Connect from Compute Engine Stay organized with collections Save and categorize content based on your preferences.
This page describes how to use the psql client, installed on aCompute Engine instance, to connect to Cloud SQL.
You can use private IP, public IP, the Cloud SQL Auth Proxy, or the Cloud SQL Auth Proxy Docker image.
For step-by-step instructions on running a Compute Engine sample webapplication connected to Cloud SQL, see thequickstart for connectingfrom Compute Engine.
Before you begin
This task does not include instructions for setting up yourCompute Engine instance. If you need help with creating andconfiguring a Compute Engine instance, see theCompute Engine documentation.
Ensure your Compute Engine VM has the properscope
toconnect using the Cloud SQL Admin API.Configure the service accountto have either of the following access scopes:
- https://www.googleapis.com/auth/sqlservice.admin
- https://www.googleapis.com/auth/cloud-platform
Private IP
To connect to Cloud SQL from a Compute Engine instance usingprivate IP, private services access must be set up for your environment and yourCloud SQL instance must be configured to use private IP. YourCompute Engine instance must be in the same region as yourCloud SQL instance, and on the network configured for a private connection.Learn more.
1. Configure your instance to use private IP
Use the instructions inConfiguring Private IP Connectivity.
2. Open a Cloud Shell terminal connection to your Compute Engine instance.
Use the appropriate instructions, depending on the instance's operating system:
- For Linux, see Connecting to Linux VMs.
- For Windows, see Connecting to Windows VMs.
If your Compute Engine instance is running either an RHEL or a CentOS public image, SELinux might block the proxy connection. If this happens, you must configure the SELinux feature to allow the connection.
For more information about SELinux for RHEL, see the RHEL documentation. For more information about SELinux for CentOS, seethe CentOS documentation.
3. Install the psql client on the Compute Engine instance, if it is not already installed.
Debian/Ubuntu
Install the psql client from the package manager:
sudoapt-getupdatesudoapt-getinstallpostgresql-client
CentOS/RHEL
Install the psql client from the package manager:
sudoyuminstallpostgresql
openSUSE
Install the psql client from the package manager:
sudozypperinstallpostgresql
Other platforms
- Download the PostgreSQL Core Distribution for your platform from thePostgreSQL Downloads page.
The Core Distribution includes the psql client. - Install the PostgreSQL database, following the directions on the download page.
4. Connect with the psql client.
psql-hCLOUD_SQL_PRIVATE_IP_ADDRESS-UUSERNAME
You can find the private IP address on theCloud SQL instances page or by running the followinggcloud
command:
gcloudsqlinstanceslist
Public IP
To connect using public IP:
1. Add a static IPv4 IP address to the Compute Engine instance, if it does not already have one.
You cannot connect to Compute Engine using IPv6. For information about adding a static IP address, see Reserving a new static external IP address in the Compute Engine documentation.
2. Authorize the static IP address of the Compute Engine instance as a network that can connect to your Cloud SQL instance.
For more information, seeConfiguring access for public IP connections.
Note: Grant authorization only forstatic IP addresses. Ephemeral IP addresses are temporary; granting them access to your instance creates a security risk because they could be reassigned to a different Compute Engine user later.3. Open a Cloud Shell terminal connection to your Compute Engine instance.
Use the appropriate instructions, depending on the instance's operating system:
- For Linux, see Connecting to Linux VMs.
- For Windows, see Connecting to Windows VMs.
If your Compute Engine instance is running either an RHEL or a CentOS public image, SELinux might block the proxy connection. If this happens, you must configure the SELinux feature to allow the connection.
For more information about SELinux for RHEL, see the RHEL documentation. For more information about SELinux for CentOS, seethe CentOS documentation.
4. Install the psql client on the Compute Engine instance, if it is not already installed.
Debian/Ubuntu
Install the psql client from the package manager:
sudoapt-getupdatesudoapt-getinstallpostgresql-client
CentOS/RHEL
Install the psql client from the package manager:
sudoyuminstallpostgresql
openSUSE
Install the psql client from the package manager:
sudozypperinstallpostgresql
Other platforms
- Download the PostgreSQL Core Distribution for your platform from thePostgreSQL Downloads page.
