Create a private connectivity configuration for the source database
Stay organized with collections
Save and categorize content based on your preferences.
This page describes how to create a private connectivity configuration.
Private connectivity configuration is Database Migration Service construct that helps
you create a peering connection between Database Migration Service service network
and your project's Virtual Private Cloud (VPC) network. You create private connectivity
configurations to establish private connections to source SQL Server
databases.
It's the same network where your source database is peered.
For more information, see the requirements section in
Private connectivity with VPC peering.
The VPC network has an available IP range with a minimum CIDR block
of /29. Database Migration Service uses this IP range to create a subnet
so that it can communicate with the source database.
Enable the Database Migration Service and Compute Engine APIs.
To get the permissions that you need to create a private connectivity
configuration, ask your administrator to grant you the
required IAM roles on your project:
For more information about granting roles, see
Manage access in the Identity and Access Management documentation.
These predefined roles contain the permissions required to create a
private connectivity configuration in Database Migration Service. To see the exact
permissions that are required, expand the
Required permissions section:
Required permissions
The following permissions are required to perform heterogeneous SQL Server
migrations with Database Migration Service:
In the Configure private connectivity section, enter the display
name for the configuration and select the region.
Make sure you use the same region where your project Virtual Private Cloud
network resides. It must be the same region where you intend to create
the migration job and connection profiles. Database Migration Service is a
fully-regional product, meaning all entities
related to your migration (source and destination connection profiles,
migration jobs, destination databases, conversion workspaces) must be saved in a
single region.
From the Authorized VPC network drop-down menu, select the VPC
that you want Database Migration Service to have private connectivity access.
This VPC needs to be the network where your source SQL Server
has a private IP assigned.
In the Allocate an IP range field, enter an IP range with a
minimum CIDR block of /29. For example:
10.72.149.40/29.
Database Migration Service creates a subnet based on that IP range in your
selected VPC. We recommend that you consult your network administrator
to acquire a suitable IP range.
For testing purposes, you can also try to generate an IP range with
Virtual Private Cloud private services access interface. Note that this automatic
allocation isn't intended for Database Migration Service private connectivity
configurations. You need to release the automatically allocated range
before you use it in Database Migration Service. Expand the following section
for more information.
Example: generate an IP range with private services access
You can generate an unoccupied IP range in your VPC network
when you create a private services access setup. You can later
release this range in the VPC configuration and use it for the
Database Migration Service private connectivity configuration.
To generate an unoccupied IP range, follow these steps:
In the Google Cloud console, go to the
VPC networks page.
From the list of networks in your project, select the one where your
source SQL Server database has a private IP assigned.
Go to the Private services access tab and click
Allocate IP range.
In the Allocate an internal IP range window, enter the following:
A display name in the Name field.
Select the Automatic option and enter 29 for the prefix
length.
Result: Your VPC network allocates an empty IP range for
private services access in your project.
Check the Internal IP range value of the new allocated range.
Note it down for later use in Database Migration Service.
Select your new IP range from the list, and click Release.
The generated IP range is now free for use in another subnet.
Enter the range you noted down in the Allocate an IP range
field when you create the private connectivity configuration
in Database Migration Service.
[[["Easy to understand","easyToUnderstand","thumb-up"],["Solved my problem","solvedMyProblem","thumb-up"],["Other","otherUp","thumb-up"]],[["Hard to understand","hardToUnderstand","thumb-down"],["Incorrect information or sample code","incorrectInformationOrSampleCode","thumb-down"],["Missing the information/samples I need","missingTheInformationSamplesINeed","thumb-down"],["Other","otherDown","thumb-down"]],["Last updated 2025-09-03 UTC."],[[["\u003cp\u003eThis feature facilitates the migration of heterogeneous SQL Server databases to AlloyDB for PostgreSQL using Database Migration Service, but is currently in a pre-GA stage with limited support.\u003c/p\u003e\n"],["\u003cp\u003ePrivate connectivity configurations are used to establish secure connections between the Database Migration Service network and a user's Virtual Private Cloud (VPC) network for source SQL Server database access.\u003c/p\u003e\n"],["\u003cp\u003eCreating a private connectivity configuration requires a VPC network meeting specific criteria, including no peering restrictions, and an available IP range with a minimum CIDR block of \u003ccode\u003e/29\u003c/code\u003e.\u003c/p\u003e\n"],["\u003cp\u003eUsers must have Database Migration Admin and Compute Network Viewer IAM roles to create a private connectivity configuration, or they can utilize custom or other predefined roles that meet the permission requirements.\u003c/p\u003e\n"],["\u003cp\u003eThe process to generate an empty IP range through the private service access on your VPC is also detailed for users to implement in their private connectivity configuration.\u003c/p\u003e\n"]]],[],null,["# Create a private connectivity configuration for the source database\n\nThis page describes how to create a private connectivity configuration.\nPrivate connectivity configuration is Database Migration Service construct that helps\nyou create a peering connection between Database Migration Service service network\nand your project's Virtual Private Cloud (VPC) network. You create private connectivity\nconfigurations to establish private connections to source SQL Server\ndatabases.