Configure public IP

This page describes how to configure public IP connectivity for a Cloud SQL instance.

Introduction

You can configure your Cloud SQL instance to have a public IPv4 address, and to accept connections from specific IP addresses or a range of addresses by adding authorized addresses to your instance.

You can't specify a private network (for example, 10.x.x.x) as an authorized network.

Public IP addresses for PostgreSQL instances:

  • IPv6: Instances do not support IPv6.
  • IPv4: Instances have a static IPv4 address automatically assigned. There is a small charge for the IP address any time your instance is off (deactivated).

For help with connecting an administration client to your instance over an IP connection, see Connecting psql Client using IP addresses.

If you configure your instance to accept connections using its public IP address, also configure it to use SSL to keep your data secure. For more information, see Configure SSL for Instances.

To configure your instance with an IP address that is not exposed to the public internet, see Configuring Private IP Connectivity.

Enable public IP and add an authorized address or address range

When you enable public IP for your instance, Cloud SQL configures the instance with a public, static IPv4 address. After you enable public IP, you must set up authorization for database connections. See the Authorization options for more information.

To enable public IP and add an authorized address:

Console

  1. In the Google Cloud console, go to the Cloud SQL Instances page.

    Go to Cloud SQL Instances

  2. To open the Overview page of an instance, click the instance name.
  3. From the SQL navigation menu, select Connections.
  4. Click the Networking tab.
  5. Select the Public IP checkbox.
  6. Click Add network.
  7. Optionally, in the Name field, enter a name for this network.
  8. In the Network field, enter the IP address or address range from which you want to allow connections.

    Use CIDR notation.

  9. Click Done.
  10. Click Save.

gcloud

  1. If you haven't already, add an IPv4 address to the instance:
    gcloud sql instances patch INSTANCE_NAME\
    --assign-ip
  2. Show all existing authorized addresses by describing the instance:
    gcloud sql instances describe INSTANCE_NAME

    Look for authorizedNetwork entries under ipConfiguration, and note any authorized addresses you want to keep.

  3. Update the authorized network list, including all addresses you want included.
    gcloud sql instances patch INSTANCE_NAME \
    --authorized-networks=IP_ADDR1,IP_ADDR2...

    Use CIDR notation.

  4. Confirm your changes:
    gcloud sql instances describe INSTANCE_NAME

REST v1

  1. Show all existing authorized addresses by describing the instance:

    Before using any of the request data, make the following replacements:

    • project-id: The project ID
    • instance-id: The instance ID
    • machine-type The instance machine type
    • zone The instance zone

    HTTP method and URL:

    GET https://sqladmin.googleapis.com/v1/projects/project-id/instances/instance-id?fields=settings

    To send your request, expand one of these options:

    You should receive a JSON response similar to the following:

  2. Update the instance, including all addresses you want set on the instance:

    Before using any of the request data, make the following replacements:

    • project-id: The project ID
    • instance-id: The instance ID
    • network_range_1 An authorized ip address or range
    • network_range_2 Another authorized ip address or range

    HTTP method and URL:

    PATCH https://sqladmin.googleapis.com/v1/projects/project-id/instances/instance-id

    Request JSON body:

    {
      "settings":
      {
        "ipConfiguration":
        {
          "authorizedNetworks":
            [{"value": "network_range_1"}, {"value": "network_range_2"}]
        }
      }
    }
    

    To send your request, expand one of these options:

    You should receive a JSON response similar to the following:

    Use CIDR notation.

  3. Confirm your changes:

    Before using any of the request data, make the following replacements:

    • project-id: The project ID
    • instance-id: The instance ID
    • ip-address1: The CIDR form of the first IP address
    • ip-address-name1: The name of the first IP address
    • ip-address2: The CIDR form of the second IP address
    • ip-address-name2: The name of the second IP address
    • machine-type The instance machine type
    • zone The instance zone

    HTTP method and URL:

    GET https://sqladmin.googleapis.com/v1/projects/project-id/instances/instance-id?fields=settings

    To send your request, expand one of these options:

    You should receive a JSON response similar to the following:

Terraform

To enable public IP and add an authorized address or address range, use a Terraform resource.

