TheCloudBaba
TheCloudBaba
  • Видео 55
  • Просмотров 31 937
01- Google Cloud VPC, Firewall Policy, Routes
Learn Google Cloud Platform (GCP) networking essentials, covering VPCs (Virtual Private Clouds), Firewall Policies, and Routes. Learn how to design, secure, and manage your network infrastructure effectively in GCP.
• Understand the core concepts of VPCs and their role in isolating and managing your cloud resources.
• Explore Firewall Policies and how they help secure your network by controlling traffic flow.
• Dive into Routes and their importance in defining the paths for network traffic in GCP.
Whether you’re a cloud enthusiast, a professional preparing for certifications, or a developer looking to optimize your GCP setup, this video is packed with insights and practical tips to elevate...
Просмотров: 35

Видео

How to use Open Policy Agent (OPA) to secure your Infrastructure using Terraform
Просмотров 9514 дней назад
Learn to secure your infrastructure using Open Policy Agent (OPA) with Terraform cloud! In this video, we’ll explore how to implement policy-as-code to enforce security best practices, prevent misconfigurations, and ensure compliance in your cloud infrastructure #terraform #policy #opa #hashicorp #aws #google
How to build ChatBoat Application in Azure
Просмотров 63 месяца назад
How to build ChatBoat Application in Azure
Securing Traffic using AWS Gateway Load balancer with Network Firewall Appliance #awscloud #aws
Просмотров 4815 месяцев назад
#aws #awscloud #security #gateway
AWS - MSK cluster and a sink connector that sends data from the cluster to an S3 bucket. #awscloud
Просмотров 5865 месяцев назад
To set up this data pipeline, you'll need an S3 bucket as the destination for the data, an MSK cluster to send data to, an IAM role with permissions to write to the S3 bucket, and a VPC endpoint to enable secure data transfer between the MSK cluster, connector, and S3 bucket within the VPC. #aws #awscloud #kafka
Overview of Apache Kafka & AWS MSK( Managed streaming for Kafka) - Demo #aws #awscloud
Просмотров 4295 месяцев назад
Amazon Managed Streaming for Apache Kafka (Amazon MSK) is a fully managed service that enables you to build and run applications that use Apache Kafka to process streaming data. Amazon MSK provides the control-plane operations, such as those for creating, updating, and deleting clusters. It lets you use Apache Kafka data-plane operations, such as those for producing and consuming data. It runs ...
Google Cloud Migration - Planning #googlecloud
Просмотров 1206 месяцев назад
Google Cloud Migration - Planning #googlecloud
Google Cloud Migration Center - Assessment #googlecloud
Просмотров 2076 месяцев назад
Google Cloud Migration Center - Assessment #googlecloud
Google Cloud Migration Center - Discovery Client #googlecloud
Просмотров 2516 месяцев назад
Google Cloud Migration Center - Discovery Client #googlecloud
Google Cloud Migration Center Discovery Manual Way #googlecloud
Просмотров 1976 месяцев назад
Google Cloud Migration Center Discovery Manual Way #googlecloud
Google Cloud Migration Center Estimation #googlecloud #google #cloudmigration
Просмотров 696 месяцев назад
cloud.google.com/migration-center/docs/migration-center-overview
modernize a legacy application running on a Windows workload - GCP #googlecloud #cloudmigration
Просмотров 936 месяцев назад
modernize a legacy application running on a Windows workload - GCP #googlecloud #cloudmigration
Learn High Level Overview of Cloud Migration and Modernization with GCP #googlecloud
Просмотров 2176 месяцев назад
High-Level Overview of Cloud Migration and Modernization with Google Cloud This is a comprehensive guide on cloud migration and modernization with Google Cloud! In this video, I have provided a high-level overview of the strategies and best practices for transitioning your IT infrastructure to the cloud and modernizing your applications using Google Cloud’s powerful tools and services.
Setting up a Cloud SQL for SQL Server DR architecture
Просмотров 2257 месяцев назад
Setting up a Cloud SQL for SQL Server DR architecture How to easily set up a DR architecture using Cloud SQL for both on-premises and other public cloud providers' SQL Server instances, through seamless replication of regular backups and subsequent import into Cloud SQL for SQL Server. Code : github.com/anudishu/example-demos-for-msft-workloads.git
Google Cloud Logging Meets Gemini AI: Simplifying Audit Logs
Просмотров 2248 месяцев назад
Google Cloud Logging Meets Gemini AI: Simplifying Audit Logs
Building a Simple Data Pipeline for Streaming Chat Conversations on GCP using terraform
Просмотров 4479 месяцев назад
Building a Simple Data Pipeline for Streaming Chat Conversations on GCP using terraform
GCP Service Account Impersonation in Terraform Simplifying Access Control
Просмотров 9079 месяцев назад
GCP Service Account Impersonation in Terraform Simplifying Access Control
How to setup Google Cloud HA VPN to Compute Engine VM with Public IP
Просмотров 280Год назад
How to setup Google Cloud HA VPN to Compute Engine VM with Public IP
Seamlessly join a Linux EC2 instance to your AWS hosted managed Active Directory
Просмотров 189Год назад
Seamlessly join a Linux EC2 instance to your AWS hosted managed Active Directory
What is AWS Directory Service and How to deploy it AWS Directory Service for Microsoft AD.
Просмотров 739Год назад
What is AWS Directory Service and How to deploy it AWS Directory Service for Microsoft AD.
Packet Mirroring in Google Cloud
Просмотров 229Год назад
Packet Mirroring in Google Cloud
Master Cross-Project External Regional Load Balancing in Shared VPC Google Cloud
Просмотров 419Год назад
Master Cross-Project External Regional Load Balancing in Shared VPC Google Cloud
How to Create Cross-region Internal Application Load Balancer Using Terraform
Просмотров 481Год назад
How to Create Cross-region Internal Application Load Balancer Using Terraform
How to Trigger Cloud Function with Pub/Sub in GCP
Просмотров 2,3 тыс.Год назад
How to Trigger Cloud Function with Pub/Sub in GCP
blurring offensive images using Cloud Functions in Google Cloud
Просмотров 139Год назад
blurring offensive images using Cloud Functions in Google Cloud
How to Secure your Application using Identity Aware Proxy
Просмотров 315Год назад
How to Secure your Application using Identity Aware Proxy
How to SSH VM instance over private IP from internet using Identity-Aware Proxy in Google Cloud
Просмотров 494Год назад
How to SSH VM instance over private IP from internet using Identity-Aware Proxy in Google Cloud
Cloud Code and Duet AI
Просмотров 78Год назад
Cloud Code and Duet AI
Google Cloud Code - Deploy Application on Kubernetes Cluster
Просмотров 135Год назад
Google Cloud Code - Deploy Application on Kubernetes Cluster
Code, debug and deploy your cloud-native applications easily with Google Cloud Code Extension
Просмотров 146Год назад
Code, debug and deploy your cloud-native applications easily with Google Cloud Code Extension

