- Видео 55
- Просмотров 31 937
TheCloudBaba
Добавлен 29 авг 2022
Humanity is the quality that we lack so much in real life, An Abide leaner, Cloud Architect⛅️, Love DevOps, AWS Community Builder 2023, GDE 2024, Proud Hindu 🕉️
01- Google Cloud VPC, Firewall Policy, Routes
Learn Google Cloud Platform (GCP) networking essentials, covering VPCs (Virtual Private Clouds), Firewall Policies, and Routes. Learn how to design, secure, and manage your network infrastructure effectively in GCP.
• Understand the core concepts of VPCs and their role in isolating and managing your cloud resources.
• Explore Firewall Policies and how they help secure your network by controlling traffic flow.
• Dive into Routes and their importance in defining the paths for network traffic in GCP.
Whether you’re a cloud enthusiast, a professional preparing for certifications, or a developer looking to optimize your GCP setup, this video is packed with insights and practical tips to elevate...
• Understand the core concepts of VPCs and their role in isolating and managing your cloud resources.
• Explore Firewall Policies and how they help secure your network by controlling traffic flow.
• Dive into Routes and their importance in defining the paths for network traffic in GCP.
Whether you’re a cloud enthusiast, a professional preparing for certifications, or a developer looking to optimize your GCP setup, this video is packed with insights and practical tips to elevate...
Просмотров: 35
Видео
How to use Open Policy Agent (OPA) to secure your Infrastructure using Terraform
Просмотров 9514 дней назад
Learn to secure your infrastructure using Open Policy Agent (OPA) with Terraform cloud! In this video, we’ll explore how to implement policy-as-code to enforce security best practices, prevent misconfigurations, and ensure compliance in your cloud infrastructure #terraform #policy #opa #hashicorp #aws #google
How to build ChatBoat Application in Azure
Просмотров 63 месяца назад
How to build ChatBoat Application in Azure
Securing Traffic using AWS Gateway Load balancer with Network Firewall Appliance #awscloud #aws
Просмотров 4815 месяцев назад
#aws #awscloud #security #gateway
AWS - MSK cluster and a sink connector that sends data from the cluster to an S3 bucket. #awscloud
Просмотров 5865 месяцев назад
To set up this data pipeline, you'll need an S3 bucket as the destination for the data, an MSK cluster to send data to, an IAM role with permissions to write to the S3 bucket, and a VPC endpoint to enable secure data transfer between the MSK cluster, connector, and S3 bucket within the VPC. #aws #awscloud #kafka
Overview of Apache Kafka & AWS MSK( Managed streaming for Kafka) - Demo #aws #awscloud
Просмотров 4295 месяцев назад
Amazon Managed Streaming for Apache Kafka (Amazon MSK) is a fully managed service that enables you to build and run applications that use Apache Kafka to process streaming data. Amazon MSK provides the control-plane operations, such as those for creating, updating, and deleting clusters. It lets you use Apache Kafka data-plane operations, such as those for producing and consuming data. It runs ...
Google Cloud Migration - Planning #googlecloud
Просмотров 1206 месяцев назад
Google Cloud Migration - Planning #googlecloud
Google Cloud Migration Center - Assessment #googlecloud
Просмотров 2076 месяцев назад
Google Cloud Migration Center - Assessment #googlecloud
Google Cloud Migration Center - Discovery Client #googlecloud
Просмотров 2516 месяцев назад
Google Cloud Migration Center - Discovery Client #googlecloud
Google Cloud Migration Center Discovery Manual Way #googlecloud
Просмотров 1976 месяцев назад
Google Cloud Migration Center Discovery Manual Way #googlecloud
Google Cloud Migration Center Estimation #googlecloud #google #cloudmigration
Просмотров 696 месяцев назад
cloud.google.com/migration-center/docs/migration-center-overview
modernize a legacy application running on a Windows workload - GCP #googlecloud #cloudmigration
Просмотров 936 месяцев назад
modernize a legacy application running on a Windows workload - GCP #googlecloud #cloudmigration
Learn High Level Overview of Cloud Migration and Modernization with GCP #googlecloud
Просмотров 2176 месяцев назад
High-Level Overview of Cloud Migration and Modernization with Google Cloud This is a comprehensive guide on cloud migration and modernization with Google Cloud! In this video, I have provided a high-level overview of the strategies and best practices for transitioning your IT infrastructure to the cloud and modernizing your applications using Google Cloud’s powerful tools and services.
