRACE
For application.properties
:
logging.level.software.amazon.jdbc=trace
These parameters are applicable to any instance of the AWS JDBC Driver.
Parameter | Value | Required | Description | Default Value |
---|---|---|---|---|
wrapperLoggerLevel |
String |
No | Logger level of the AWS JDBC Driver. If it is used, it must be one of the following values: OFF , SEVERE , WARNING , INFO , CONFIG , FINE , FINER , FINEST , ALL . |
null |
database |
String |
No | Database name. | null |
user |
String |
No | Database username. | null |
password |
String |
No | Database password. | null |
wrapperDialect |
String |
No | Please see this page on database dialects, and whether you should include it. | null |
wrapperLogUnclosedConnections |
Boolean |
No | Allows the AWS JDBC Driver to capture a stacktrace for each connection that is opened. If the finalize() method is reached without the connection being closed, the stacktrace is printed to the log. This helps developers to detect and correct the source of potential connection leaks. |
false |
loginTimeout |
Integer |
No | Login timeout in milliseconds. | null |
connectTimeout |
Integer |
No | Socket connect timeout in milliseconds. | null |
socketTimeout |
Integer |
No | Socket timeout in milliseconds. | null |
tcpKeepAlive |
Boolean |
No | Enable or disable TCP keep-alive probe. | false |
targetDriverAutoRegister |
Boolean |
No | Allows the AWS JDBC Driver to register a target driver based on wrapperTargetDriverDialect configuration parameter or, if it's missed, on a connection url protocol. |
true |
transferSessionStateOnSwitch |
Boolean |
No | Enables transferring the session state to a new connection. | true |
resetSessionStateOnClose |
Boolean |
No | Enables resetting the session state before closing connection. | true |
rollbackOnSwitch |
Boolean |
No | Enables rolling back a current transaction, if any in effect, before switching to a new connection. | true |
awsProfile |
String |
No | Allows users to specify a profile name for AWS credentials. This parameter is used by plugins that require AWS credentials, like the IAM Authentication Connection Plugin and the AWS Secrets Manager Connection Plugin. | null |
enableGreenNodeReplacement |
Boolean |
No | Enables replacing a green node host name with the original host name when the green host DNS doesn't exist anymore after a blue/green switchover. Refer to Overview of Amazon RDS Blue/Green Deployments for more details about green and blue nodes. | false |
The AWS JDBC Driver uses plugins to execute JDBC methods. You can think of a plugin as an extensible code module that adds extra logic around any JDBC method calls. The AWS JDBC Driver has a number of built-in plugins available for use.
Plugins are loaded and managed through the Connection Plugin Manager and may be identified by a String
name in the form of plugin code.
Parameter | Value | Required | Description | Default Value |
---|---|---|---|---|
wrapperPlugins |
String |
No | Comma separated list of connection plugin codes. Example: failover,efm2 |
auroraConnectionTracker,failover,efm2 |
autoSortWrapperPluginOrder |
Boolean |
No | Allows the AWS JDBC Driver to sort connection plugins to prevent plugin misconfiguration. Allows a user to provide a custom plugin order if needed. | true |
wrapperProfileName |
String |
No | Driver configuration profile name. Instead of listing plugin codes with wrapperPlugins , the driver profile can be set with this parameter. Example: See below. |
null |
To use a built-in plugin, specify its relevant plugin code for the wrapperPlugins
.
The default value for wrapperPlugins
is auroraConnectionTracker,failover,efm2
. These 3 plugins are enabled by default. To read more about these plugins, see the List of Available Plugins section.
To override the default plugins, simply provide a new value for wrapperPlugins
.
For instance, to use the IAM Authentication Connection Plugin and the Failover Connection Plugin:
properties.setProperty("wrapperPlugins", "iam,failover");
❗NOTE: The plugins will be initialized and executed in the order they have been specified.
Provide an empty string to disable all plugins:
properties.setProperty("wrapperPlugins", "");
The Wrapper behaves like the target driver when no plugins are used.
An alternative way of loading plugins and providing configuration parameters is to use a configuration profile. You can create custom configuration profiles that specify which plugins the AWS JDBC Driver should load. After creating the profile, set the wrapperProfileName
parameter to the name of the created profile.
