It’s possible that your database instance is using outdated or weak SSL certificates for encrypted connections. Your Sources and Destinations in Streamkap may be affected if they connect to databases with weak SSL certificates. In such cases, you may see connection errors or warnings in the Streamkap UI and logs indicating SSL/TLS issues or encryption algorithm problems, such as:Documentation Index
Fetch the complete documentation index at: https://docs.streamkap.com/llms.txt
Use this file to discover all available pages before exploring further.
- “Certificate verify failed”
- “SSL handshake failed due to weak encryption algorithm”
- “Certificates do not conform to algorithm constraints”
Before You Begin
Prerequisites
- Backup: Create backups of existing certificates and database configuration
- Downtime Planning: Schedule maintenance window for certificate updates
- Certificate Preparation: Ensure new certificates are ready:
- Server certificate (
.crtor.pem) - Private key (
.keyor.pem) - CA certificate chain (optional but recommended)
- Server certificate (
- Permission Check: Verify you have necessary permissions to modify database configuration
Common Certificate Types and Their Security
| Key Type | Key Size | Hash Algorithm | Security Level | Recommendation |
|---|---|---|---|---|
| RSA | 2048-bit | SHA-256 | Good | Acceptable for most use cases |
| RSA | 4096-bit | SHA-256 | Strong | Recommended for high security |
| RSA | 1024-bit | SHA-1 | Weak | Should be upgraded |
| ECDSA | P-256 | SHA-256 | Good | Modern alternative to RSA |
| ECDSA | P-384 | SHA-384 | Strong | High security |
PostgreSQL
Check certificate usingopenssl:
Self-hosted PostgreSQL
Self-hosted PostgreSQL certificate documentation:AWS RDS PostgreSQL
AWS RDS manages certificates, so typically no action is needed. PostgreSQL on AWS RDS certificate documentation:Azure Database for PostgreSQL
Azure manages certificates, so typically no action is needed. Azure PostgreSQL certificate documentation:Google Cloud SQL PostgreSQL
Google Cloud SQL manages certificates, so typically no action is needed. Cloud SQL PostgreSQL certificate documentation:MySQL / MariaDB
Check certificate usingopenssl:
Self-hosted MySQL/MariaDB
Self-hosted MySQL/MariaDB certificate documentation:AWS RDS MySQL/MariaDB
MySQL/MariaDB on AWS RDS manages certificates, so typically no action is needed. MySQL/MariaDB on AWS RDS certificate documentation:Azure Database for MySQL
Azure manages certificates, so typically no action is needed. Azure MySQL certificate documentation:Google Cloud SQL MySQL
Google Cloud SQL manages certificates, so typically no action is needed. Cloud SQL MySQL certificate documentation:SQL Server
openssl does not work with SQL Server.- Open SQL Server Configuration Manager
- Expand SQL Server Network Configuration
- Right-click Protocols for [INSTANCE_NAME] → Properties
- Navigate to Certificate tab
- View the selected certificate from dropdown
- Click View to see certificate details (issuer, expiration, key size, signature algorithm)