How do I authorize my ephemeral Google Container Engine instances in Cloud SQL? -
i test-driving google container engine (gke) , kubernetes possible replacement aws/elasticbeanstalk deployment. understanding virtue of dynamic servers being in same project cloud sql instance, they'd naturally included in firewall rules of project. however, appears not case. app servers , sql server in same availability zone, , have both ipv4 , ipv6 enabled on sql server.
i don't want statically assign ip addresses cluster members ephemeral, i'm looking guidance on how can enable sql access docker-based app hosted inside gke? stopgap, i've added ephemeral ips of container cluster nodes , has enabled me use cloudsql i'd have more seamless way of handling if nodes somehow new ip address.
the current recommendations (ssl or haproxy) discussed in [1]. working on client proxy use service accounts authenticate cloud sql.
Comments
Post a Comment