This method of loading plugins will most often be used by those who require custom plugins that cannot be loaded with the wrapperPlugins
parameter, or by those who are using preset configurations.
Besides a list of plugins to load and configuration properties, configuration profiles may also include the following items:
- Database Dialect
- Target Driver Dialect
- a custom exception handler
- a custom connection provider
The following example creates and sets a configuration profile:
// Create a new configuration profile with name "testProfile"
ConfigurationProfileBuilder.get()
.withName("testProfile")
.withPluginFactories(Arrays.asList(
FailoverConnectionPluginFactory.class,
HostMonitoringConnectionPluginFactory.class,
CustomConnectionPluginFactory.class))
.buildAndSet();
// Use the configuration profile "testProfile"
properties.setProperty("wrapperProfileName", "testProfile");
Configuration profiles can be created based on other existing configuration profiles. Profile names are case sensitive and should be unique.
// Create a new configuration profile with name "newProfile" based on "existingProfileName"
ConfigurationProfileBuilder.from("existingProfileName")
.withName("newProfileName")
.withDialect(new CustomDatabaseDialect())
.buildAndSet();
// Delete configuration profile "testProfile"
DriverConfigurationProfiles.remove("testProfile");
The AWS JDBC Driver team has gathered and analyzed various user scenarios to create commonly used configuration profiles, or presets, for users. These preset configuration profiles are optimized, profiled, verified and can be used right away. Users can create their own configuration profiles based on the built-in presets as shown above. More details could be found at the Configuration Presets page.
In some use cases you may need to define a specific configuration for a new driver connection before your application can use it. For instance:
- you might need to run some initial SQL queries when a connection is established, or;
- you might need to check for some additional conditions to determine the initialization configuration required for a particular connection.
The AWS JDBC Driver allows specifying a special function that can initialize a connection. It can be done with ConnectionProviderManager.setConnectionInitFunc
method. The resetConnectionInitFunc
method is also available to remove the function.
The initialization function is called for all connections, including connections opened by the internal connection pools (see Using Read Write Splitting Plugin and Internal Connection Pooling). This helps user applications clean up connection sessions that have been altered by previous operations, as returning a connection to a pool will reset the state and retrieving it will call the initialization function again.
Warning
Executing CPU and network intensive code in the initialization function may significantly impact the AWS JDBC Driver's overall performance.
ConnectionProviderManager.setConnectionInitFunc((connection, protocol, hostSpec, props) -> {
// Set custom schema for connections to a test-database
if ("test-database".equals(props.getProperty("database"))) {
connection.setSchema("test-database-schema");
}
});
The AWS JDBC Driver has several built-in plugins that are available to use. Please visit the individual plugin page for more details.
Plugin name | Plugin Code | Database Compatibility | Description | Additional Required Dependencies |
---|---|---|---|---|
Failover Connection Plugin | failover |
Aurora, RDS Multi-AZ DB Cluster | Enables the failover functionality supported by Amazon Aurora clusters and RDS Multi-AZ DB clusters. Prevents opening a wrong connection to an old writer node dues to stale DNS after failover event. This plugin is enabled by default. | None |
Failover Connection Plugin v2 | failover2 |
Enables the failover functionality supported by Amazon Aurora clusters. Prevents opening a wrong connection to an old writer node due to stale DNS after failover event. It is functionally the same as the first version of the Failover Connection Plugin (failover ) and uses similar configuration parameters. |
None | |
Host Monitoring Connection Plugin | efm |
Aurora, RDS Multi-AZ DB Cluster | Enables enhanced host connection failure monitoring, allowing faster failure detection rates. This plugin is enabled by default. | None |
Host Monitoring Connection Plugin v2 | efm2 |
Aurora, RDS Multi-AZ DB Cluster | Enables enhanced host connection failure monitoring, allowing faster failure detection rates. This plugin is an alternative implementation for host health status monitoring. It is functionally the same as the efm plugin and uses the same configuration parameters. |
