-
If you haven't already, set up a Node.js Development Environment by following the Node.js setup guide and create a project.
-
Create a Cloud SQL for PostgreSQL instance by following these instructions. Note the instance
connection nameof the instance that you create, and password that you specify for the default 'postgres' user.- If you don't want to use the default user to connect, create a user.
-
Create a database for your application by following these instructions. Note the database name.
-
Create a service account with the 'Cloud SQL Client' permissions by following these instructions. Download a JSON key to use to authenticate your connection.
-
Use the information noted in the previous steps:
export GOOGLE_APPLICATION_CREDENTIALS=/path/to/service/account/key.json
export INSTANCE_CONNECTION_NAME='<MY-PROJECT>:<INSTANCE-REGION>:<INSTANCE-NAME>'
export DB_USER='my-db-user'
export DB_PASS='my-db-pass'
export DB_NAME='my_db'Note: Defining credentials in environment variables is convenient, but not secure. For a more secure solution, use
Secret Manager to help keep secrets safe. You can then define
export CLOUD_SQL_CREDENTIALS_SECRET='projects/PROJECT_ID/secrets/SECRET_ID/versions/VERSION' to reference a secret
that stores your Cloud SQL database password. The sample app checks for your defined secret version. If a version is
present, the app retrieves the DB_PASS from Secret Manager before it connects to Cloud SQL.
Setting up the Cloud SQL database for the app requires setting up the app for local use.
- To run this application locally, download and install the
cloud_sql_proxyby following the instructions.
Instructions are provided below for using the proxy with a TCP connection or a Unix Domain Socket. On Linux or Mac OS you can use either option, but on Windows the proxy currently requires a TCP connection.
To run the sample locally with a TCP connection, set environment variables and launch the proxy as shown below.
Use these terminal commands to initialize environment variables:
export GOOGLE_APPLICATION_CREDENTIALS=/path/to/service/account/key.json
export INSTANCE_HOST='127.0.0.1'
export DB_PORT='5432'
export DB_USER='<DB_USER_NAME>'
export DB_PASS='<DB_PASSWORD>'
export DB_NAME='<DB_NAME>'Then use this command to launch the proxy in the background:
./cloud_sql_proxy -instances=<project-id>:<region>:<instance-name>=tcp:5432 -credential_file=$GOOGLE_APPLICATION_CREDENTIALS &Use these PowerShell commands to initialize environment variables:
$env:GOOGLE_APPLICATION_CREDENTIALS="<CREDENTIALS_JSON_FILE>"
$env:INSTANCE_HOST="127.0.0.1"
$env:DB_PORT="5432"
$env:DB_USER="<DB_USER_NAME>"
$env:DB_PASS="<DB_PASSWORD>"
$env:DB_NAME="<DB_NAME>"Then use this command to launch the proxy in a separate PowerShell session:
Start-Process -filepath "C:\<path to proxy exe>" -ArgumentList "-instances=<project-id>:<region>:<instance-name>=tcp:5432 -credential_file=<CREDENTIALS_JSON_FILE>"NOTE: this option is currently only supported on Linux and Mac OS. Windows users should use the Launch proxy with TCP option.
To use a Unix socket, you'll need to create a directory and give write access to the user running the proxy. For example:
sudo mkdir ./cloudsql
sudo chown -R $USER ./cloudsqlUse these terminal commands to initialize other environment variables as well:
export GOOGLE_APPLICATION_CREDENTIALS=/path/to/service/account/key.json
export INSTANCE_UNIX_SOCKET='./cloudsql/<MY-PROJECT>:<INSTANCE-REGION>:<INSTANCE-NAME>'
export DB_USER='<DB_USER_NAME>'
export DB_PASS='<DB_PASSWORD>'
export DB_NAME='<DB_NAME>'Then use this command to launch the proxy in the background:
./cloud_sql_proxy -dir=./cloudsql --instances=$INSTANCE_CONNECTION_NAME --credential_file=$GOOGLE_APPLICATION_CREDENTIALS &-
Next, install the Node.js packages necessary to run the app locally by running the following command:
npm install -
Run the sample app locally with the following command:
npm start
Navigate towards http://127.0.0.1:8080 to verify your application is running correctly.
-
To allow your app to connect to your Cloud SQL instance when the app is deployed, add the user, password, database, and instance connection name variables from Cloud SQL to the related environment variables in the
app.standard.yamlfile. The deployed application will connect via unix sockets.env_variables: DB_USER: MY_DB_USER DB_PASS: MY_DB_PASSWORD DB_NAME: MY_DATABASE # e.g. my-awesome-project:us-central1:my-cloud-sql-instance INSTANCE_CONNECTION_NAME: <MY-PROJECT>:<INSTANCE-REGION>:<INSTANCE-NAME> -
To deploy to App Engine Standard, run the following command:
gcloud app deploy app.standard.yaml -
To launch your browser and view the app at https://[YOUR_PROJECT_ID].appspot.com, run the following command:
gcloud app browse
-
Add the user, password, database, and instance connection name variables from Cloud SQL to the related environment variables in the
app.flexible.yamlfile. The deployed application will connect via unix sockets.env_variables: DB_USER: MY_DB_USER DB_PASS: MY_DB_PASSWORD DB_NAME: MY_DATABASE # e.g. my-awesome-project:us-central1:my-cloud-sql-instance INSTANCE_CONNECTION_NAME: <MY-PROJECT>:<INSTANCE-REGION>:<INSTANCE-NAME> -
To deploy to App Engine Node.js Flexible Environment, run the following command:
gcloud app deploy app.flexible.yaml -
To launch your browser and view the app at https://[YOUR_PROJECT_ID].appspot.com, run the following command:
gcloud app browse
See the Cloud Run documentation for more details on connecting a Cloud Run service to Cloud SQL.
- Build the container image:
gcloud builds submit --tag gcr.io/[YOUR_PROJECT_ID]/run-sql- Deploy the service to Cloud Run:
gcloud run deploy run-sql --image gcr.io/[YOUR_PROJECT_ID]/run-sqlTake note of the URL output at the end of the deployment process.
- Configure the service for use with Cloud Run
gcloud run services update run-sql \
--add-cloudsql-instances [INSTANCE_CONNECTION_NAME] \
--set-env-vars INSTANCE_CONNECTION_NAME=[INSTANCE_CONNECTION_NAME],\
DB_USER=[MY_DB_USER],DB_PASS=[MY_DB_PASS],DB_NAME=[MY_DB]Replace environment variables with the correct values for your Cloud SQL instance configuration.
This step can be done as part of deployment but is separated for clarity.
It is recommended to use the Secret Manager integration for Cloud Run instead of using environment variables for the SQL configuration. The service injects the SQL credentials from Secret Manager at runtime via an environment variable.
Create secrets via the command line:
echo -n $INSTANCE_CONNECTION_NAME | \
gcloud secrets create [INSTANCE_CONNECTION_NAME_SECRET] --data-file=-Deploy the service to Cloud Run specifying the env var name and secret name:
gcloud beta run deploy SERVICE --image gcr.io/[YOUR_PROJECT_ID]/run-sql \
--add-cloudsql-instances $INSTANCE_CONNECTION_NAME \
--update-secrets INSTANCE_CONNECTION_NAME=[INSTANCE_CONNECTION_NAME_SECRET]:latest,\
DB_USER=[DB_USER_SECRET]:latest, \
DB_PASS=[DB_PASS_SECRET]:latest, \
DB_NAME=[DB_NAME_SECRET]:latest- Navigate your browser to the URL noted in step 2.
For more details about using Cloud Run see http://cloud.run. Review other Node.js on Cloud Run samples.