resource "google_sql_database_instance" "postgres_public_ip_instance_name" {
  database_version = "POSTGRES_14"
  name             = "postgres-public-ip-instance-name"
  region           = "asia-southeast2"
  settings {
    availability_type = "ZONAL"
    ip_configuration {
      # Add optional authorized networks
      # Update to match the customer's networks
      authorized_networks {
        name  = "test-net-3"
        value = "203.0.113.0/24"
      }
      # Enable public IP
      ipv4_enabled = true
    }
    tier = "db-custom-2-7680"
  }
  # set `deletion_protection` to true, will ensure that one cannot accidentally delete this instance by
  # use of Terraform whereas `deletion_protection_enabled` flag protects this instance at the GCP level.
  deletion_protection = false
}

Apply the changes

To apply your Terraform configuration in a Google Cloud project, complete the steps in the following sections.

Prepare Cloud Shell

  1. Launch Cloud Shell.
  2. Set the default Google Cloud project where you want to apply your Terraform configurations.

    You only need to run this command once per project, and you can run it in any directory.

    export GOOGLE_CLOUD_PROJECT=PROJECT_ID

    Environment variables are overridden if you set explicit values in the Terraform configuration file.

Prepare the directory

Each Terraform configuration file must have its own directory (also called a root module).

  1. In Cloud Shell, create a directory and a new file within that directory. The filename must have the .tf extension—for example main.tf. In this tutorial, the file is referred to as main.tf.
    mkdir DIRECTORY && cd DIRECTORY && touch main.tf
  2. If you are following a tutorial, you can copy the sample code in each section or step.

    Copy the sample code into the newly created main.tf.

    Optionally, copy the code from GitHub. This is recommended when the Terraform snippet is part of an end-to-end solution.

  3. Review and modify the sample parameters to apply to your environment.
  4. Save your changes.
  5. Initialize Terraform. You only need to do this once per directory.
    terraform init

    Optionally, to use the latest Google provider version, include the -upgrade option:

    terraform init -upgrade

Apply the changes

  1. Review the configuration and verify that the resources that Terraform is going to create or update match your expectations:
    terraform plan

    Make corrections to the configuration as necessary.

  2. Apply the Terraform configuration by running the following command and entering yes at the prompt:
    terraform apply

    Wait until Terraform displays the "Apply complete!" message.

  3. Open your Google Cloud project to view the results. In the Google Cloud console, navigate to your resources in the UI to make sure that Terraform has created or updated them.

Delete the changes

To delete your changes, do the following:

  1. To disable deletion protection, in your Terraform configuration file set the deletion_protection argument to false.
    deletion_protection =  "false"
  2. Apply the updated Terraform configuration by running the following command and entering yes at the prompt:
    terraform apply
  1. Remove resources previously applied with your Terraform configuration by running the following command and entering yes at the prompt:

    terraform destroy

REST v1beta4

  1. Show all existing authorized addresses by describing the instance:

    Before using any of the request data, make the following replacements:

    • project-id: The project ID
    • instance-id: The instance ID
    • machine-type The instance machine type
    • zone The instance zone

    HTTP method and URL:

    GET https://sqladmin.googleapis.com/sql/v1beta4/projects/project-id/instances/instance-id?fields=settings

    To send your request, expand one of these options:

    You should receive a JSON response similar to the following:

  2. Update the instance, including all addresses you want set on the instance:

    Before using any of the request data, make the following replacements:

    • project-id: The project ID
    • instance-id: The instance ID
    • network_range_1 An authorized ip address or range
    • network_range_2 Another authorized ip address or range

    HTTP method and URL:

    PATCH https://sqladmin.googleapis.com/sql/v1beta4/projects/project-id/instances/instance-id

    Request JSON body:

    {
      "settings":
      {
        "ipConfiguration":
        {
          "authorizedNetworks":
            [{"value": "network_range_1"}, {"value": "network_range_2"}]
        }
      }
    }
    

    To send your request, expand one of these options:

    You should receive a JSON response similar to the following:

    Use CIDR notation.