None |
Data Cache Connection Plugin | dataCache |
Any database | Caches results from SQL queries matching the regular expression specified in the dataCacheTriggerCondition configuration parameter. |
None |
Execution Time Connection Plugin | executionTime |
Any database | Logs the time taken to execute any JDBC method. | None |
Log Query Connection Plugin | logQuery |
Any database | Tracks and logs the SQL statements to be executed. Sometimes SQL statements are not passed directly to the JDBC method as a parameter, such as executeBatch(). Users can set enhancedLogQueryEnabled to true , allowing the JDBC Wrapper to obtain SQL statements via Java Reflection. |
None |
IAM Authentication Connection Plugin | iam |
Aurora, RDS1 | Enables users to connect to their Amazon Aurora clusters using AWS Identity and Access Management (IAM). | AWS Java SDK RDS v2.x |
AWS Secrets Manager Connection Plugin | awsSecretsManager |
Any database | Enables fetching database credentials from the AWS Secrets Manager service. | Jackson Databind AWS Secrets Manager |
Federated Authentication Plugin | federatedAuth |
Aurora, RDS2 | Enables users to authenticate using Federated Identity and then connect to their Amazon Aurora Cluster using AWS Identity and Access Management (IAM). | |
Okta Authentication Plugin | okta |
Aurora, RDS2 | Enables users to authenticate using Federated Identity and then connect to their Amazon Aurora Cluster using AWS Identity and Access Management (IAM). | |
Aurora Stale DNS Plugin | auroraStaleDns |
Aurora | Prevents incorrectly opening a new connection to an old writer node when DNS records have not yet updated after a recent failover event. failover plugin, auroraStaleDns plugin doesn't implement failover support itself. It helps to eliminate opening wrong connections to an old writer node after cluster failover is completed. failover plugin so you can omit using both plugins at the same time. |
None |
Aurora Connection Tracker Plugin | auroraConnectionTracker |
Aurora, RDS Multi-AZ DB Cluster | Tracks all the opened connections. In the event of a cluster failover, the plugin will close all the impacted connections to the node. This plugin is enabled by default. | None |
Driver Metadata Connection Plugin | driverMetaData |
Any database | Allows user application to override the return value of DatabaseMetaData#getDriverName |
None |
Read Write Splitting Plugin | readWriteSplitting |
Aurora | Enables read write splitting functionality where users can switch between database reader and writer instances. | None |
Developer Plugin | dev |
Any database | Helps developers test various everyday scenarios including rare events like network outages and database cluster failover. The plugin allows injecting and raising an expected exception, then verifying how applications handle it. | None |
Aurora Initial Connection Strategy | initialConnection |
Aurora | Allows users to configure their initial connection strategy to reader cluster endpoints. | None |
Limitless Connection Plugin | limitless |
Aurora | Enables client-side load-balancing of Transaction Routers on Amazon Aurora Limitless Databases . | None |
❗NOTE: To see information logged by plugins such as DataCacheConnectionPlugin
and LogQueryConnectionPlugin
,
see the Logging section.
In addition to the built-in plugins, you can also create custom plugins more suitable for your needs. For more information, see Custom Plugins.
If there is an unreleased feature you would like to try, it may be available in a snapshot build of the driver. Snapshot builds can be found here. To use a snapshot, find the desired .jar
file, which will be named aws-advanced-jdbc-wrapper-<version>-<date>-<time>-<snapshot-number>.jar
, and add it to your project as a dependency.
<dependencies>
<dependency>
<groupId>software.amazon.jdbc</groupId>
<artifactId>aws-advanced-jdbc-wrapper</artifactId>
<version>2.5.3-SNAPSHOT</version>
<scope>system</scope>
<systemPath>path-to-snapshot-jar</systemPath>
</dependency>
</dependencies>
dependencies {
implementation(files("path-to-snapshot-jar"))
}
The Amazon Web Services (AWS) JDBC Driver for MySQL allows an application to take advantage of the features of clustered MySQL databases. It is based on and can be used as a drop-in compatible for the MySQL Connector/J driver, and is compatible with all MySQL deployments.
The AWS JDBC Driver has the same functionalities as the AWS JDBC Driver for MySQL, as well as additional features such as support for Read/Write Splitting. This section highlights the steps required to migrate from the AWS JDBC Driver for MySQL to the AWS JDBC Driver.
