GCP Flashcards
Cloud Composer
Fully managed workflow orchestration service built on Apache Workflow.
Create, Schedule, Monitor, Manage workflows.
DAG - Directed Acyclic Graphs
Create Instances
gcloud compute instances create gcelab2 –machine-type n1-standard-2 –zone us-central1-f
SSH into created VM machine
gcloud compute ssh gcelab2 –zone us-central1-f
Check windows machine is up
gcould compute instances get-serial-port-output instance-1 –zone us-central1-a
Reset password of windows machine
gcloud compute reset-windows-password instance-1 –zone us-central1-a –user admin
Check the project from gcloud
gcloud config list project
Fetch set values
gcloud config get-value compute/zone
Create kubeconfig entry for kubernetes cluster
gcloud container clusters get-credentials gcelab2
Resource Hierarchy
Google Cloud resources are organized hierarchically. This allows us to map the enterprise’s operational structure to GCP, and to manage access control and permissions for groups of related resources.
Top-level node - Organization resource
provides central visibility and control over all resources.
Next in the hierarchy are Folders.
Used for isolating requirements for different departments and teams.
Next in the hierarchy are Projects.
They contain computing, storage and networking resources.
What is Cloud Identity
A unified identity, access, app, and endpoint management (IAM/EMM) platform.
- give users access to apps with single sign on
- multi factor authentication
- endpoint management enforces policies for personal and corporate devices.
BeyondCorp
Google’s Zero trust solution, that let’s employees work from anywhere without having to log into VPN.
BeyondCorp allows for single sign-on, access control policies, access proxy, and user- and device-based authentication and authorization. The BeyondCorp principles are:
- Access to services must not be determined by the network from which you connect
- Access to services is granted based on contextual factors from the user and their device
- Access to services must be authenticated, authorized, and encrypted
VPC Service Controls
Used to create perimeters that protect the resources and data of services specified.
Following controls:
1. Clients within a perimeter do not have access to resources outside the perimeter.
2. Data cannot be copied to unauthorized resources outside the perimeter.
3. Data exchange between clients and resources separated by perimeter is secured by ingress and egress rules.
4. Context-aware access to resources is based on client attributes.
Created at the organization level.
Cloud Computing
- On-demand self-service
- Broad network access
- Resource Pooling
- Rapid Elasticity
- Measured service
Edge network location
Information served from here for lowest latency.
Zone
The zone is not a single DC. They are independent geographic areas.