Tuesday, November 19, 2013

Re: Authorized networks

Authorizing the client network is required because in order to support the per-use mode of operation. The Cloud SQL Admin API [1] should make it possible to automate updating the authorized network for an instance though.


-- Razvan ME


On Tue, Nov 19, 2013 at 12:34 AM, Mike Gagnon <mike.gagnon1@gmail.com> wrote:
Hi,

I'm wondering if there's a debugging feature that would allow (during development time) to connect to MySQL from an unauthorized network.  I'm working from home and use a dynamic DNS, so this is less than ideal- I don't want to have to pay for static IP just to be able to develop on the cloud...  Or am I missing something?

Thanks!
Mike

--
You received this message because you are subscribed to the Google Groups "Google Cloud SQL discuss" group.
To unsubscribe from this group and stop receiving emails from it, send an email to google-cloud-sql-discuss+unsubscribe@googlegroups.com.
To view this discussion on the web visit https://groups.google.com/d/msgid/google-cloud-sql-discuss/3d672313-6b99-48da-a928-4ed25275ed79%40googlegroups.com.
For more options, visit https://groups.google.com/groups/opt_out.

--
You received this message because you are subscribed to the Google Groups "Google Cloud SQL discuss" group.
To unsubscribe from this group and stop receiving emails from it, send an email to google-cloud-sql-discuss+unsubscribe@googlegroups.com.
To view this discussion on the web visit https://groups.google.com/d/msgid/google-cloud-sql-discuss/CA%2BUvTg2Hb-1V2dTDe7QRRLBQtVj72DO%3DeW6CQ0a_jd8Z0FYyTg%40mail.gmail.com.
For more options, visit https://groups.google.com/groups/opt_out.

No comments:

Post a Comment