- Update the driver class name from
software.aws.rds.jdbc.mysql.Driver
tosoftware.amazon.jdbc.Driver
- Update the URL JDBC protocol from
jdbc:mysql:aws:
tojdbc:aws-wrapper:mysql
- Update the plugin configuration parameter from
connectionPluginFactories
to wrapperPlugins. See more details below.
In the AWS JDBC Driver for MySQL, plugins are set by providing a list of connection plugin factories:
"jdbc:mysql:aws://db-identifier.cluster-XYZ.us-east-2.rds.amazonaws.com:3306/db?connectionPluginFactories=com.mysql.cj.jdbc.ha.plugins.AWSSecretsManagerPluginFactory,com.mysql.cj.jdbc.ha.plugins.failover.FailoverConnectionPluginFactory,com.mysql.cj.jdbc.ha.plugins.NodeMonitoringConnectionPluginFactory"
In the AWS JDBC Driver, plugins are set by specifying the plugin codes:
"jdbc:aws-wrapper:mysql://db-identifier.XYZ.us-east-2.rds.amazonaws.com:3306/db?wrapperPlugins=iam,failover"
To see the list of available plugins and their associated plugin code, see the documentation.
The AWS JDBC Driver also provides
the Read-Write Splitting plugin,
this plugin allows the application to switch the connections between writer and reader instances by calling
the Connection#setReadOnly
method.
public static void main(String[] args) throws SQLException {
final Properties properties = new Properties();
properties.setProperty("useAwsIam", "true");
properties.setProperty("user", "foo");
try (final Connection conn = DriverManager.getConnection(
"jdbc:mysql:aws://db-identifier.cluster-XYZ.us-east-2.rds.amazonaws.com:3306", properties);
final Statement statement = conn.createStatement();
final ResultSet result = statement.executeQuery("SELECT 1")) {
System.out.println(Util.getResult(result));
}
}
public static void main(String[] args) throws SQLException {
final Properties properties = new Properties();
properties.setProperty("wrapperPlugins", "iam");
properties.setProperty("user", "iam_user");
try (Connection conn = DriverManager.getConnection("jdbc:aws-wrapper:mysql://db-identifier.XYZ.us-east-2.rds.amazonaws.com:3306", properties);
Statement statement = conn.createStatement();
ResultSet result = statement.executeQuery("SELECT 1")) {
System.out.println(Util.getResult(result));
}
}
The IAM Authentication Plugin in the AWS JDBC Driver has extra parameters to support custom endpoints. For more information, see How do I use IAM with the AWS Advanced JDBC Driver?
The Secrets Manager Plugin in both the AWS JDBC Driver for MySQL and the AWS JDBC Driver uses the same configuration
parameters. To migrate to the AWS JDBC Driver, simply change
the connectionPluginFactories=com.mysql.cj.jdbc.ha.plugins.AWSSecretsManagerPluginFactory
parameter
to wrapperPlugins=awsSecretsManager
public static void main(String[] args) throws SQLException {
final Properties properties = new Properties();
properties.setProperty("connectionPluginFactories", AWSSecretsManagerPluginFactory.class.getName());
properties.setProperty("secretsManagerSecretId", "secretId");
properties.setProperty("secretsManagerRegion", "us-east-2");
try (final Connection conn = DriverManager.getConnection(
"jdbc:mysql:aws://db-identifier.cluster-XYZ.us-east-2.rds.amazonaws.com:3306", properties);
final Statement statement = conn.createStatement();
final ResultSet result = statement.executeQuery("SELECT 1")) {
System.out.println(Util.getResult(result));
}
}
public static void main(String[] args) throws SQLException {
final Properties properties = new Properties();
properties.setProperty("wrapperPlugins", "awsSecretsManagers");
properties.setProperty("secretsManagerSecretId", "secretId");
properties.setProperty("secretsManagerRegion", "us-east-2");
try (Connection conn = DriverManager.getConnection("jdbc:aws-wrapper:mysql://db-identifier.XYZ.us-east-2.rds.amazonaws.com:3306", properties);
Statement statement = conn.createStatement();
ResultSet result = statement.executeQuery("SELECT 1")) {
System.out.println(Util.getResult(result));
}
}
To enable logging in the AWS JDBC Driver, change the logger=StandardLogger
parameter to wrapperLoggerLevel=FINEST