Setting up a Cloud SQL for SQL Server DR architecture
Просмотров 2257 месяцев назад
Setting up a Cloud SQL for SQL Server DR architecture How to easily set up a DR architecture using Cloud SQL for both on-premises and other public cloud providers' SQL Server instances, through seamless replication of regular backups and subsequent import into Cloud SQL for SQL Server. Code : github.com/anudishu/example-demos-for-msft-workloads.git
Google Cloud Logging Meets Gemini AI: Simplifying Audit Logs
Просмотров 2248 месяцев назад
Google Cloud Logging Meets Gemini AI: Simplifying Audit Logs
Building a Simple Data Pipeline for Streaming Chat Conversations on GCP using terraform
Просмотров 4479 месяцев назад
Building a Simple Data Pipeline for Streaming Chat Conversations on GCP using terraform
GCP Service Account Impersonation in Terraform Simplifying Access Control
Просмотров 9079 месяцев назад
GCP Service Account Impersonation in Terraform Simplifying Access Control
How to setup Google Cloud HA VPN to Compute Engine VM with Public IP
Просмотров 280Год назад
How to setup Google Cloud HA VPN to Compute Engine VM with Public IP
Seamlessly join a Linux EC2 instance to your AWS hosted managed Active Directory
Просмотров 189Год назад
Seamlessly join a Linux EC2 instance to your AWS hosted managed Active Directory
What is AWS Directory Service and How to deploy it AWS Directory Service for Microsoft AD.
Просмотров 739Год назад
What is AWS Directory Service and How to deploy it AWS Directory Service for Microsoft AD.
Master Cross-Project External Regional Load Balancing in Shared VPC Google Cloud
Просмотров 419Год назад
Master Cross-Project External Regional Load Balancing in Shared VPC Google Cloud
How to Create Cross-region Internal Application Load Balancer Using Terraform
Просмотров 481Год назад
How to Create Cross-region Internal Application Load Balancer Using Terraform
How to Trigger Cloud Function with Pub/Sub in GCP
Просмотров 2,3 тыс.Год назад
How to Trigger Cloud Function with Pub/Sub in GCP
blurring offensive images using Cloud Functions in Google Cloud
Просмотров 139Год назад
blurring offensive images using Cloud Functions in Google Cloud
How to Secure your Application using Identity Aware Proxy
Просмотров 315Год назад
How to Secure your Application using Identity Aware Proxy
How to SSH VM instance over private IP from internet using Identity-Aware Proxy in Google Cloud
Просмотров 494Год назад
How to SSH VM instance over private IP from internet using Identity-Aware Proxy in Google Cloud
Google Cloud Code - Deploy Application on Kubernetes Cluster
Просмотров 135Год назад
Google Cloud Code - Deploy Application on Kubernetes Cluster
Code, debug and deploy your cloud-native applications easily with Google Cloud Code Extension
Просмотров 146Год назад
Code, debug and deploy your cloud-native applications easily with Google Cloud Code Extension
Great video! thanks
sir when is the entire gcp lecture series coming out with projects??
Very soon you gonna see variety of topics in one playlist for beginners.
@thecloudbaba8668 thank you sir awaiting for gcp projects
ulta mat chitra banaya karo, 12:46 bideshi lagta hai
What do you mean ? Pls elaborate
How to implement the same using app engine. I want to block all traffic from internet and only allow traffic from load balancer
Well technically load balancer received traffic from internet only .. if you want to stop traffic coming directly to your cloud run or cloud function then you can allow it only from the LB
I have a nginx ingress controller running in gke with a private load balancer ip , so how can I route the request from application load balancer or network load balancer to the nginx ingress controller ip .
