Configure secure database connections for Cloud SQL and other GCP-managed databases
bytebase
Cloud SQL Client
and Cloud SQL Instance User
- for Cloud SQLSecret Manager Secret Accessor
- for Secret Managerbytebase@PROJECT_ID.iam.gserviceaccount.com
bytebase@PROJECT_ID.iam.gserviceaccount.com
cloudsql_iam_authentication
= on
PROJECT_ID:REGION:INSTANCE_ID
)
bytebase
(service account name only)bytebase@PROJECT_ID.iam
(with project ID)Google Cloud SQL IAM
Secret Manager Secret Accessor
role.db-password
) and your database password as valueprojects/PROJECT_ID/secrets/SECRET_NAME
rds_superuser
.
cloudsqlsuperuser
.
GRANT role_name TO bytebase;
for all existing roles. Otherwise, Bytebase may not access existing databases or tables.Cloud SQL Instance User
rolecloudsql_iam_authentication
flag is enabledSecret Manager Secret Accessor
role