Private VPC Peering for Cloud SQL is not supported by deployment manager
See original GitHub issue(TL;DR) Solution: https://github.com/GoogleCloudPlatform/deploymentmanager-samples/issues/549#issuecomment-613842019
Basically, there is no way to connect/enable servicenetworking.googleapis.com
service for a vpc network through deployment-manager.
The gcloud command for the above action/operation is:
gcloud services vpc-peerings connect --service=servicenetworking.googleapis.com --ranges=<my-range> --network=<my-network> --project=<my-project>
Any pointers for how this could be done via deployment-manager?
Issue Analytics
- State:
- Created 3 years ago
- Comments:29 (11 by maintainers)
Top Results From Across the Web
Configure connectivity using VPC peering - Google Cloud
VPC peering works by configuring the VPCs to communicate with one another. If your source is in the same Google Cloud project in...
Read more >Custom GCP type provider for automating `VPC Network ...
Writing custom GCP type provider for VPC Network Peering, thus to deploy a private Postgres Cloud SQL instance through deployment manager.
Read more >Private service connection for CloudSQL using Deployment ...
A CloudSQL instance hosting the database (MySQL). In the existing environments they have, the database is configured with a private IP address, ...
Read more >Move Cloud SQL to use Private SVC Connect and away from ...
Recently our organization ran into issues communicating with Cloud SQL from GKE. The network architecture in our deployment is such that we have...
Read more >Terraform vs Google Cloud Deployment Manager - huy.dev
Communication between my project's network and the Google-managed VPC network containing the database is enabled by VPC network peering. To make ...
Read more >
Top Related Medium Post
No results found
Top Related StackOverflow Question
No results found
Troubleshoot Live Code
Lightrun enables developers to add logs, metrics and snapshots to live code - no restarts or redeploys required.
Start Free
Top Related Reddit Thread
No results found
Top Related Hackernoon Post
No results found
Top Related Tweet
No results found
Top Related Dev.to Post
No results found
Top Related Hashnode Post
No results found
Just to say thanks @Priyankasaggu11929 and @ocsig this was super useful and saved me loads of time. Looking forward to Google supporting this in Deployment Manager directly. In the meantime this works well.
@jjlorenzo
The jinja template, say
example-postgres.jinja
will include the following:And the
config.yaml
will include the following:You need to change value for the following:
project-id
config.yaml
,ipConfiguration
->authorizedNetworks
.user
andpassword
values accordingly indatabase-root
section.Hope this helps!