  3. Confirm your changes:

    Before using any of the request data, make the following replacements:

    • project-id: The project ID
    • instance-id: The instance ID
    • ip-address1: The CIDR form of the first IP address
    • ip-address-name1: The name of the first IP address
    • ip-address2: The CIDR form of the second IP address
    • ip-address-name2: The name of the second IP address
    • machine-type The instance machine type
    • zone The instance zone

    HTTP method and URL:

    GET https://sqladmin.googleapis.com/sql/v1beta4/projects/project-id/instances/instance-id?fields=settings

    To send your request, expand one of these options:

    You should receive a JSON response similar to the following:

Remove an authorized address or address range

To remove an authorized address:

Console

  1. In the Google Cloud console, go to the Cloud SQL Instances page.

    Go to Cloud SQL Instances

  2. To open the Overview page of an instance, click the instance name.
  3. Select Connections from the SQL navigation menu.
  4. Click the delete icon Delete. for the address you want to delete.
  5. Click Save to update the instance.

gcloud

  1. Show all existing authorized addresses by describing the instance:
    gcloud sql instances describe INSTANCE_NAME

    Look for authorizedNetwork entries under ipConfiguration, and note any authorized addresses you want to keep.

  2. Update the authorized network list, dropping off any addresses you want to remove.
    gcloud sql instances patch INSTANCE_NAME \
    --authorized-networks=IP_ADDR1,IP_ADDR2...
  3. Confirm your changes:
    gcloud sql instances describe INSTANCE_NAME

REST v1

  1. Show all existing authorized addresses by describing the instance:

    Before using any of the request data, make the following replacements:

    • project-id: The project ID
    • instance-id: The instance ID
    • ip-address1: The CIDR form of the first IP address
    • ip-address-name1: The name of the first IP address
    • ip-address2: The CIDR form of the second IP address
    • ip-address-name2: The name of the second IP address
    • machine-type The instance machine type
    • zone The instance zone

    HTTP method and URL:

    GET https://sqladmin.googleapis.com/v1/projects/project-id/instances/instance-id?fields=settings

    To send your request, expand one of these options:

    You should receive a JSON response similar to the following:

  2. Update the instance, by including all the addresses you want to keep and dropping off any addresses you want to remove:

    Before using any of the request data, make the following replacements:

    • project-id: The project ID
    • instance-id: The instance ID
    • network_range_1 The authorized IP address or network range to remove

    HTTP method and URL:

    PATCH https://sqladmin.googleapis.com/v1/projects/project-id/instances/instance-id

    Request JSON body:

    {
      "settings":
      {
        "ipConfiguration":
        {
          "authorizedNetworks":
            [{"value": "network_range_1"}]
        }
      }
    }
    
    

    To send your request, expand one of these options:

    You should receive a JSON response similar to the following:

  3. Confirm your changes:

    Before using any of the request data, make the following replacements:

    • project-id: The project ID
    • instance-id: The instance ID
    • ip-address: The CIDR form of the IP address
    • ip-address-name: The name of the IP address
    • machine-type The instance machine type
    • zone The instance zone

    HTTP method and URL:

    GET https://sqladmin.googleapis.com/v1/projects/project-id/instances/instance-id?fields=settings

    To send your request, expand one of these options:

    You should receive a JSON response similar to the following:

REST v1beta4

  1. Show all existing authorized addresses by describing the instance:

    Before using any of the request data, make the following replacements:

    • project-id: The project ID
    • instance-id: The instance ID
    • ip-address1: The CIDR form of the first IP address
    • ip-address-name1: The name of the first IP address
    • ip-address2: The CIDR form of the second IP address
    • ip-address-name2: The name of the second IP address
    • machine-type The instance machine type
    • zone The instance zone

    HTTP method and URL:

    GET https://sqladmin.googleapis.com/sql/v1beta4/projects/project-id/instances/instance-id?fields=settings

    To send your request, expand one of these options:

    You should receive a JSON response similar to the following:

  2. Update the instance, by including all the addresses you want to keep and dropping off any addresses you want to remove:

    Before using any of the request data, make the following replacements:

    • project-id: The project ID
    • instance-id: The instance ID
    • network_range_1 The authorized IP address or network range to remove

    HTTP method and URL:

    PATCH https://sqladmin.googleapis.com/sql/v1beta4/projects/project-id/instances/instance-id

    Request JSON body:

