How can we improve Cloud SQL?

Mysql instances should also have a private network

Managed mysql should have an internal ip address on the private network.

91 votes
Vote
Sign in
Check!
(thinking…)
Reset
or sign in with
  • facebook
  • google
    Password icon
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    Kevin Heisenberg shared this idea  ·   ·  Flag idea as inappropriate…  ·  Admin →

    2 comments

    Sign in
    Check!
    (thinking…)
    Reset
    or sign in with
    • facebook
    • google
      Password icon
      Signed in as (Sign out)
      Submitting...
      • Anonymous commented  ·   ·  Flag as inappropriate

        Im trying to see if it is possible to justify using Cloud SQL as a DB for production, given that it seems fully open and unprotected from DDoS attack, sitting on a public IP. I hope Im missing something, and it can be pointed out to me. Thanks

      • fxer commented  ·   ·  Flag as inappropriate

        It is a little terrifying that every mysql instance has a public ip, and thus can be targeted directly for a DDoS attack. Also it negates the value of a bastion host as a central place for external access and audit when all traffic to cloud sql is routed directly via a public ip.

        Of course I'm just a small fish but this discovery abruptly halted my migration off AWS, but I would eagerly start again if this feature came around.

        In the interim it would be great if there were some details of why Cloud SQL is the outlier, where most other services in regions around the world are on your private network...but not cloud sql.

      Feedback and Knowledge Base