To debug and monitor connections when you use AWS RDS Proxy with IAM authentication, you need full visibility. AWS RDS Proxy does not log IAM authentication events by default. The proxy passes the authentication handshake to the database, but without proper configuration, those attempts do not appear where you expect them. This can create a blind spot when troubleshooting latency, failed logins, or dropped sessions.
First, enable detailed monitoring and enhanced logging on both the RDS instance and the RDS Proxy. Check CloudWatch Log Groups for /aws/rds/proxy. This is where proxy-level events appear if enabled. However, IAM connection attempts might only surface in the database engine logs, such as PostgreSQL’s postgresql.log or MySQL’s error.log. For IAM, the key is to trace the rds_iam plugin (MySQL) or rds_iam authentication entries in PostgreSQL’s pg_hba.conf equivalent.
Second, turn on query logging at the database level during testing. Keep it off in production unless necessary to avoid performance impacts. Combine these logs with VPC Flow Logs to confirm network paths through the RDS Proxy, especially when debugging intermittent authentication failures.