    {
      "settings":
      {
        "ipConfiguration":
        {
          "authorizedNetworks":
            [{"value": "network_range_1"}]
        }
      }
    }
    
    

    To send your request, expand one of these options:

    You should receive a JSON response similar to the following:

  3. Confirm your changes:

    Before using any of the request data, make the following replacements:

    • project-id: The project ID
    • instance-id: The instance ID
    • ip-address: The CIDR form of the IP address
    • ip-address-name: The name of the IP address
    • machine-type The instance machine type
    • zone The instance zone

    HTTP method and URL:

    GET https://sqladmin.googleapis.com/sql/v1beta4/projects/project-id/instances/instance-id?fields=settings

    To send your request, expand one of these options:

    You should receive a JSON response similar to the following:

Configure an instance to refuse all public IP connections

To configure an instance to refuse all public IP connections:

Console

  1. In the Google Cloud console, go to the Cloud SQL Instances page.

    Go to Cloud SQL Instances

  2. To open the Overview page of an instance, click the instance name.
  3. Select Connections from the SQL navigation menu.
  4. Click the delete icon Delete. for all authorized addresses.
  5. Click Save to update the instance.

gcloud

  1. Clear the authorized address list:
    gcloud sql instances patch INSTANCE_NAME \
    --clear-authorized-networks
  2. Confirm your changes:
    gcloud sql instances describe INSTANCE_NAME

REST v1

  1. Show all existing authorized addresses by describing the instance:

    Before using any of the request data, make the following replacements:

    • project-id: The project ID
    • instance-id: The instance ID
    • ip-address1: The CIDR form of the first IP address
    • ip-address-name1: The name of the first IP address
    • ip-address2: The CIDR form of the second IP address
    • ip-address-name2: The name of the second IP address
    • machine-type The instance machine type
    • zone The instance zone

    HTTP method and URL:

    GET https://sqladmin.googleapis.com/v1/projects/project-id/instances/instance-id?fields=settings

    To send your request, expand one of these options:

    You should receive a JSON response similar to the following:

  2. Update the instance with an empty address list:

    Before using any of the request data, make the following replacements:

    • project-id: The project ID
    • instance-id: The instance ID

    HTTP method and URL:

    PATCH https://sqladmin.googleapis.com/v1/projects/project-id/instances/instance-id

    Request JSON body:

    {
      "settings":
      {
        "ipConfiguration":
        {
          "authorizedNetworks": []
        }
      }
    }
    

    To send your request, expand one of these options:

    You should receive a JSON response similar to the following:

  3. Confirm your changes:

    Before using any of the request data, make the following replacements:

    • project-id: The project ID
    • instance-id: The instance ID
    • machine-type The instance machine type
    • zone The instance zone

    HTTP method and URL:

    GET https://sqladmin.googleapis.com/v1/projects/project-id/instances/instance-id?fields=settings

    To send your request, expand one of these options:

    You should receive a JSON response similar to the following:

REST v1beta4

  1. Show all existing authorized addresses by describing the instance:

    Before using any of the request data, make the following replacements:

    • project-id: The project ID
    • instance-id: The instance ID
    • ip-address1: The CIDR form of the first IP address
    • ip-address-name1: The name of the first IP address
    • ip-address2: The CIDR form of the second IP address
    • ip-address-name2: The name of the second IP address
    • machine-type The instance machine type
    • zone The instance zone

    HTTP method and URL:

    GET https://sqladmin.googleapis.com/sql/v1beta4/projects/project-id/instances/instance-id?fields=settings

    To send your request, expand one of these options:

    You should receive a JSON response similar to the following:

  2. Update the instance with an empty address list:

    Before using any of the request data, make the following replacements:

    • project-id: The project ID
    • instance-id: The instance ID

    HTTP method and URL:

    PATCH https://sqladmin.googleapis.com/sql/v1beta4/projects/project-id/instances/instance-id

    Request JSON body:

    {
      "settings":
      {
        "ipConfiguration":
        {
          "authorizedNetworks": []
        }
      }
    }
    

    To send your request, expand one of these options:

    You should receive a JSON response similar to the following:

  3. Confirm your changes:

    Before using any of the request data, make the following replacements:

    • project-id: The project ID
    • instance-id: The instance ID
    • machine-type The instance machine type
    • zone The instance zone

    HTTP method and URL:

    GET https://sqladmin.googleapis.com/sql/v1beta4/projects/project-id/instances/instance-id?fields=settings

    To send your request, expand one of these options:

    You should receive a JSON response similar to the following:

Disable public IP

You can disable public IP, but only if your instance is also configured to use Private IP. To enable private IP, see Configuring an existing instance to use private IP.

