1 Answer
- Newest
- Most votes
- Most comments
1
Hello.
Because of the timeout error, I thought that the GCP Compute Engine IP address might not be allowed in the inbound rules of the security group on the RDS side.
What kind of rules are set for RDS security group settings?
Also, does RDS have public access enabled?
https://repost.aws/knowledge-center/rds-connectivity-instance-subnet-vpc
If you want to access privately, I think you need to connect AWS and GCP with a VPN etc.
https://cloud.google.com/network-connectivity/docs/vpn/tutorials/create-ha-vpn-connections-google-cloud-aws
Relevant content
- asked 10 months ago
- AWS OFFICIALUpdated 2 years ago
- AWS OFFICIALUpdated 9 months ago
- AWS OFFICIALUpdated a year ago
Hello,
Thank you for the help, I'm very new at all of this.
I was messing with the inbound security rules for the RDS, and I managed to get it to work. I added an inbound rule for "All TCP", and "0.0.0.0". However, this doesn't seem to me like it's extraordinarily safe.
Though this is mostly a side project, it does have a public-facing front, so I'm going to make sure there's no potential vulnerabilities with the security rules.
-Claire
As you know, this setting is not secure. If possible, configure MySQL's 3306 and IP addresses to only allow those from GCP Compute Engine.