arrow_back

Implementing Cloud SQL (Azure)

Sign in Join
Test and share your knowledge with our community!
done
Get access to over 700 hands-on labs, skill badges, and courses

Implementing Cloud SQL (Azure)

Lab 1 hour 30 minutes universal_currency_alt 5 Credits show_chart Introductory
Test and share your knowledge with our community!
done
Get access to over 700 hands-on labs, skill badges, and courses

You were recently hired by an IT enterprise which uses Google Cloud as its principle cloud service provider. As an SQL Database expert, you are tasked to research and adopt the SQL services offered by Google Cloud. Some of your main concerns are:

  • Deployment
  • Security
  • App integration
  • Connectivity methods

Azure Diagram Since you have been working with Azure in your previous post, you know how to deploy SQL Server. The pricing model is based on a customizable amount of database transaction units (DTUs) categorized in various options targeting different use scenarios.

In Azure, you use the following:

  • A proxy implementation to ensure secure connection to your database.
  • An HTTP load balancer to maintain database availability of your application.

You can use a variety of methods to connect several applications that you have previously deployed, including the following methods:

  • Connection strings
  • Web app services integration
  • Cloud SQL using private IP addresses.

Now you will explore how you can use Cloud SQL features to build and connect a security-aware database to an application.

Overview

In this lab, you configure a Cloud SQL server and learn how to connect an application to it via a proxy over an external connection. You also configure a connection over a Private IP link that offers performance and security benefits. The app we chose to demonstrate in this lab is Wordpress, but the information and best practices are applicable to any application that needs SQL Server.

By the end of this lab, you will have 2 working instances of the Wordpress frontend connected over 2 different connection types to their SQL instance backend, as shown in this diagram:

SQL Lab Diagram

Objectives

In this lab, you learn how to perform the following tasks:

  • Create a Cloud SQL database
  • Configure a virtual machine to run a proxy
  • Create a connection between an application and Cloud SQL
  • Connect an application to Cloud SQL using Private IP address

Setup

For each lab, you get a new Google Cloud project and set of resources for a fixed time at no cost.

  1. Sign in to Qwiklabs using an incognito window.

  2. Note the lab's access time (for example, 1:15:00), and make sure you can finish within that time.
    There is no pause feature. You can restart if needed, but you have to start at the beginning.

  3. When ready, click Start lab.

  4. Note your lab credentials (Username and Password). You will use them to sign in to the Google Cloud Console.

  5. Click Open Google Console.

  6. Click Use another account and copy/paste credentials for this lab into the prompts.
    If you use other credentials, you'll receive errors or incur charges.

  7. Accept the terms and skip the recovery resource page.

Task 1. Create a Cloud SQL database

In this task, you configure a SQL server according to Google Cloud best practices and create a Private IP connection.

  1. On the Navigation menu (Navigation menu icon), click SQL.
  2. Click Create instance.
  3. Click Choose MySQL.
  4. Specify the following, and leave the remaining settings as their defaults:
Property Value
Instance ID wordpress-db
Root password type a password
Cloud SQL edition Enterprise
Database Version MySQL 5.7
Region
Zone Any
Note: Note the root password; it will be used in a later step and referred to as [ROOT_PASSWORD].
  1. Expand Show configuration options.

  2. Expand the Machine type section.

  3. Provision the right amount of vCPU and memory. To choose a Machine Type, click the dropdown menu, and then explore your options.

Note: A few points to consider:

  • Shared-core machines are good for prototyping, and are not covered by Cloud SLA.
  • Each vCPU is subject to a 250 MB/s network throughput cap for peak performance. Each additional core increases the network cap, up to a theoretical maximum of 2000 MB/s.
  • For performance-sensitive workloads such as online transaction processing (OLTP), a general guideline is to ensure that your instance has enough memory to contain the entire working set and accommodate the number of active connections.
    1. For this lab, select Dedicated core from the dropdown menu, and then select 1 vCPU, 3.75 GB.

    2. Next, expand the Storage section and then choose Storage type and Storage capacity.

    Note: A few points to consider:

  • SSD (solid-state drive) is the best choice for most use cases. HDD (hard-disk drive) offers lower performance, but storage costs are significantly reduced, so HDD may be preferable for storing data that is infrequently accessed and does not require very low latency.
  • There is a direct relationship between the storage capacity and its throughput.
    1. Click each of the capacity options to see how it affects the throughput. Reset the option to 10GB.
    Note: Setting your storage capacity too low without enabling an automatic storage increase can cause your instance to lose its SLA.
    1. Expand the Connections section.