To disable public IP:

Console

  1. In the Google Cloud console, go to the Cloud SQL Instances page.

    Go to Cloud SQL Instances

  2. To open the Overview page of an instance, click the instance name.
  3. Select Connections from the SQL navigation menu.
  4. Clear the Public IP checkbox.
  5. Click Save to update the instance.

gcloud

  1. Update the instance:
    gcloud sql instances patch INSTANCE_NAME \
    --no-assign-ip
  2. Confirm your changes:
    gcloud sql instances describe INSTANCE_NAME

REST v1

  1. Show all existing authorized addresses by describing the instance:

    Before using any of the request data, make the following replacements:

    • project-id: The project ID
    • instance-id: The instance ID
    • ip-address1: The CIDR form of the first IP address
    • ip-address-name1: The name of the first IP address
    • ip-address2: The CIDR form of the second IP address
    • ip-address-name2: The name of the second IP address
    • machine-type The instance machine type
    • zone The instance zone

    HTTP method and URL:

    GET https://sqladmin.googleapis.com/v1/projects/project-id/instances/instance-id?fields=settings

    To send your request, expand one of these options:

    You should receive a JSON response similar to the following:

  2. Update the instance:

    Before using any of the request data, make the following replacements:

    • PROJECT_ID: The project ID
    • INSTANCE_ID: The instance ID
    • VPC_NETWORK_NAME: Specify the name of the Virtual Private Cloud (VPC) network that you want to use for this instance. Private services access must already be configured for the network.
    • RANGE_NAME: Optional. If specified, sets a range name for which an IP range is allocated. The range name must comply with RFC-1035 and contain 1-63 characters.
    • AUTHORIZED_NETWORKS: For public IP connections, specify the connections from authorized networks that can connect to your instance.

    For the ipv4Enabled parameter, set the value to true if you're using a public IP address for your instance or false if your instance has a private IP address.

    If you set the enablePrivatePathForGoogleCloudServices parameter to true, then you allow other Google Cloud services, such as BigQuery, to access data in Cloud SQL and make queries against this data over a private IP connection. By setting this parameter to false, other Google Cloud services can't access data in Cloud SQL over a private IP connection.

    HTTP method and URL:

    POST https://sqladmin.googleapis.com/v1/projects/PROJECT_ID/instances

    Request JSON body:

    {
      "name": "INSTANCE_ID",
      "region": "region",
      "databaseVersion": "database-version",
      "settings": {
        "tier": "machine-type",
        "ipConfiguration": {
          "ipv4Enabled": false,
          "privateNetwork": "projects/PROJECT_ID/global/networks/VPC_NETWORK_NAME",
          "allocatedIpRange": "RANGE_NAME"
          "authorizedNetworks": [AUTHORIZED_NETWORKS],
          
          "enablePrivatePathForGoogleCloudServices": true
          
        }
      }
    }
    

    To send your request, expand one of these options:

    You should receive a JSON response similar to the following:

  3. Confirm your changes:

    Before using any of the request data, make the following replacements:

    • project-id: The project ID
    • instance-id: The instance ID
    • machine-type The instance machine type
    • zone The instance zone

    HTTP method and URL:

    GET https://sqladmin.googleapis.com/v1/projects/project-id/instances/instance-id?fields=settings

    To send your request, expand one of these options:

    You should receive a JSON response similar to the following:

REST v1beta4

  1. Show all existing authorized addresses by describing the instance:

    Before using any of the request data, make the following replacements:

    • project-id: The project ID
    • instance-id: The instance ID
    • ip-address1: The CIDR form of the first IP address
    • ip-address-name1: The name of the first IP address
    • ip-address2: The CIDR form of the second IP address
    • ip-address-name2: The name of the second IP address
    • machine-type The instance machine type
    • zone The instance zone