The Core Distribution includes the psql client. - Install the PostgreSQL database, following the directions on the download page.
5. Connect with the psql client.
psql-hCLOUD_SQL_PUBLIC_IP_ADDR-UUSERNAME
You can find the public IP address on theCloud SQL instances page or by running the followinggcloud
command:
gcloudsqlinstanceslist
For an example of how to connect using SSL, seeConnecting with SSL.
6. The psql prompt appears.
7. If you need to keep unused connections alive:
Set theTCP keepalive.
For more information, see Communicating between your instances and the Internet in the Compute Engine documentation.
Connections are kept alive automatically for instances.
Cloud SQL Auth Proxy
To connect using the Cloud SQL Auth Proxy from Compute Engine:1. Enable the Cloud SQL Admin API.
2. Create a service account.
Note:If your Compute Engine instance has either theFull API access orCloud SQL Admin API scope, you can skip this step; you do not need to provide a certificate file when you start the Cloud SQL Auth Proxy.If you are connecting from Compute Engine, make sureyour VM has the properscope
to connect using the Cloud SQL Admin API.Configure the service account to have either of the following access scopes:
- https://www.googleapis.com/auth/sqlservice.admin
- https://www.googleapis.com/auth/cloud-platform
- In the Google Cloud console, go to theService accounts page.
- Select the project that contains your Cloud SQL instance.
- ClickCreate service account.
- In theService account name field, enter a descriptive name for the service account.
- Change theService account ID to a unique, recognizable value and then clickCreate and continue.
- Click theSelect a role field and select one of the following roles:
- Cloud SQL > Cloud SQL Client
- Cloud SQL > Cloud SQL Editor
- Cloud SQL > Cloud SQL Admin
- ClickDone to finish creating the service account.
- Click the action menu for your new service account and then selectManage keys.
- Click theAdd key drop-down menu and then clickCreate new key.
- Confirm that the key type is JSON and then clickCreate.
The private key file is downloaded to your machine. You can move it to another location. Keep the key file secure.
If the Compute Engine instance is in a different project than the Cloud SQL instance, ensure that its service account has the proper permissions in the project that contains the Cloud SQL instance:
- Go to the Compute Engine instances listing in the Google Cloud console.
- If needed, select the project associated with the Compute Engine instance.
- Select the Compute Engine instance to display its properties.
- In the Compute Engine instance properties, copy the name of the service account.
- Go to theIAM & Admin Projects page in the Google Cloud console.
- Select the project that contains the Cloud SQL instance.
- Search for the service account name.
If the service account is already there, and it has a role that includes the
cloudsql.instances.connect
permission, you can proceed tostep 4.The
Cloud SQL Client
,Cloud SQL Editor
andCloud SQL Admin
roles all provide the necessary permission, as do the legacyEditor
andOwner
project roles.- Otherwise, add the service account by clickingAdd.
In theAdd principals dialog, provide the name of the service account and select a role that include the
cloudsql.instances.connect
permission (any Cloud SQL predefined role other than Viewer will work).Alternatively, you can use the basic Editor role by selectingProject > Editor, but theEditor role includes permissions across Google Cloud.
If you do not see these roles, your Google Cloud user might not have the
resourcemanager.projects.setIamPolicy
permission. You can check your permissions by going to theIAM page in the Google Cloud console and searching for your user id.- ClickAdd.
You now see the service account listed with the specified role.
3. Open a terminal connection to your Compute Engine instance.
Use the appropriate instructions, depending on the instance's operating system:
- For Linux, see Connecting to Linux Instances.
- For Windows, see Connecting to Windows Instances.
If your Compute Engine instance is running either an RHEL or a CentOS public image, SELinux might block the proxy connection. If this happens, you must configure the SELinux feature to allow the connection.
For more information about SELinux for RHEL, see the RHEL documentation. For more information about SELinux for CentOS, seethe CentOS documentation.
