Connect to TiDB with mysql2

TiDB is a MySQL-compatible database, and mysql2 is one of the most popular MySQL drivers for Ruby.

In this tutorial, you can learn how to use TiDB and mysql2 to accomplish the following tasks:

  • Set up your environment.
  • Connect to your TiDB cluster using mysql2.
  • Build and run your application. Optionally, you can find sample code snippets for basic CRUD operations.

mysql2 - 图1

Note

This tutorial works with TiDB Serverless, TiDB Dedicated, and TiDB Self-Hosted.

Prerequisites

To complete this tutorial, you need:

  • Ruby >= 3.0 installed on your machine
  • Bundler installed on your machine
  • Git installed on your machine
  • A TiDB cluster running

If you don’t have a TiDB cluster, you can create one as follows:

Run the sample app to connect to TiDB

This section demonstrates how to run the sample application code and connect to TiDB.

Step 1: Clone the sample app repository

Run the following commands in your terminal window to clone the sample code repository:

  1. git clone https://github.com/tidb-samples/tidb-ruby-mysql2-quickstart.git
  2. cd tidb-ruby-mysql2-quickstart

Step 2: Install dependencies

Run the following command to install the required packages (including mysql2 and dotenv) for the sample app:

  1. bundle install

Install dependencies for existing projects

For your existing project, run the following command to install the packages:

  1. bundle add mysql2 dotenv

Step 3: Configure connection information

Connect to your TiDB cluster depending on the TiDB deployment option you’ve selected.

  • TiDB Serverless
  • TiDB Dedicated
  • TiDB Self-Hosted
  1. Navigate to the Clusters page, and then click the name of your target cluster to go to its overview page.

  2. Click Connect in the upper-right corner. A connection dialog is displayed.

  3. Ensure the configurations in the connection dialog match your operating environment.

    • Endpoint Type is set to Public.
    • Branch is set to main.
    • Connect With is set to General.
    • Operating System matches the operating system where you run the application.
  4. If you have not set a password yet, click Generate Password to generate a random password.

  5. Run the following command to copy .env.example and rename it to .env:

    1. cp .env.example .env
  6. Edit the .env file, set up the environment variables as follows, and replace the corresponding placeholders {} with connection parameters in the connection dialog:

    1. DATABASE_HOST={host}
    2. DATABASE_PORT=4000
    3. DATABASE_USER={user}
    4. DATABASE_PASSWORD={password}
    5. DATABASE_NAME=test
    6. DATABASE_ENABLE_SSL=true

    mysql2 - 图2

    Note

    For TiDB Serverless, TLS connection MUST be enabled via DATABASE_ENABLE_SSL when using public endpoint.

  7. Save the .env file.

  8. Navigate to the Clusters page, and then click the name of your target cluster to go to its overview page.

  9. Click Connect in the upper-right corner. A connection dialog is displayed.

  10. Click Allow Access from Anywhere and then click Download CA cert to download the CA certificate.

    For more details about how to obtain the connection string, refer to TiDB Dedicated standard connection.

  11. Run the following command to copy .env.example and rename it to .env:

    1. cp .env.example .env
  12. Edit the .env file, set up the environment variables as follows, and replace the corresponding placeholders {} with connection parameters in the connection dialog:

    1. DATABASE_HOST={host}
    2. DATABASE_PORT=4000
    3. DATABASE_USER={user}
    4. DATABASE_PASSWORD={password}
    5. DATABASE_NAME=test
    6. DATABASE_ENABLE_SSL=true
    7. DATABASE_SSL_CA={downloaded_ssl_ca_path}

    mysql2 - 图3

    Note

    It is recommended to enable TLS connection when using the public endpoint to connect to a TiDB Dedicated cluster.

    To enable TLS connection, modify DATABASE_ENABLE_SSL to true and use DATABASE_SSL_CA to specify the file path of CA certificate downloaded from the connection dialog.

  13. Save the .env file.

  14. Run the following command to copy .env.example and rename it to .env:

    1. cp .env.example .env
  15. Edit the .env file, set up the environment variables as follows, and replace the corresponding placeholders {} with your own TiDB connection information:

    1. DATABASE_HOST={host}
    2. DATABASE_PORT=4000
    3. DATABASE_USER={user}
    4. DATABASE_PASSWORD={password}
    5. DATABASE_NAME=test

    If you are running TiDB locally, the default host address is 127.0.0.1, and the password is empty.

