I'm new about GCP network.
I recently use Direct VPC egress. If I disable Direct VPC egress and use followed format DATABASE_URL
postgresql://user:password@localhost/db_name?host=/cloudsql/project_id:region:db_id , it works, but if I enable VPC egress, it emit an error.
couldn't listen at "/tmp/cloudsql-proxy-tmp/connection_name ~ bind: invalid argument I guess VPC subnet of VPC direct egress doesn't allow something egress ports or Internet Connection using IP, though I thought VPC network can use google private access. I know cloud SQL network separated from project VPC network thus, we must use VPC peering, but I want to use public IP only with cloud SQL proxy if we can. When we use subnetwork with Direct VPC egress, must we use private IP address of cloud SQL?