4. Install the psql client on the Compute Engine instance, if it is not already installed.
Debian/Ubuntu
Install the psql client from the package manager:
sudoapt-getupdatesudoapt-getinstallpostgresql-client
CentOS/RHEL
Install the psql client from the package manager:
sudoyuminstallpostgresql
openSUSE
Install the psql client from the package manager:
sudozypperinstallpostgresql
Other platforms
- Download the PostgreSQL Core Distribution for your platform from thePostgreSQL Downloads page.
The Core Distribution includes the psql client. - Install the PostgreSQL database, following the directions on the download page.
5. Install the Cloud SQL Auth Proxy on the Compute Engine instance.
Linux 64-bit
- Download the Cloud SQL Auth Proxy:
curl-ocloud-sql-proxyhttps://storage.googleapis.com/cloud-sql-connectors/cloud-sql-proxy/v2.18.0/cloud-sql-proxy.linux.amd64
- Make the Cloud SQL Auth Proxy executable:
chmod+xcloud-sql-proxy
Linux 32-bit
- Download the Cloud SQL Auth Proxy:
curl-ocloud-sql-proxyhttps://storage.googleapis.com/cloud-sql-connectors/cloud-sql-proxy/v2.18.0/cloud-sql-proxy.linux.386
- If the
curl
command is not found, runsudo apt install curl
and repeat the download command. - Make the Cloud SQL Auth Proxy executable:
chmod+xcloud-sql-proxy
Windows 64-bit
Right-clickhttps://storage.googleapis.com/cloud-sql-connectors/cloud-sql-proxy/v2.18.0/cloud-sql-proxy.x64.exe and selectSave Link As to download the Cloud SQL Auth Proxy. Rename the file tocloud-sql-proxy.exe
.Windows 32-bit
Right-clickhttps://storage.googleapis.com/cloud-sql-connectors/cloud-sql-proxy/v2.18.0/cloud-sql-proxy.x86.exe and selectSave Link As to download the Cloud SQL Auth Proxy. Rename the file tocloud-sql-proxy.exe
.Cloud SQL Auth Proxy Docker image
The Cloud SQL Auth Proxy has different container images, such asdistroless
,alpine
,andbuster
. The default Cloud SQL Auth Proxy container image usesdistroless
, whichcontains no shell. If you need a shell or related tools, then download an image based onalpine
orbuster
.For more information, seeCloud SQL Auth Proxy Container Images.
You can pull the latest image to your local machine using Docker by using the following command:
docker pull gcr.io/cloud-sql-connectors/cloud-sql-proxy:2.18.0
Note: The Cloud SQL Auth Proxy uses a repository that supports thegcr.io
domain but serves images from Artifact Registry. For more information, seeTransition from Container Registry.
Other OS
For other operating systems not included here, you cancompile the Cloud SQL Auth Proxy from source.6. Start the Cloud SQL Auth Proxy.
Note:If your Compute Engine instance has either theFull API access orCloud SQL Admin API scope, you do not need to provide a certificate file when you start the Cloud SQL Auth Proxy.Depending on your language and environment, you can start the Cloud SQL Auth Proxy using TCP sockets,Unix sockets, or the Cloud SQL Auth Proxy Docker image. The Cloud SQL Auth Proxy binary connects to one or more Cloud SQLinstances specified on the command line, and opens a local connection as either TCP or a Unixsocket. Other applications and services, such as your application code ordatabase management client tools, can connect to Cloud SQL instancesthrough those TCP or Unix socket connections.
Warning: Be careful when binding the Cloud SQL Auth Proxy to an external interface.Anyone with access to that interface/port will be authorized to connect to your instance.TCP sockets
For TCP connections, the Cloud SQL Auth Proxy listens onlocalhost
(127.0.0.1
) by default.So, when you specify--port PORT_NUMBER
for an instance, the local connectionis at127.0.0.1:PORT_NUMBER
.