Комментарии

  • @stanislav6180
    @stanislav6180 19 дней назад

    Great video! thanks

  • @shreyojitdas9333
    @shreyojitdas9333 21 день назад

    sir when is the entire gcp lecture series coming out with projects??

    • @thecloudbaba8668
      @thecloudbaba8668 10 дней назад

      Very soon you gonna see variety of topics in one playlist for beginners.

    • @shreyojitdas9333
      @shreyojitdas9333 10 дней назад

      @thecloudbaba8668 thank you sir awaiting for gcp projects

  • @parthapaul1249
    @parthapaul1249 25 дней назад

    ulta mat chitra banaya karo, 12:46 bideshi lagta hai

  • @shubhamtarkar38
    @shubhamtarkar38 Месяц назад

    How to implement the same using app engine. I want to block all traffic from internet and only allow traffic from load balancer

    • @thecloudbaba8668
      @thecloudbaba8668 Месяц назад

      Well technically load balancer received traffic from internet only .. if you want to stop traffic coming directly to your cloud run or cloud function then you can allow it only from the LB

  • @bibhudattasahoo2174
    @bibhudattasahoo2174 Месяц назад

    I have a nginx ingress controller running in gke with a private load balancer ip , so how can I route the request from application load balancer or network load balancer to the nginx ingress controller ip .

  • @bibhudattasahoo2174
    @bibhudattasahoo2174 Месяц назад

    I have a nginx ingress controller running in gke with a private load balancer ip , so how can I route the request from application load balancer or network load balancer to the nginx ingress controller ip .

  • @ssevetFPV
    @ssevetFPV 2 месяца назад

    Why on the way from a to b the egress rt is used but when the traffic comes back from the glb it will use the transit rt?

  • @asifshabirking
    @asifshabirking 2 месяца назад

    Nicely explained

  • @lnkrishnan
    @lnkrishnan 3 месяца назад

    So, service account firewall rules will override generic firewall / tag-based firewall rules, right? Also, from looking at the VM configuration page, is it possible to ascertain whether a service account based firewall rule has been applied or not?