I have a nginx ingress controller running in gke with a private load balancer ip , so how can I route the request from application load balancer or network load balancer to the nginx ingress controller ip .
Why on the way from a to b the egress rt is used but when the traffic comes back from the glb it will use the transit rt?
Nicely explained
So, service account firewall rules will override generic firewall / tag-based firewall rules, right? Also, from looking at the VM configuration page, is it possible to ascertain whether a service account based firewall rule has been applied or not?
In GCP, firewall rules don’t exactly override each other, instead, they combine based on priority and rule action (allow or deny) Generally it’s not a best practice to use both together. If you have critical and very sensitive server , go for service account based firewall rule and for generic use the tag based. Hope it answers your question
How should I implement Apigee calling internally cloud functions as target endpoint? something like Internet user => LB => Apigee => Cloud Function
It’s simple. Use Apigee as internal load balancer when you configure it.. you configure you API so request can be forwarded to cloud function URL.. you can also use the PSC however you must configure your cloud function using cloud function NEG in ILB
We have below requirmnent. Can we use PSC ? We have two VPC. 1. Shared VPC ( Where our GKE cluster is running with application which need to access the cassendra running another VPC i.e STG-VPC) 2. STG-VPC ( We have VM here where our Cassendra service is running.) @TheCloudBaba
Yes you can use psc but for simplicity peering seems to be a good option
I want to use vertex ai private endpoint from my laptop. How can we use PSC in this case ?
I will make a video on this soon
Thanks, great video, very good explained
Your content is really awesome 🎉
Great video! But I have a question. What does PSC use to communicate? PSC NAT? Or PSC reserve network ? Or is that one and the same? There is so confusing documentation on Google for this. Please help
You can think of PSC as private reserved resources becoz behind the scene it’s an ENI which takes your request privately in Google network to consume other services which is in different network.. Think of Private Service Connect as a VIP express lane that takes you directly from the airport to your terminal, bypassing the usual routes and ensuring a secure and efficient communication
@@thecloudbaba8668 thanks. So with that being said, what IP does PSC require to communicate with attachments and the wider network ? I thought it was using its own Nat range?
nice explanation. Thanks for sharing the knowledge sir.
please provide the github url?
finally someone who showed the procedure properly :) how do you setup vpn access to cloud sql? 🤔GCP likes to run those in their own VPC and so I have VPN connectivity but when I try to hit cloud sql from another project nothing happens, there has to be some sort of route that we have to make manually
Private service connect is the solution.you don’t need to setup any vpn or something becoz cloud sql is owned by Google Cloud Vpc. Refer the following url cloud.google.com/sql/docs/mysql/configure-private-service-connect
@@thecloudbaba8668 actually you do need VPN, it's from VPC to VPC (project to project) and therefore you do need VPN. I was able to se it up and my mistake had been that my subnets were regional as oppose to global so the cloud router was only advertising regional routes to one another. Once I made both subnets global VPN created the routes
@@thecloudbaba8668 actually you do NEED VPN, the question is how you can get from one vpc to another (project to project) and gcp hosts your SQL and peers your VPC to that SQL endpoint but the other project's VPC can't get to this even if it's peered. The mistake I made was that the VPCs I created had a regional Routing Mode instead of Global. Once I set both VPCs to Global Routing, the HA VPN connection added the routes and I could get to the SQL endpoint from the other VPC
Thank you
Thanks for putting this together. Possible Extension to this would be a terraform script to configure the cloud dns. Thanks again.
sir. do you know which role/permissions are required for creating the NEG ? i got the error when trying to create NEG in terraform Error: Error creating RegionNetworkEndpointGroup: googleapi: Error 403: Required 'compute.regionNetworkEndpointGroups.create' permission for 'projects/woo-pick-inventory/regions/us-central1/networkEndpointGroups/woopick-backend-cloudrun-neg-us', forbidden btw. great video series!