    2. Select Private IP.

    3. In the Network dropdown, select default.

    4. Click the Set up Connection button that appears.

    5. In the panel to the right, click Enable API, click Use an automatically allocated IP range, click Continue, and then click Create Connection.

    6. Click Create Instance at the bottom of the page to create the database instance.

    Note: You might have to wait for the Private IP changes to propagate before the Create button becomes clickable.

    Click Check my progress to verify the objective. Create a Cloud SQL instance

    Task 2. Configure a proxy on a virtual machine

    When your application does not reside in the same VPC connected network and region as your Cloud SQL instance, use a proxy to secure its external connection.

    In order to configure the proxy, you need the Cloud SQL instance connection name.

    Note: The lab comes with 2 virtual machines preconfigured with Wordpress and its dependencies. You can view the startup script and service account access by clicking on a virtual machine name. Notice that we used the principle of least privilege and only allow SQL access for that VM. There's also a network tag and a firewall preconfigured to allow port 80 from any host.
    1. On the Navigation menu (Navigation menu icon) click Compute Engine.

    2. Click SSH next to wordpress-proxy.

    3. Download the Cloud SQL Proxy and make it executable:

    wget https://dl.google.com/cloudsql/cloud_sql_proxy.linux.amd64 -O cloud_sql_proxy && chmod +x cloud_sql_proxy

    In order to start the proxy, you need the connection name of the Cloud SQL instance. Keep your SSH window open and return to the Cloud Console.

    1. On the Navigation menu (Navigation menu icon), click SQL.

    2. Click on the wordpress-db instance and wait for a green checkmark next to its name, which indicates that it is operational (this could take a couple of minutes).

    3. Note the Instance connection name; it will be used later and referred to as [SQL_CONNECTION_NAME].

    4. In addition, for the application to work, you need to create a table. Click Databases.

    5. Click Create database, type wordpress, which is the name the application expects, and then click Create.

    6. Return to the SSH window and save the connection name in an environment variable, replacing [SQL_CONNECTION_NAME] with the unique name you copied in a previous step:

    export SQL_CONNECTION=[SQL_CONNECTION_NAME]
    1. To verify that the environment variable is set, run:
    echo $SQL_CONNECTION

    The connection name should be printed out.

    1. To activate the proxy connection to your Cloud SQL database and send the process to the background, run the following command:
    ./cloud_sql_proxy -instances=$SQL_CONNECTION=tcp:3306 &

    The expected output is:

    Listening on 127.0.0.1:3306 for [SQL_CONNECTION_NAME] Ready for new connections
    1. Press ENTER.
    Note: The proxy will listen on 127.0.0.1:3306 (localhost) and proxy that connects securely to your Cloud SQL over a secure tunnel using the machine's external IP address.

    Click Check my progress to verify the objective. Create a database and configure a proxy on a Virtual Machine

    Task 3. Connect an application to the Cloud SQL instance

    In this task, you will connect a sample application to the Cloud SQL instance.

    1. Configure the Wordpress application. To find the external IP address of your virtual machine, query its metadata:
    curl -H "Metadata-Flavor: Google" http://169.254.169.254/computeMetadata/v1/instance/network-interfaces/0/access-configs/0/external-ip && echo
    1. Go to the wordpress-proxy external IP address in your browser and configure the Wordpress application.

    2. Click Let's Go.

    3. Specify the following, replacing [ROOT_PASSWORD] with the password you configured upon machine creation, and leave the remaining settings as their defaults:

    Property Value
    Database Name wordpress
    Username root
    Password [ROOT_PASSWORD]
    Database Host 127.0.0.1
    Note: You are using 127.0.0.1, localhost as the Database IP because the proxy you initiated listens on this address and redirects that traffic to your SQL server securely.
    1. Click Submit.

    2. When a connection has been made, click Run the installation to instantiate Wordpress and its database in your Cloud SQL. This might take a few moments to complete.

    3. Populate your demo site's information with random information and click Install Wordpress. You won't have to remember or use these details.

    Note: Installing Wordpress might take up to 3 minutes, because it propagates all its data to your SQL Server.
    1. When a 'Success!' window appears, remove the text after the IP address in your web browser's address bar and press ENTER.
      You'll be presented with a working Wordpress Blog!