  16. Save the .env file.

Step 4: Run the code and check the result

Run the following command to execute the sample code:

  1. ruby app.rb

If the connection is successful, the console will output the version of the TiDB cluster as follows:

  1. 🔌 Connected to TiDB cluster! (TiDB version: 5.7.25-TiDB-v7.1.5)
  2. Loading sample game data...
  3. Loaded sample game data.
  4. 🆕 Created a new player with ID 12.
  5. ℹ️ Got Player 12: Player { id: 12, coins: 100, goods: 100 }
  6. 🔢 Added 50 coins and 50 goods to player 12, updated 1 row.
  7. 🚮 Deleted 1 player data.

Sample code snippets

You can refer to the following sample code snippets to complete your own application development.

For complete sample code and how to run it, check out the tidb-samples/tidb-ruby-mysql2-quickstart repository.

Connect to TiDB with connection options

The following code establishes a connection to TiDB with options defined in the environment variables:

  1. require 'dotenv/load'
  2. require 'mysql2'
  3. Dotenv.load # Load the environment variables from the .env file
  4. options = {
  5. host: ENV['DATABASE_HOST'] || '127.0.0.1',
  6. port: ENV['DATABASE_PORT'] || 4000,
  7. username: ENV['DATABASE_USER'] || 'root',
  8. password: ENV['DATABASE_PASSWORD'] || '',
  9. database: ENV['DATABASE_NAME'] || 'test'
  10. }
  11. options.merge(ssl_mode: :verify_identity) unless ENV['DATABASE_ENABLE_SSL'] == 'false'
  12. options.merge(sslca: ENV['DATABASE_SSL_CA']) if ENV['DATABASE_SSL_CA']
  13. client = Mysql2::Client.new(options)

mysql2 - 图4

Note

For TiDB Serverless, TLS connection MUST be enabled via DATABASE_ENABLE_SSL when using public endpoint, but you don’t have to specify an SSL CA certificate via DATABASE_SSL_CA, because mysql2 gem will search for existing CA certificates in a particular order until a file is discovered.

Insert data

The following query creates a single player with two fields and returns the last_insert_id:

  1. def create_player(client, coins, goods)
  2. result = client.query(
  3. "INSERT INTO players (coins, goods) VALUES (#{coins}, #{goods});"
  4. )
  5. client.last_id
  6. end

For more information, refer to Insert data.

Query data

The following query returns the record of a specific player by ID:

  1. def get_player_by_id(client, id)
  2. result = client.query(
  3. "SELECT id, coins, goods FROM players WHERE id = #{id};"
  4. )
  5. result.first
  6. end

For more information, refer to Query data.

Update data

The following query updated the record of a specific player by ID:

  1. def update_player(client, player_id, inc_coins, inc_goods)
  2. result = client.query(
  3. "UPDATE players SET coins = coins + #{inc_coins}, goods = goods + #{inc_goods} WHERE id = #{player_id};"
  4. )
  5. client.affected_rows
  6. end

For more information, refer to Update data.

Delete data

The following query deletes the record of a specific player:

  1. def delete_player_by_id(client, id)
  2. result = client.query(
  3. "DELETE FROM players WHERE id = #{id};"
  4. )
  5. client.affected_rows
  6. end

For more information, refer to Delete data.

Best practices

By default, the mysql2 gem can search for existing CA certificates in a particular order until a file is discovered.

  1. /etc/ssl/certs/ca-certificates.crt for Debian, Ubuntu, Gentoo, Arch, or Slackware
  2. /etc/pki/tls/certs/ca-bundle.crt for RedHat, Fedora, CentOS, Mageia, Vercel, or Netlify
  3. /etc/ssl/ca-bundle.pem for OpenSUSE
  4. /etc/ssl/cert.pem for macOS or Alpine (docker container)

While it is possible to specify the CA certificate path manually, doing so might cause significant inconvenience in multi-environment deployment scenarios, because different machines and environments might store the CA certificate in different locations. Therefore, setting sslca to nil is recommended for flexibility and ease of deployment across different environments.

Next steps

Need help?

Ask questions on the Discord channel.