Well, the permission which you are looking for is in the error :) see carefully in the error. It’s starts with compute.regionNetwork…….. Alternatively you can give wider role like network Adminn for simplicity Hope it helps!
very well explained the complex subject
Well explained. Thank you!
Sir, I wanted to know about PROXY_PASS and upstream_server . How does this work . Is forwarding rule is PROXY_PASS ?? And backend server are instance group?
please also explain about the GKE and GKE events !!
Hi, you have created very detailed demo of AWS Directory service, however there is voice echo after 16th minute which goes on for quite sometime and is very disturbing.
Explain this log entry is not showing to me , any idea ?
Understand the logic. You can ask Gemini to explain any logs that you want to read.. this particular log is about checking my impersonator service account to verify that whether it’s creating my resources or not.. hope it helps!
Thank you for the amazing content👍
hi there, thanks for the amazing video! could u do a demo using gke as backend with gateway api as well? TIA!
I will try my best to create it soon
Thanks a lot Sumit , very insightful session ….Looking forward for more with terraform integration. Appreciate your lecture ❤
Congratulations for sharing, this helps a lot, hundreds of materials explain in key terms what is very insecure. One question, don't you need to log in with gcloud before running terraform? Just setting the service account will Terraform take care of this under the hood?
Yes, absolutely. Cloud auth login is needed before you run terraform..
But understand what it looks like in automation in a real environment, why did you do this on your machine. But it's not ideal, right? what is the solution?
It’s an ideal approach. When you run gclouud auth login, you get authenticated using password and MFA. This approach is secure from the key-based approach. Hope it make sense
@@thecloudbaba8668 So this is good for you to run on your machine, right? because in an automation to use terraform this wouldn't be the best method, would it?
That is the best method.. always use impersonation service account which is keyless based authentication and authorization
This should work for the below case. 2 Diff Projects, 2 diff. network, 2 Jenkins,1 Windows JH - from the JH needs to access both Jenkins via private IP for that needs to networking. For networking, I am looking for another option like VPC peering and PSC, Can you please let me PSC will work in this use case.
If you want to expose Jenkins as a service to your consumer, yes you can use PSC.. peering also works here
PSC should be work diff-network and cross-project ?..
Yup. Both separate network and project works
Your contribution to this matter is valuable, thank you for everything.
Excellent Video and perfect content. I Subscribed your channel bro. Thanks
Very nice
One of the best videos on NEG over internet so far..
What are the permissions required at the project level and organization level
Org level rolesresourcemanager.organizationAdmin or roles/compute.xpnAdmin Project level: roles/compute.networkAdmin
What are the permissions required for the service account using in the terraform.
At 4:44 there's a Traffic tag option. What is that? I can't find anything in Google's own documentation
I will cover this option in future video..stay tuned
Hey, Nice content, Sad to see you not getting views. But good one,.
Baba
can we deploy same in Private GKE cluster
Yes,using IAP or bastion host
Good One!
Thank you for this series! its very helpful!
thanks for such informative videos 💥
Very well explained, please make some videos on gcp kubernetes
Thanks.. Will surely cover GKE topic in future videos soon
if we are using shared VPC network, can we create endpoints in service projects
You can but what is the use case ?
i want to create private uptime check but VPC information is showing only in host project not in the service project i.e monitoring project.
I think you can do that.. will try to cover this use case .. could you elaborate more specific details around your requirements..
Thanks@@thecloudbaba8668 i would like to create private uptime check for the applications which are running on GCP VM and GKE clusters with internal IP only.
Great Sumit bhai!
My vpc peering status says inactive after creation
Your terraform ram successfully? If yes than pls recheck your peering code block again. There must be something that may be wrong.
@@thecloudbaba8668 i figured out the problem yesterday. I was missing the vpc2 to vpc1 resource block code. I had just written code block to peer vpc1 to vpc2. Post i applied vpc2 to vpc1 peering block it changed to active immediately from inactive state.thanks