Google Cloud Tools
Google Cloud tools make it easier to connect your agents to Google Cloud’s products and services. With just a few lines of code you can leverage these tools to connect your agents with:
- millions of custom APIs which developers host in Apigee,
- 100s of prebuilt connectors to enterprise systems like salesforce, workday and SAP
- Automation workflows built using application integration
- Databases like Spanner, AlloyDB, Postgres and more using the MCP Toolbox for databases
1. Use an API from Apigee API Hub
ApiHubToolset lets you turn any documented API from Apigee API hub into a tool with a few lines of code. This section shows you the step by step instructions including setting up authentication for a secure connection to your APIs.
Prerequisites
- Install ADK
- Install the Google Cloud CLI.
- Apigee API hub instance with documented (i.e. OpenAPI spec) APIs
- Set up your project structure and create required files
Create an API Hub Toolset and add it to your agent
Note: this tutorial includes an agent creation. If you already have an agent, you can only follow subset of these steps.
-
Get your access token, so that APIHubToolset can fetch spec from API Hub API. In your terminal run the following command
-
Ensure that the account used has the required permissions. You can use the pre-defined role
roles/apihub.viewer
or assign the following permissions:- apihub.specs.get (required)
- apihub.apis.get (optional)
- apihub.apis.list (optional)
- apihub.versions.get (optional)
- apihub.versions.list (optional)
- apihub.specs.list (optional)
-
Create a tool with
APIHubToolset
. Add the below totools.py
If your API requires authentication, you must configure authentication for the tool. The following code sample demonstrates how to configure an API key. ADK supports token based auth (API Key, Bearer token), service account, and OpenID Connect. We will soon add support for various OAuth2 flows.
from google.adk.tools.openapi_tool.auth.auth_helpers import token_to_scheme_credential from google.adk.tools.apihub_tool.apihub_toolset import APIHubToolset # Provide authentication for your APIs. Not required if your APIs don't required authentication. auth_scheme, auth_credential = token_to_scheme_credential( "apikey", "query", "apikey", apikey_credential_str ) sample_toolset_with_auth = APIHubToolset( name="apihub-sample-tool", description="Sample Tool", access_token="...", # Copy your access token generated in step 1 apihub_resource_name="...", # API Hub resource name auth_scheme=auth_scheme, auth_credential=auth_credential, )
For production deployment we recommend using a service account instead of an access token. In the code snippet above, use
service_account_json=service_account_cred_json_str
and provide your security account credentials instead of the token.For apihub_resource_name, if you know the specific ID of the OpenAPI Spec being used for your API, use
`projects/my-project-id/locations/us-west1/apis/my-api-id/versions/version-id/specs/spec-id`
. If you would like the Toolset to automatically pull the first available spec from the API, use`projects/my-project-id/locations/us-west1/apis/my-api-id`
-
Create your agent file Agent.py and add the created tools to your agent definition:
-
Configure your `__init__.py` to expose your agent
-
Start the Google ADK Web UI and try your agent.
Then go to http://localhost:8000 to try your agent from the Web UI.
2. Connect to Enterprise Applications and Integration workflows
With ApplicationIntegrationToolset you can seamlessly give your agents a secure and governed to enterprise applications using Integration Connector’s 100+ pre-built connectors for systems like Salesforce, ServiceNow, JIRA, SAP, and more. Support for both on-prem and SaaS applications.
In addition you can turn your existing Application Integration process automations into agentic workflows by providing application integration workflows as tools to your ADK agents.
Prerequisites
- Install ADK
- An existing Application Integration workflow or Integrations Connector connection you want to use with your agent
-
To use tool with default credentials: have Google Cloud CLI installed. See installation guide. Run :
-
Set up your project structure and create required files
When running the agent, make sure to run adk web in project_root_folder
Connect your agent to enterprise applications using Integration Connectors
-
To use a connector from Integration Connectors, you need to provision Application Integration in the same region as your connection, import and publish Connection Tool from the template library.
-
Create a tool with
ApplicationIntegrationToolset
from google.adk.tools.application_integration_tool.application_integration_toolset import ApplicationIntegrationToolset connector_tool = ApplicationIntegrationToolset( project="test-project", # TODO: replace with GCP project of the connection location="us-central1", #TODO: replace with location of the connection connection="test-connection", #TODO: replace with connection name entity_operations={"Entity_One": ["LIST","CREATE"], "Entity_Two": []},#empty list for actions means all operations on the entity are supported. actions=["action1"], #TODO: replace with actions service_account_credentials='{...}', # optional tool_name="tool_prefix2", tool_instructions="..." )
Note: You can provide service account to be used instead of using default credentials
To find the list of supported entities and actions for a connection, use the connectors apis:
listActions, listEntityTypes -
Add the tool to your agent. Update your
agent.py
file -
Configure your `__init__.py` to expose your agent
-
Start the Google ADK Web UI and try your agent.
Then go to http://localhost:8000, and choose my_agent agent (same as the agent folder name)
Use existing Application Integration workflow as a tool for your agent
-
Create a tool with
ApplicationIntegrationToolset
integration_tool = ApplicationIntegrationToolset( project="test-project", # TODO: replace with GCP project of the connection location="us-central1", #TODO: replace with location of the connection integration="test-integration", #TODO: replace with integration name trigger="api_trigger/test_trigger",#TODO: replace with trigger id service_account_credentials='{...}', #optional tool_name="tool_prefix1", tool_instructions="..." )
Note: You can provide service account to be used instead of using default credentials
-
Add the tool to your agent. Update your
agent.py
file -
Configure your `__init__.py` to expose your agent
-
Start the Google ADK Web UI and try your agent.
Then go to http://localhost:8000, and choose my_agent agent (same as the agent folder name)
3. Toolbox Tools for Databases
MCP Toolbox for Databases is an open source MCP server for databases. It was designed with enterprise-grade and production-quality in mind. It enables you to develop tools easier, faster, and more securely by handling the complexities such as connection pooling, authentication, and more.
Google’s Agent Development Kit (ADK) has built in support for Toolbox. For more information on getting started or configuring Toolbox, see the documentation.
Before you begin
Configure and deploy Toolbox server
Toolbox is an open source server that you deploy and manage yourself. For more instructions on deploying and configuring, see the official Toolbox documentation:
Install client SDK
ADK relies on the toolbox-langchain
python package to use Toolbox. Install the package before getting started:
Loading Toolbox Tools
Once you’ve Toolbox server is configured and up and running, you can load tools from your server using the ADK:
from google.adk.tools.toolbox_tool import ToolboxTool
toolbox = ToolboxTool("https://127.0.0.1:5000")
# Load a specific set of tools
tools = toolbox.get_toolset(toolset_name='my-toolset-name'),
# Load single tool
tools = toolbox.get_tool(tool_name='my-tool-name'),
root_agent = Agent(
...,
tools=tools # Provide the list of tools to the Agent
)
Advanced Toolbox Features
Toolbox has a variety of features to make developing Gen AI tools for databases. For more information, read more about the following features:
- Authenticated Parameters: bind tool inputs to values from OIDC tokens automatically, making it easy to run sensitive queries without potentially leaking data
- Authorized Invocations: restrict access to use a tool based on the users Auth token
- OpenTelemetry: get metrics and tracing from Toolbox with OpenTelemetry