Alternatively, you can specify a different address for the local connection.For example, here's how to make the Cloud SQL Auth Proxy listen at0.0.0.0:1234
for thelocal connection:
./cloud-sql-proxy--address0.0.0.0--port1234INSTANCE_CONNECTION_NAME
Copy yourINSTANCE_CONNECTION_NAME. This can be found on theOverview page for your instance in theGoogle Cloud console or by running the following command:
gcloudsqlinstancesdescribeINSTANCE_NAME--format='value(connectionName)'
For example:myproject:myregion:myinstance.
- If the instance has both public and private IP configured, and you want the Cloud SQL Auth Proxy to use theprivate IP address, you must provide the following option when you start the Cloud SQL Auth Proxy:
--private-ip
- If you are using a service account to authenticate the Cloud SQL Auth Proxy, note the location on your client machine of the private key file that was created when you createdthe service account.
- Start the Cloud SQL Auth Proxy.
Some possible Cloud SQL Auth Proxy invocation strings:
- Using Cloud SDK authentication:
The specified port must not already be in use, for example, by a local database server../cloud-sql-proxy--port5432INSTANCE_CONNECTION_NAME
- Using a service account and explicitly including the name of the instance connection (recommended for production environments):
./cloud-sql-proxy\--credentials-filePATH_TO_KEY_FILEINSTANCE_CONNECTION_NAME&
For more information about Cloud SQL Auth Proxy options, seeOptions for authenticating the Cloud SQL Auth Proxy.
- Using Cloud SDK authentication:
Unix sockets
Note: The Cloud SQL Auth Proxy currently does not support Unix sockets on Windows, so this option is only available for Linux and macOS platforms.The Cloud SQL Auth Proxy can listen on a Unix socket, which is a Posix standardmechanism for using a folder to manage communication between two processesrunning on the same host. Advantages to using Unix sockets are improved securityand lower latency, however, you cannot access a Unix socket from anexternal machine.
Note:The PostgreSQL standard requires a `.s.PGSQL.5432` suffix in the socket path. Some libraries apply this suffix automatically, but others require you to specify the socket path as follows:/cloudsql/INSTANCE_CONNECTION_NAME/.s.PGSQL.5432
To create and use a Unix socket, the target directory must existand both the Cloud SQL Auth Proxy and application must have read and write access to it.
Copy yourINSTANCE_CONNECTION_NAME. This can be found on theOverview page for your instance in theGoogle Cloud console or by running the following command:
gcloudsqlinstancesdescribeINSTANCE_NAME--format='value(connectionName)'
For example:myproject:myregion:myinstance.
- Create the directory where the Cloud SQL Auth Proxy sockets will live:
sudomkdir/cloudsql;sudochmod777/cloudsql
- If you are using a service account to authenticate the Cloud SQL Auth Proxy, note the location on your client machine of the private key file that was created when you createdthe service account.
- Open a new Cloud Shell terminal window and start the Cloud SQL Auth Proxy.
Some possible Cloud SQL Auth Proxy invocation strings:
- Using Google Cloud SDK authentication:
./cloud-sql-proxy--unix-socket/cloudsqlINSTANCE_CONNECTION_NAME&
- Using a service account:
./cloud-sql-proxy--unix-socket/cloudsql--credentials-filePATH_TO_KEY_FILEINSTANCE_CONNECTION_NAME&
Start the Cloud SQL Auth Proxy in its own Cloud Shell terminal so you can monitor its output without it mixing with the output from other programs.
For more information about Cloud SQL Auth Proxy options, seeOptions for authenticating the Cloud SQL Auth Proxy.NOTE: When using a unix socket to connect to Cloud SQL using the Cloud SQL Auth Proxy, make sure the socket filename's length does not surpass the system's limit. It depends on the system, but it's usually between 91-108 characters. On Linux, the length is usually defined as 108, and you can use the following command to check:
cat/usr/include/linux/un.h|grep"define UNIX_PATH_MAX"
- Using Google Cloud SDK authentication:
Docker
To run the Cloud SQL Auth Proxy in a Docker container, use the Cloud SQL Auth Proxy Dockerimage available from theGoogle Container Registry.
