Public IP connectivity is most appropriate when the source database is external to Google Cloud
and has an externally accessible IPv4 address and TCP port. If the source
database is hosted in another VPC in Google Cloud, then the easiest way to
connect the source database with the Cloud SQL instance is by using VPC Peering.
If your source database is external to Google Cloud, then add the destination database's outgoing
IP address (and port 5432) as an inbound firewall rule on the source network. In
generic terms (your specific network settings may differ), do the following:
Open the source database machine's network firewall rules.
Create an inbound rule.
Set the Rule type to PostgreSQL to AlloyDB.
Set the Protocol to TCP.
Set the Port range to 5432.
Set the Source IP address to the destination database's outgoing IP address. For example:
12.20.36.126/32. (The /32 designation in CIDR notation limits the
address range to one address only, the one provided. It's setting the subnet
mask to 255.255.255.255). If the Cloud SQL instance you created
is a high availability instance, include the outgoing IP addresses for both
the primary and the secondary instance.
Update the pg_hba.conf file or AWS RDS security groups to accept connections from this IP address.
Save the firewall rule and exit.
It's also highly recommended to use SSL/TLS during the definition of the source
connection profile so that the data sent to and received by the source is
secure.
[[["Easy to understand","easyToUnderstand","thumb-up"],["Solved my problem","solvedMyProblem","thumb-up"],["Other","otherUp","thumb-up"]],[["Hard to understand","hardToUnderstand","thumb-down"],["Incorrect information or sample code","incorrectInformationOrSampleCode","thumb-down"],["Missing the information/samples I need","missingTheInformationSamplesINeed","thumb-down"],["Other","otherDown","thumb-down"]],["Last updated 2025-06-05 UTC."],[[["Public IP connectivity is recommended when the source database is outside of Google Cloud and has a publicly accessible IPv4 address and TCP port."],["For source databases external to Google Cloud, the destination database's outgoing IP address should be added as an inbound firewall rule on the source network, allowing TCP traffic on port 5432."],["The `pg_hba.conf` file or AWS RDS security groups should be updated to accept connections from the destination database's outgoing IP address."],["It is highly recommended to use SSL/TLS to secure the data sent to and received by the source during the source connection profile definition."]]],[]]