    • @thecloudbaba8668
      @thecloudbaba8668 2 месяца назад

      In GCP, firewall rules don’t exactly override each other, instead, they combine based on priority and rule action (allow or deny) Generally it’s not a best practice to use both together. If you have critical and very sensitive server , go for service account based firewall rule and for generic use the tag based. Hope it answers your question

  • @edwintellez6439
    @edwintellez6439 3 месяца назад

    How should I implement Apigee calling internally cloud functions as target endpoint? something like Internet user => LB => Apigee => Cloud Function

    • @thecloudbaba8668
      @thecloudbaba8668 3 месяца назад

      It’s simple. Use Apigee as internal load balancer when you configure it.. you configure you API so request can be forwarded to cloud function URL.. you can also use the PSC however you must configure your cloud function using cloud function NEG in ILB

  • @shubhamkhatri1715
    @shubhamkhatri1715 4 месяца назад

    We have below requirmnent. Can we use PSC ? We have two VPC. 1. Shared VPC ( Where our GKE cluster is running with application which need to access the cassendra running another VPC i.e STG-VPC) 2. STG-VPC ( We have VM here where our Cassendra service is running.) @TheCloudBaba

    • @thecloudbaba8668
      @thecloudbaba8668 4 месяца назад

      Yes you can use psc but for simplicity peering seems to be a good option

  • @sumitvyas210
    @sumitvyas210 4 месяца назад

    I want to use vertex ai private endpoint from my laptop. How can we use PSC in this case ?

  • @salva_next
    @salva_next 4 месяца назад

    Thanks, great video, very good explained

  • @DevopsLearning-q1z
    @DevopsLearning-q1z 5 месяцев назад

    Your content is really awesome 🎉

  • @chea1987
    @chea1987 5 месяцев назад

    Great video! But I have a question. What does PSC use to communicate? PSC NAT? Or PSC reserve network ? Or is that one and the same? There is so confusing documentation on Google for this. Please help

    • @thecloudbaba8668
      @thecloudbaba8668 5 месяцев назад

      You can think of PSC as private reserved resources becoz behind the scene it’s an ENI which takes your request privately in Google network to consume other services which is in different network.. Think of Private Service Connect as a VIP express lane that takes you directly from the airport to your terminal, bypassing the usual routes and ensuring a secure and efficient communication

    • @chea1987
      @chea1987 5 месяцев назад

      @@thecloudbaba8668 thanks. So with that being said, what IP does PSC require to communicate with attachments and the wider network ? I thought it was using its own Nat range?

  • @krishnachaitanya5965
    @krishnachaitanya5965 5 месяцев назад

    nice explanation. Thanks for sharing the knowledge sir.

  • @ghoshsuman9495
    @ghoshsuman9495 5 месяцев назад

    please provide the github url?

  • @DamienMalakay
    @DamienMalakay 5 месяцев назад

    finally someone who showed the procedure properly :) how do you setup vpn access to cloud sql? 🤔GCP likes to run those in their own VPC and so I have VPN connectivity but when I try to hit cloud sql from another project nothing happens, there has to be some sort of route that we have to make manually

    • @thecloudbaba8668
      @thecloudbaba8668 5 месяцев назад

      Private service connect is the solution.you don’t need to setup any vpn or something becoz cloud sql is owned by Google Cloud Vpc. Refer the following url cloud.google.com/sql/docs/mysql/configure-private-service-connect

    • @DamienMalakay
      @DamienMalakay 5 месяцев назад

      @@thecloudbaba8668 actually you do need VPN, it's from VPC to VPC (project to project) and therefore you do need VPN. I was able to se it up and my mistake had been that my subnets were regional as oppose to global so the cloud router was only advertising regional routes to one another. Once I made both subnets global VPN created the routes

    • @DamienMalakay
      @DamienMalakay 5 месяцев назад

      @@thecloudbaba8668 actually you do NEED VPN, the question is how you can get from one vpc to another (project to project) and gcp hosts your SQL and peers your VPC to that SQL endpoint but the other project's VPC can't get to this even if it's peered. The mistake I made was that the VPCs I created had a regional Routing Mode instead of Global. Once I set both VPCs to Global Routing, the HA VPN connection added the routes and I could get to the SQL endpoint from the other VPC

  • @ghoshsuman9495
    @ghoshsuman9495 5 месяцев назад

    Thank you

  • @WilliamHutton_GA
    @WilliamHutton_GA 6 месяцев назад

    Thanks for putting this together. Possible Extension to this would be a terraform script to configure the cloud dns. Thanks again.

  • @thanhtung2922
    @thanhtung2922 6 месяцев назад

    sir. do you know which role/permissions are required for creating the NEG ? i got the error when trying to create NEG in terraform Error: Error creating RegionNetworkEndpointGroup: googleapi: Error 403: Required 'compute.regionNetworkEndpointGroups.create' permission for 'projects/woo-pick-inventory/regions/us-central1/networkEndpointGroups/woopick-backend-cloudrun-neg-us', forbidden btw. great video series!