You can start the Cloud SQL Auth Proxy using either TCP sockets or Unix sockets, with thecommands shown below. The options use anINSTANCE_CONNECTION_NAME asthe connection string to identify a Cloud SQL instance. You can find theINSTANCE_CONNECTION_NAME on theOverview page for yourinstance in theGoogle Cloud console. or by running thefollowing command:
gcloudsqlinstancesdescribeINSTANCE_NAME
For example:myproject:myregion:myinstance
.
Depending on your language and environment, you can start the Cloud SQL Auth Proxy using either TCP sockets or Unix sockets. Unix sockets are not supported for applications written in the Java programming language or for the Windows environment.
Using TCP sockets
dockerrun-d\\-vPATH_TO_KEY_FILE:/path/to/service-account-key.json\\-p127.0.0.1:5432:5432\\gcr.io/cloud-sql-connectors/cloud-sql-proxy:2.18.0\\--address0.0.0.0--port5432\\--credentials-file/path/to/service-account-key.jsonINSTANCE_CONNECTION_NAME
If you're using the credentials provided by your Compute Engine instance, don't include the--credentials-file
parameter and the-vPATH_TO_KEY_FILE:/path/to/service-account-key.json
line.
Always specify127.0.0.1
prefix in -p so that the Cloud SQL Auth Proxy is not exposed outside the local host. The "0.0.0.0" in the instances parameter is required to make the port accessible from outside of the Docker container.
Using Unix sockets
dockerrun-d-v/cloudsql:/cloudsql\\-vPATH_TO_KEY_FILE:/path/to/service-account-key.json\\gcr.io/cloud-sql-connectors/cloud-sql-proxy:2.18.0--unix-socket=/cloudsql\\--credentials-file/path/to/service-account-key.jsonINSTANCE_CONNECTION_NAME
If you're using the credentials provided by your Compute Engine instance, don't include the--credentials-file
parameter and the-vPATH_TO_KEY_FILE:/path/to/service-account-key.json
line.
If you are using a container optimized image, use a writeable directory in place of/cloudsql
, for example:
-v /mnt/stateful_partition/cloudsql:/cloudsql
You can specify more than one instance, separated by commas. You can also useCompute Engine metadata to dynamically determine the instances to connect to.Learn more about the Cloud SQL Auth Proxy parameters.
7. Start the psql session.
The connection string you use depends on whether you started the Cloud SQL Auth Proxy using a TCP socket ora UNIX socket or Docker.
TCP sockets
- Start the psql client:
psql"host=127.0.0.1 sslmode=disable dbname=DB_NAME user=USERNAME"
Even though the
sslmode
parameter is set todisable
, the Cloud SQL Auth Proxy does provide an encrypted connection.When you connect using TCP sockets, the Cloud SQL Auth Proxy is accessed through
127.0.0.1
. - If prompted, enter the password.
- The psql prompt appears.
Using Unix sockets
- Start the psql client:
psql"sslmode=disable host=/cloudsql/INSTANCE_CONNECTION_NAME dbname=DB_NAME user=USERNAME"
Even though the
sslmode
parameter is set todisable
, the Cloud SQL Auth Proxy does provide an encrypted connection. - Enter the password.
- The psql prompt appears.
Need help? For help troubleshooting the proxy, seeTroubleshooting Cloud SQL Auth Proxy connections, or see ourCloud SQL Support page.
What's next
- Get help troubleshooting connection issues for the Cloud SQL Auth Proxy.
- Createusers anddatabases.
- Learn more aboutprivate IP.
- Learn about options for connecting to your instance from your application.
- Learn aboutthe psql client.
- Learn aboutoptions for support.
Except as otherwise noted, the content of this page is licensed under theCreative Commons Attribution 4.0 License, and code samples are licensed under theApache 2.0 License. For details, see theGoogle Developers Site Policies. Java is a registered trademark of Oracle and/or its affiliates.
Last updated 2025-07-14 UTC.