\n\nFor more information about network connectivity in Database Migration Service, see\n[Network connectivity for heterogeneous SQL Server migrations](/database-migration/docs/sqlserver-to-alloydb/networking-overview)\nand\n[Source networking methods overview](/database-migration/docs/sqlserver-to-alloydb/networking-methods-source).\n\nBefore you begin\n----------------\n\n1. Ensure you have a Virtual Private Cloud network that meets the following requirements:\n - The VPC network doesn't have any [peering restrictions](/vpc/docs/vpc-peering#restrictions).\n - It's the same network where your source database is peered. For more information, see the requirements section in [Private connectivity with VPC peering](/database-migration/docs/sqlserver-to-alloydb/networking-methods-source#private-connectivity-for-source).\n - The VPC network has an available IP range with a minimum CIDR block of `/29`. Database Migration Service uses this IP range to create a subnet so that it can communicate with the source database.\n2. Enable the Database Migration Service and Compute Engine APIs. [Enable the APIs](https://console.cloud.google.com/flows/enableapi?apiid=compute.googleapis.com,datamigration.googleapis.com)\n\n### Required roles\n\nTo get the permissions that you need to create a private connectivity\nconfiguration, ask your administrator to grant you the\nrequired IAM roles on your project:\n\n- [Database Migration Admin](/iam/docs/roles-permissions/datamigration#datamigration.admin) (`roles/datamigration.admin`)\n- [Compute Network Viewer](/iam/docs/roles-permissions/compute#compute.networkViewer) (`roles/compute.networkViewer`)\n\nFor more information about granting roles, see\n[Manage access](/iam/docs/granting-changing-revoking-access) in the Identity and Access Management documentation.\n\nThese predefined roles contain the permissions required to create a\nprivate connectivity configuration in Database Migration Service. To see the exact\npermissions that are required, expand the\n**Required permissions** section: \n\n#### Required permissions\n\nThe following permissions are required to perform heterogeneous SQL Server\nmigrations with Database Migration Service:\n\n- `datamigration.* `\n- `compute.networks.list`\n\nYou might also be able to get these permissions with\n[custom roles](/iam/docs/creating-custom-roles) or other\n[predefined roles](/iam/docs/roles-permissions).\n\nCreate the configuration\n------------------------\n\nTo create a private connectivity configuration, follow these steps:\n\n1. In the Google Cloud console, go to the **Private connectivity configurations** page.\n\n [Go to Private connectivity configurations](https://console.cloud.google.com/dbmigration/private-connections)\n2. Click **Create configuration**.\n3. In the **Configure private connectivity** section, enter the display\n name for the configuration and select the region.\n\n Make sure you use the same region where your project Virtual Private Cloud\n network resides. It must be the same region where you intend to create\n the migration job and connection profiles. Database Migration Service is a\n fully-regional product, meaning all entities\n related to your migration (source and destination connection profiles,\n migration jobs, destination databases, conversion workspaces) must be saved in a\n single region.\n4. From the **Authorized VPC network** drop-down menu, select the VPC that you want Database Migration Service to have private connectivity access. This VPC needs to be the network where your source SQL Server has a private IP assigned.\n5. In the **Allocate an IP range** field, enter an IP range with a\n minimum CIDR block of `/29`. For example:\n `10.72.149.40/29`.\n\n Database Migration Service creates a subnet based on that IP range in your\n selected VPC. We recommend that you consult your network administrator\n to acquire a suitable IP range.\n\n For testing purposes, you can also try to generate an IP range with\n Virtual Private Cloud private services access interface. Note that this automatic\n allocation isn't intended for Database Migration Service private connectivity\n configurations. You need to release the automatically allocated range\n before you use it in Database Migration Service. Expand the following section\n for more information. \n\n #### Example: generate an IP range with private services access\n\n You can generate an unoccupied IP range in your VPC network\n when you create a private services access setup. You can later\n release this range in the VPC configuration and use it for the\n Database Migration Service private connectivity configuration.\n\n To generate an unoccupied IP range, follow these steps:\n 1. In the Google Cloud console, go to the **VPC networks** page.\n\n [Go to VPC networks](https://console.cloud.google.com/networking/networks/list)\n 2. From the list of networks in your project, select the one where your source SQL Server database has a private IP assigned.\n 3. Go to the **Private services access** tab and click **Allocate IP range**.\n 4. In the **Allocate an internal IP range** window, enter the following:\n 1. A display name in the **Name** field.\n 2. Select the **Automatic** option and enter `29` for the prefix\n 3. length.\n\n **Result**: Your VPC network allocates an empty IP range for\n private services access in your project.\n 5. Check the **Internal IP range** value of the new allocated range. Note it down for later use in Database Migration Service.\n 6. Select your new IP range from the list, and click **Release**.\n 7. The generated IP range is now free for use in another subnet. Enter the range you noted down in the **Allocate an IP range** field when you create the private connectivity configuration in Database Migration Service.\n6. Click **Create**.\n\nThe private connectivity configuration is now ready for use with a\n[source connection profile](/database-migration/docs/sqlserver-to-alloydb/create-source-connection-profile).\n\nWhat's next\n-----------\n\n- Learn about destination database connectivity. See\n [Destination database connectivity overview](/database-migration/docs/sqlserver-to-alloydb/networking-methods-destination).\n\n- To get a complete, step-by-step migration walkthrough, see\n [SQL Server to AlloyDB for PostgreSQL migration guide](/database-migration/docs/sqlserver-to-alloydb/guide)."]]