Cloud SQL is managed MySQL, PostgreSQL, and SQL Server. Cloud SQL automates backups, replication, and failover to ensure your database is reliable, highly available.
Cloud SQL has automatic data encryption at rest and in transit. Private connectivity with Virtual Private Cloud (VPC) and user-controlled network access that includes firewall protection. Compliant with SSAE 16, ISO 27001, PCI DSS v3.0, and HIPAA
Cloud SQL Instance
Enable API
gcloudservicesenablesqladmin.googleapis.com
Create an Instance
Create a new Cloud SQL - MySQL Instance.
gcloudsqlinstancescreatemysql-instance\--database-version=MYSQL_5_7\--region=us-central1\--cpu=2\--memory=4G\--root-password=[CHOOSE A PASSWORD]
Create a new Cloud SQL - PostgreSQL instance.
gcloudsqlinstancescreatepostgresql-instance\--database-version=POSTGRES_11\--region=us-central1\--cpu=2\--memory=4G\--root-password=[CHOOSE A PASSWORD]
Create a new Cloud SQL - SQL Server instance.
gcloudbetasqlinstancescreatesqlserver-instance\--database-version=SQLSERVER_2017_STANDARD\--region=us-central1\--cpu=2\--memory=4G\--root-password=[CHOOSE A PASSWORD]
Create a Database
Create a new database inside of the MySQL database instance.
Every Cloud SQL Instance has a unique instance connection name for the form of PROJECT_ID:REGION:INSTANCE_NAME.
Find the Instance Connection Name using gcloud command line:
MySQL instance's Instance Connection Name
PostgreSQL instance's Instance Connection Name
SQL Server instance's Instance Connection Name
JDBC
There are different ways to connect to a Cloud SQL instance. All methods will configure a JDBC URL to allow you to use the corresponding JDBC Driver, and subsequently, JPA / Hibernate and Spring Data.
Method
MySQL
PostgreSQL
SQL Server
Considerations
Cloud SQL Starter
✅
✅
🚫
Easy to configure for Spring Boot projects.
Cloud SQL Socket Factory
✅
✅
🚫
Works with non Spring Boot projects.
Cloud SQL Proxy
✅
✅
✅
Offloads authentication to proxy.
VPC Private IP
✅
✅
✅
Access via VPC. Can be used with all of the other methods above.
If you don't use Spring Cloud GCP's Cloud SQL starter, and need to configure JDBC URL directly, you can use Cloud SQL Socket Factory with existing JDBC driver.
Dependency
In addition to the JDBC Driver dependency, add the Cloud SQL Socket Factory dependency:
Maven:
Gradle:
Different MySQL Socket Factory artifact is needed for different MySQL Connector/J versions. See MySQL Socket Factory README for more information.
Maven:
Gradle:
Configuration
MySQL instance's JDBC URL with Cloud SQL Socket Factory follows the format of:
The JDBC URL for the Cloud SQL instance in this example is:
PostgreSQL instance's JDBC URL with Cloud SQL Socket Factory follows the format of:
The JDBC URL for the Cloud SQL instance in this example is:
Cloud SQL Socket Factory is not supported for SQL Server. Use Cloud SQL Proxy instead.
Cloud SQL Proxy
Cloud SQL Proxy is the generic way of establishing secured connection to a Cloud SQL instance. Rather than using the Cloud SQL Socket Factory to exchange certificates, Cloud SQL Proxy will authenticate and exchange the certificates.
Cloud SQL Proxy diagram
Install Cloud SQL Proxy:
Start the proxy:
You can then establish connections on localhost with the corresponding ports.
Connect with mysql CLI:
Or, connect with JDBC using JDBC URL:
Connect with psql CLI:
Or, connect with JDBC using JDBC URL:
Connect with mssql-cli CLI:
Or, connect with JDBC using JDBC URL:
Unix Socket Domain
You can optionally configure Cloud SQL Proxy to expose not a TCP IP port, but using Unix Socket Domain instead, and configure the Cloud SQL Socket Factory to connect using the Unix Socket Domain. See Connect External App documentation for more details.
VPC Private IP
If your Cloud SQL instance is on VPC and has a private IP, and your application is running in the Cloud able to access the same VPC, then configure JDBC drivers normally connecting to the private IP address.
R2DBC
You can use R2DBC driver for reactive database access when you connect to Cloud SQL instances using:
Cloud SQL Proxy
VPC Private IP
Using R2DBC Cloud SQL Connector
Cloud SQL Proxy or VPC Private IP
You can use standard R2DBC driver to connect using the IP address. See R2DBC documentation for corresponding driver usages: