A RetroSearch Logo

Home - News ( United States | United Kingdom | Italy | Germany ) - Football scores

Search Query:

Showing content from http://cloud.google.com/database-migration/docs/postgresql-to-alloydb/networking-methods below:

Networking methods | Database Migration Service

Skip to main content Networking methods

Stay organized with collections Save and categorize content based on your preferences.


Overview

To create a migration in Database Migration Service, connectivity must be established between the source instance and the AlloyDB destination instance. There are various methods supported. Choose the one that works best for the specific workload.

Networking method Description Advantages Disadvantages IP allowlist

This method works by configuring the source database server to accept connections from the outgoing IP of the Cloud SQL instance.

If you choose this method, then Database Migration Service guides you through the setup process during the migration creation.

Proxy via cloud-hosted VM - Reverse-SSH tunnel

Establishes connectivity from the destination to the source through a secure reverse SSH tunnel.

Requires a bastion host VM in the Google Cloud Platform project as well as a machine (for example, a laptop on the network) that has connectivity to the source.

Database Migration Service collects the required information at migration creation time, and auto-generates the script for setting it all up.

Proxy via cloud-hosted VM - TCP

Establishes connectivity from the destination to the source using a TCP proxy through a cloud hosted VM.

Database Migration Service collects the required information at migration creation time, and auto-generates the script for setting it all up.

Relevant on AlloyDB migrations where the source is on the old network architecture.

VPC peering

This method works by configuring the VPCs to communicate with one another.

Private Service Connect interfaces

Private Service Connect interfaces let your destination database initiate connections to the private IP of your source database without consuming peering quota. Instead, this connectivity method utilizes network attachments you create in your VPC.

For more information about private services access and Private Service Connect in AlloyDB for PostgreSQL, see Private IP overview in the AlloyDB for PostgreSQL documentation.

Connectivity limitations

The PostgreSQL to AlloyDB connectivity has the following limitations:

Common connectivity scenarios and solutions Migrate from a Cloud SQL instance in the old producer network architecture Figure 1. A private connection facilitated by the TCP proxy VM (click to enlarge)

To migrate from a Cloud SQL for PostgreSQL instance in the old producer network architecture, you must establish connectivity using an intermediary proxy. This is because it isn't possible to have direct connectivity between the source Cloud SQL instance and the AlloyDB destination. You can set up your own proxy solution, although we recommend setting up the TCP proxy VM with the auto-generated script provided by Database Migration Service. See TCP proxy connectivity method.

Migrate from a source in the same Google Cloud project but in a different VPC

Because the VPC in which the AlloyDB cluster resides can't be changed after the cluster is created, you have the following options:

For more information, see Create VM instances with multiple network interfaces.

Migrate over the public internet

This method is recommended when migrating from an on-premise instance or from other cloud providers, where there's no existing VPN or Interconnect connection to Google Cloud. To use this method, you need to configure your destination AlloyDB cluster to use an outbound public IP address.

Migrate from a source in a different Google Cloud project

To migrate from a source in a different Google Cloud project, you must either migrate over the internet, or, for internal Google Cloud connectivity, use a shared VPC. Select one of the following options:

Migrate without allowing the destination to reach the network of the source

This method is recommended when migrating from an on-premise network, where there's a concern of opening the network's firewall to incoming Google Cloud traffic. For this scenario, you can set up a reverse proxy using a Compute Engine instance as an intermediary proxy. We recommend using the reverse SSH connectivity method.

Except as otherwise noted, the content of this page is licensed under the Creative Commons Attribution 4.0 License, and code samples are licensed under the Apache 2.0 License. For details, see the Google Developers Site Policies. Java is a registered trademark of Oracle and/or its affiliates.

Last updated 2025-08-14 UTC.

[[["Easy to understand","easyToUnderstand","thumb-up"],["Solved my problem","solvedMyProblem","thumb-up"],["Other","otherUp","thumb-up"]],[["Hard to understand","hardToUnderstand","thumb-down"],["Incorrect information or sample code","incorrectInformationOrSampleCode","thumb-down"],["Missing the information/samples I need","missingTheInformationSamplesINeed","thumb-down"],["Other","otherDown","thumb-down"]],["Last updated 2025-08-14 UTC."],[[["Database Migration Service requires establishing connectivity between the source instance and the AlloyDB destination instance for migrations, with several methods available."],["The IP allowlist method is suitable for short-lived migrations, offering ease of configuration but transmitting network traffic over the public internet, which affects security and performance."],["Proxy methods via cloud-hosted VMs, using either Reverse-SSH tunnels or TCP proxies, are recommended for short-lived migrations and offer ease of configuration without custom firewall adjustments."],["VPC peering is a native Google Cloud solution that provides high bandwidth and is ideal for long-running or high-volume migrations, but it is only available if both source and destination are hosted in Google Cloud or are connected to the same VPC."],["For sources in different networks or on-premise instances, using a proxy or migrating over the public internet are viable options, and there are guides to aid with this process."]]],[]]


RetroSearch is an open source project built by @garambo | Open a GitHub Issue

Search and Browse the WWW like it's 1997 | Search results from DuckDuckGo

HTML: 3.2 | Encoding: UTF-8 | Version: 0.7.4