-
Notifications
You must be signed in to change notification settings - Fork 11
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
sudo needed to execute docker #9
Comments
Ok, I'm investigating the third issue, trying to reinforce it a bit:
Finally, in the bootstrap template i added those to retrieve the secret (i need to use curl since there's no gcloud in container os)
At this stage i have a |
A lot has changed since 2020 and I've recently learned more about Cloud SQL auth. I have a better approach now than the one in this repo. I plan to write a new blog post and heavily revise the code in this repo. I'm glad this code is useful to you, though, and that you're able to iterate on it! |
Hey, I came here because I had the same issue with docker permissions. I ended up ssh'ing onto the proxy and running:
This repo/ blog post has been really helpful, although I am curious about your new approach. I know it can be hard to find the time for such an update, but by any chance, could you share some high level information about how you changed your approach? |I'm trying to set up terraform with a cloudsql instance with VPC-only access and connect my cloud run service to the DB. at the same time, I want to be able to access the DB securely with IAM permissions, so I do like this approach a lot, but if you've found something better, then I'm really interested :) |
I've noticed that container os needs sudo for using docker. Thus, the login command could be eventually modified into this maybe?
ssh -t $(gcloud compute os-login describe-profile | grep username | sed 's/username: //' | tr -d '\n')@$PROXY_IP sudo docker run --rm --network=host -it logiqx/mysql-client mysql -u root -p -h 127.0.0.1
additionally, maybe i'm wrong but...since both the proxy bastion host and the cloud sql instances lies in the same VPC, why you need to use cloud sql proxy to reach it?
Is it not supposed to be directly reachable using the private ip only?
and finally, I was wondering if having the (hi priviledged) credentials json stored in clear in the description of the VM could be a security issue....
said that, your setup is absolutely GREAT and I'm working to deploy it on my tenant atm ;)
The text was updated successfully, but these errors were encountered: