连接到CloudSQL私有IP实例而不创建新的VM实例
我想知道,当DB没有公共IP时,是否有可能将GCP AIP隧道连接到DB(Cloud SQL代理)的解决方案。
我不想为此目的创建一个新的VM,因此我只对不需要我使用VM的解决方案感兴趣。
提前致谢。
I was wondering if there's any possible solution to connect a GCP AIP tunnel to a DB (Cloud SQL Proxy) when the DB has no public IP.
I don't want to create a new VM for this purpose so I'm only interested in solutions that don't require me to use a VM.
Thanks in advance.
如果你对这篇内容有疑问,欢迎到本站社区发帖提问 参与讨论,获取更多帮助,或者扫码二维码加入 Web 技术交流群。

绑定邮箱获取回复消息
由于您还没有绑定你的真实邮箱,如果其他用户或者作者回复了您的评论,将不能在第一时间通知您!
发布评论
评论(1)
有两种将您的本地网络连接到VPC的方法,但是两者都相当参与(可能很昂贵):
对于这两种情况,您还需要配置云路由器将路由导出到云SQL实例中的路由到您的本地网络。
此外(如果您控制了约束),则可以重新审视使用公共IP的想法。使用Cloud SQL Auth代理,您可以使用IAM身份授权您的连接,而不是传统的防火墙或SSL证书。您甚至可以使用组织策略限制授权网络,从而使连接所需的身份代理。 enter链接
There are two ways to connect your on-prem network to the VPC, but both are fairly involved (and potentially expensive):
For both scenarios, you'll also need to configure Cloud Router to export the routes to your Cloud SQL instance into your on-prem network.
Additionally (if you have control of your constraints) you could revisit the idea of using Public IP. Using the Cloud SQL Auth proxy allows you to authorize your connections using an IAM identity as opposed to traditional firewalling or SSL certs. You can even use org policies to restrict Authorized Networks, making the Auth proxy required to connect. enter link description here