    Task 4. Connect to Cloud SQL via internal IP

    If you can host your application in the same region and VPC connected network as your Cloud SQL, you can leverage a more secure and performant configuration using Private IP.

    By using Private IP, you will increase performance by reducing latency and minimize the attack surface of your Cloud SQL instance because you can communicate with it exclusively over internal IPs.

    1. In the Cloud Console, on the Navigation menu (Navigation menu icon), click SQL.
    2. Click wordpress-db.
    3. Note the Private IP address of the Cloud SQL server; it will be referred to as [SQL_PRIVATE_IP].
    4. On the Navigation menu, click Compute Engine.
    Note: Notice that wordpress-private-ip is located at , where your Cloud SQL is located, which enables you to leverage a more secure connection.
    1. Copy the external IP address of wordpress-private-ip, paste it in a browser window, and press ENTER.

    2. Click Let's Go.

    3. Specify the following, and leave the remaining settings as their defaults:

    Property Value
    Database Name wordpress
    Username root
    Password type the [ROOT_PASSWORD] configured when the Cloud SQL instance was created
    Database Host [SQL_PRIVATE_IP]
    1. Click Submit.
    Note: Notice that this time you are creating a direct connection to a Private IP, instead of configuring a proxy. That connection is private, which means that it doesn't egress to the internet and therefore benefits from better performance and security.
    1. Click Run the installation.
      An 'Already Installed!' window is displayed, which means that your application is connected to the Cloud SQL server over private IP.

    2. In your web browser's address bar, remove the text after the IP address and press ENTER.
      You'll be presented with a working Wordpress Blog!

    Task 5. Review

    In this lab, you created a Cloud SQL database and configured it to use both an external connection over a secure proxy and a Private IP address, which is more secure and performant. Remember that you can only connect via Private IP if the application and the Cloud SQL server are collocated in the same region and are part of the same VPC network. If your application is hosted in another region, VPC, or even project, use a proxy to secure its connection over the external connection.

    Now that you have a deeper understanding of creating and configuring a database in Cloud SQL, let’s take a look into some of the similarities and differences between Google Cloud SQL and Azure SQL.

    Similarities:

    • Azure and Google Cloud manage the infrastructure of the databases to include the instances, backups, updates, and failover.
    • Both Cloud SQL and Azure SQL deploy a proxy to securely receive connections outside your VPC.
    • Both services create a connection using a connection string.
    • Both services can use an internal IP to directly connect an application and a SQL server instance if they are collocated within the same region and are part of the same VPC network, by using only internal IP addresses you can improve security because no public connections are allowed this way.

    Differences:

    • The specifications for creating a SQL Server are conceived differently between Google Cloud and Azure. In Azure, you choose between categories, DTUs, and defined storage. In Google Cloud, you directly specify the number of CPUs and storage needed.
    • In Google Cloud you have a built-in database authentication (user-password) and you can implement Cloud SQL Auth proxy and Cloud SQL connector libraries to provide access based on IAM. While in Azure, you can use policies to define how requests are going to be admitted. You can also use either a Redirect method (by default) or a Proxy Connection Policy to process the request. Azure Active Directory Authentication is also supported.
    • In Cloud Cloud you connect to the instance by using Cloud SQL with two main options:
      • Cloud SQL Auth Proxy: A secure tunnel without the need for an authorized network or SSL; authentication and authorization is through Identity and Access Management (IAM) and OAuth 2.0
      • Private IP: A private connection between your VPC network and the underlying Google service producer's VPC network

    End your lab

    When you have completed your lab, click End Lab. Google Cloud Skills Boost removes the resources you’ve used and cleans the account for you.

    You will be given an opportunity to rate the lab experience. Select the applicable number of stars, type a comment, and then click Submit.

    The number of stars indicates the following:

    • 1 star = Very dissatisfied
    • 2 stars = Dissatisfied
    • 3 stars = Neutral
    • 4 stars = Satisfied
    • 5 stars = Very satisfied

    You can close the dialog box if you don't want to provide feedback.

    For feedback, suggestions, or corrections, please use the Support tab.

    Copyright 2022 Google LLC All rights reserved. Google and the Google logo are trademarks of Google LLC. All other company and product names may be trademarks of the respective companies with which they are associated.