    HTTP method and URL:

    GET https://sqladmin.googleapis.com/sql/v1beta4/projects/project-id/instances/instance-id?fields=settings

    To send your request, expand one of these options:

    You should receive a JSON response similar to the following:

  2. Update the instance:

    Before using any of the request data, make the following replacements:

    • PROJECT_ID: The project ID
    • INSTANCE_ID: The instance ID
    • VPC_NETWORK_NAME: Specify the name of the Virtual Private Cloud (VPC) network that you want to use for this instance. Private services access must already be configured for the network.
    • RANGE_NAME: Optional. If specified, sets a range name for which an IP range is allocated. The range name must comply with RFC-1035 and contain 1-63 characters.
    • AUTHORIZED_NETWORKS: For public IP connections, specify the connections from authorized networks that can connect to your instance.

    For the ipv4Enabled parameter, set the value to true if you're using a public IP address for your instance or false if your instance has a private IP address.

    If you set the enablePrivatePathForGoogleCloudServices parameter to true, then you allow other Google Cloud services, such as BigQuery, to access data in Cloud SQL and make queries against this data over a private IP connection. By setting this parameter to false, other Google Cloud services can't access data in Cloud SQL over a private IP connection.

    HTTP method and URL:

    POST https://sqladmin.googleapis.com/v1beta4/projects/PROJECT_ID/instances

    Request JSON body:

    {
      "name": "INSTANCE_ID",
      "region": "region",
      "databaseVersion": "database-version",
      "settings": {
        "tier": "machine-type",
        "ipConfiguration": {
          "ipv4Enabled": false,
          "privateNetwork": "projects/PROJECT_ID/global/networks/VPC_NETWORK_NAME",
          "allocatedIpRange": "RANGE_NAME"
          "authorizedNetworks": [AUTHORIZED_NETWORKS],
          
          "enablePrivatePathForGoogleCloudServices": true
          
        }
      }
    }
    

    To send your request, expand one of these options:

    You should receive a JSON response similar to the following:

  3. Confirm your changes:

    Before using any of the request data, make the following replacements:

    • project-id: The project ID
    • instance-id: The instance ID
    • machine-type The instance machine type
    • zone The instance zone

    HTTP method and URL:

    GET https://sqladmin.googleapis.com/sql/v1beta4/projects/project-id/instances/instance-id?fields=settings

    To send your request, expand one of these options:

    You should receive a JSON response similar to the following:

Troubleshoot

Issue Troubleshooting
Aborted connection. The issue might be:
  • Networking instability.
  • No response to TCP keep-alive commands (either the client or the server isn't responsive, possibly overloaded)
  • The database engine connection lifetime was exceeded and the server ends the connection.

Applications must tolerate network failures and follow best practices such as connection pooling and retrying. Most connection poolers catch these errors where possible. Otherwise the application must either retry or fail gracefully.

For connection retry, we recommend the following methods:

  1. Exponential backoff. Increase the time interval between each retry, exponentially.
  2. Add randomized backoff also.

Combining these methods helps reduce throttling.

Certificate verify failed.

The client certificates have expired or the path to the certificates isn't correct.

Regenerate the certificates by recreating them.

FATAL: database 'user' does not exist. gcloud sql connect --user only works with the default postgres user.

Connect with the default user, then change users.

You want to find out who is connected. Log into the database and run this command:

SELECT datname,
usename,
application_name as appname,
client_addr,
state,
now() - backend_start as conn_age,
now() - state_change as last_activity_age
FROM pg_stat_activity
WHERE backend_type = 'client backend'
ORDER BY 6 DESC
LIMIT 20
   

Hostname/IP does not match certificate's altnames: Host: localhost. is not in the cert's altnames.

The host address does not match the address in the server certificate's alternative names.

If you are using Node.js with verify-full or its equivalent, please use the DNS name for the servername parameter. The DNS name can be found in the server certificate using openssl. For example, openssl x509 -in server-cert.pem -noout -text |grep 'DNS:'.

 ssl: {
  rejectUnauthorized: true,
  ca: fs.readFileSync("/path/to/server/CA"),
  servername: 'N-xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxx.us-central1.sql.goog'
}

What's next