Connecting to an RDS database can be done with the standard Smile CDR database connection configuration, using the username and password, while pointing to the RDS instance. However, most installations want to use AWS-specific authentication methods. This can be accomplished via the AWS Advanced JDBC Driver.
As of 2025.05.R01, Smile CDR now supports usage of the AWS Advanced JDBC Driver. This driver allows straightforward connections to AWS RDS databases. In previous versions, a patchwork of libraries were used to support this behavior. These have all been replaced with the AWS Advanced JDBC Driver. It is enabled by adding aws-wrapper
into the JDBC prefix, so instead of using jdbc:postgresql://
, you would use jdbc:aws-wrapper:postgresql://
.
This driver is primarily configured via the JDBC URL. This means that plugins, configuration options, secret names, usernames, and passwords can all be injected via the JDBC URL.
Any configuration set in the JDBC URL will take precedence over the settings set in Smile CDR. For example, if you set ?user=myuser
in the JDBC URL, and then set db.username=otheruser
, the resolved username will be myuser
.
If you want to use these features, it is recommended to read the official documentation.
The remaining sections in this page cover common examples of how to connect to an RDS database using various authentication methods.
Since you can configure the username and password directly in the JDBC URL, they can be set in the db.url
property, and omitted from the db.username
and db.password
properties. The following is an example configuration which does this.
module.clustermgr.type =CLUSTER_MGR
module.clustermgr.config.db.driver =POSTGRES_9_4
module.clustermgr.config.db.url =jdbc:aws-wrapper:postgresql://my-rds-url.us-east-1.rds.amazonaws.com:5432/cdr?user=myuser&password=somepassword
module.clustermgr.config.db.username =
module.clustermgr.config.db.password =
Let's analyze the JDBC URL: jdbc:aws-wrapper:postgresql://my-rds-url.us-east-1.rds.amazonaws.com:5432/cdr?user=myuser&password=somepassword
It is also possible to use this driver to connect to an AWS RDS database using AWS IAM authentication.
In versions before 2025.05.R01, the Use IAM Authentication
setting had to be enabled. This setting is now deprecated, in favor of the preferred JDBC URL approach. The following is an example of such a configuration:
module.clustermgr.type =CLUSTER_MGR
module.clustermgr.config.db.driver =POSTGRES_9_4
module.clustermgr.config.db.url =jdbc:aws-wrapper:postgresql://my-rds-url.us-east-1.rds.amazonaws.com:5432/cdr?wrapperPlugins=iam&user=rds-tester
module.clustermgr.config.db.username =
module.clustermgr.config.db.password =
Let's analyze the JDBC URL: jdbc:aws-wrapper:postgresql://my-rds-url.us-east-1.rds.amazonaws.com:5432/cdr?wrapperPlugins=iam&user=rds-tester
For IAM Authentication, the DefaultCredentialProviderChain is used. Please visit that link to read about all the ways to provide credentials to the driver wrapper.
Since IAM Authentication to RDS also requires a region, the region is obtained using the DefaultAwsRegionProviderChain. This means that the region is obtained following the rules of the default region provider chain. Please visit that link to read about all the ways to provide a region to the SDK. The region can also be set by setting the JDBC URL property iamRegion
.
Since IAM Authentication tokens have a lifetime of about 15 minutes, and Smile CDR uses a connection pool, you should set the Connection Max Lifetime setting to something less than 15 minutes. This can be set manually by using the JDBC URL property iamExpiration
.
The AWS Advanced JDBC Driver can be configured to pull authentication credentials from AWS Secrets Manager.
In versions before 2025.05.R01, the Secrets Manager setting had to be enabled, and the secret name had to be set as the db.username
field. This setting is now deprecated, in favor of the preferred JDBC URL approach. The following is an example of such a configuration:
module.clustermgr.type =CLUSTER_MGR
module.clustermgr.config.db.driver =POSTGRES_9_4
module.clustermgr.config.db.url =jdbc:aws-wrapper:postgresql://my-rds-url.cv6u6ikc8x5f.us-east-1.rds.amazonaws.com:5432/cdr?wrapperPlugins=awsSecretsManager&secretsManagerSecretId=rds!my-cluster-d7d541ea-3bf2-1103-b50d-7a634fcea6ad&secretsManagerRegion=us-east-1
module.clustermgr.config.db.username =
module.clustermgr.config.db.password =
Let's analyze the JDBC URL: jdbc:aws-wrapper:postgresql://my-rds-url.cv6u6ikc8x5f.us-east-1.rds.amazonaws.com:5432/cdr?wrapperPlugins=awsSecretsManager&secretsManagerSecretId=rds!my-cluster-d7d541ea-3bf2-1103-b50d-7a634fcea6ad&secretsManagerRegion=us-east-1
When encountering issues with AWS RDS connectivity, it's helpful to enable detailed logging from the AWS Advanced JDBC Driver. This can be done by setting the wrapperLoggerLevel
parameter in your JDBC URL. Official documentation for it can be found here, but the options are provided below for reference.
Add the wrapperLoggerLevel
parameter to your JDBC URL with one of the following values (from least to most verbose):
OFF
- No logging (default)SEVERE
- Only severe error messagesWARNING
- Warning messages and severe errorsINFO
- Basic information, warnings, and errorsCONFIG
- Configuration informationFINE
- Detailed debug informationFINER
- More detailed debug informationFINEST
- Most detailed trace informationALL
- All logging information (highest verbosity)Example:
module.clustermgr.config.db.url=jdbc:aws-wrapper:postgresql://my-rds-url.us-east-1.rds.amazonaws.com:5432/cdr?wrapperPlugins=iam&wrapperLoggerLevel=FINE&user=rds-tester
IAM Authentication Failures
rds-db:connect
permission for the specific database resourceiamRegion
Secrets Manager Issues
secretsmanager:GetSecretValue
permissionConnection Pool Timeout Issues
connection-max-lifetime-millis
setting is less than 15 minutes (900,000ms)SSL/TLS Issues
ssl=true
to your JDBC URL if necessaryBoth AWS IAM and AWS Secrets Manager provide secure methods for connecting to RDS databases, but they serve different use cases.
IAM Authentication is generally preferred when:
AWS Secrets Manager is generally preferred when:
The limitations are the same as those defined by the AWS Advanced JDBC Driver.