- 필수 기능
- 시작하기
- Glossary
- 표준 속성
- Guides
- Agent
- 통합
- 개방형텔레메트리
- 개발자
- Administrator's Guide
- API
- Datadog Mobile App
- CoScreen
- Cloudcraft
- 앱 내
- 서비스 관리
- 인프라스트럭처
- 애플리케이션 성능
- APM
- Continuous Profiler
- 스팬 시각화
- 데이터 스트림 모니터링
- 데이터 작업 모니터링
- 디지털 경험
- 소프트웨어 제공
- 보안
- AI Observability
- 로그 관리
- 관리
Datadog recommends configuring the second generation SQL instance to use private IPs instead of public IPs.
To lower the organization’s attack surface, ensure your Cloud SQL databases does not have public IPs. Private IPs provide improved network security and lower latency for your application.
Removing the public IP address on SQL instances may break applications that relied on it for database connectivity.
Connections
tab.Public IP
checkbox.Save
to update the instance.For every instance, remove the public IP and assign a private IP instead:
gcloud sql instances patch <INSTANCE_NAME> --network=<VPC_NETWORK_NAME> --no-assign-ip
Confirm the changes using the following command:
gcloud sql instances describe <INSTANCE_NAME>
To prevent new SQL instances from getting configured with public IP addresses, set up a
Restrict Public IP access on Cloud SQL instances
Organization policy at:
https://console.cloud.google.com/iam-admin/orgpolicies/sql-restrictPublicIp
By default, Cloud Sql instances have a public IP.
Replicas inherit their private IP status from their primary instance. You cannot configure a private IP directly on a replica.