    • @thecloudbaba8668
      @thecloudbaba8668 6 месяцев назад

      Well, the permission which you are looking for is in the error :) see carefully in the error. It’s starts with compute.regionNetwork…….. Alternatively you can give wider role like network Adminn for simplicity Hope it helps!

  • @ravinasty
    @ravinasty 6 месяцев назад

    very well explained the complex subject

  • @zacharyh5027
    @zacharyh5027 7 месяцев назад

    Well explained. Thank you!

  • @PiyushGhosh-l4k
    @PiyushGhosh-l4k 7 месяцев назад

    Sir, I wanted to know about PROXY_PASS and upstream_server . How does this work . Is forwarding rule is PROXY_PASS ?? And backend server are instance group?

  • @PiyushGhosh-l4k
    @PiyushGhosh-l4k 7 месяцев назад

    please also explain about the GKE and GKE events !!

  • @devopsulting4862
    @devopsulting4862 8 месяцев назад

    Hi, you have created very detailed demo of AWS Directory service, however there is voice echo after 16th minute which goes on for quite sometime and is very disturbing.

  • @anandahum2572
    @anandahum2572 8 месяцев назад

    Explain this log entry is not showing to me , any idea ?

    • @thecloudbaba8668
      @thecloudbaba8668 8 месяцев назад

      Understand the logic. You can ask Gemini to explain any logs that you want to read.. this particular log is about checking my impersonator service account to verify that whether it’s creating my resources or not.. hope it helps!

  • @meenasumit
    @meenasumit 8 месяцев назад

    Thank you for the amazing content👍

  • @pxiao1
    @pxiao1 8 месяцев назад

    hi there, thanks for the amazing video! could u do a demo using gke as backend with gateway api as well? TIA!

  • @Sreedhar-Berlin
    @Sreedhar-Berlin 9 месяцев назад

    Thanks a lot Sumit , very insightful session ….Looking forward for more with terraform integration. Appreciate your lecture ❤

  • @leandrojpg
    @leandrojpg 9 месяцев назад

    Congratulations for sharing, this helps a lot, hundreds of materials explain in key terms what is very insecure. One question, don't you need to log in with gcloud before running terraform? Just setting the service account will Terraform take care of this under the hood?

    • @thecloudbaba8668
      @thecloudbaba8668 9 месяцев назад

      Yes, absolutely. Cloud auth login is needed before you run terraform..

    • @leandrojpg
      @leandrojpg 9 месяцев назад

      But understand what it looks like in automation in a real environment, why did you do this on your machine. But it's not ideal, right? what is the solution?

    • @thecloudbaba8668
      @thecloudbaba8668 9 месяцев назад

      It’s an ideal approach. When you run gclouud auth login, you get authenticated using password and MFA. This approach is secure from the key-based approach. Hope it make sense

    • @leandrojpg
      @leandrojpg 9 месяцев назад

      @@thecloudbaba8668 So this is good for you to run on your machine, right? because in an automation to use terraform this wouldn't be the best method, would it?

    • @thecloudbaba8668
      @thecloudbaba8668 9 месяцев назад

      That is the best method.. always use impersonation service account which is keyless based authentication and authorization

  • @GulabDigambarNandanvar
    @GulabDigambarNandanvar 10 месяцев назад

    This should work for the below case. 2 Diff Projects, 2 diff. network, 2 Jenkins,1 Windows JH - from the JH needs to access both Jenkins via private IP for that needs to networking. For networking, I am looking for another option like VPC peering and PSC, Can you please let me PSC will work in this use case.

    • @thecloudbaba8668
      @thecloudbaba8668 10 месяцев назад

      If you want to expose Jenkins as a service to your consumer, yes you can use PSC.. peering also works here

  • @GulabDigambarNandanvar
    @GulabDigambarNandanvar 10 месяцев назад

    PSC should be work diff-network and cross-project ?..

    • @thecloudbaba8668
      @thecloudbaba8668 10 месяцев назад

      Yup. Both separate network and project works

  • @leandrojpg
    @leandrojpg 10 месяцев назад

    Your contribution to this matter is valuable, thank you for everything.

  • @rajasekar2804
    @rajasekar2804 10 месяцев назад

    Excellent Video and perfect content. I Subscribed your channel bro. Thanks

  • @debajyotimukhopadhyay1080
    @debajyotimukhopadhyay1080 10 месяцев назад

    Very nice

  • @tusharkantisahu5649
    @tusharkantisahu5649 10 месяцев назад

    One of the best videos on NEG over internet so far..

  • @DevopsLearning-q1z
    @DevopsLearning-q1z 11 месяцев назад

    What are the permissions required at the project level and organization level

    • @thecloudbaba8668
      @thecloudbaba8668 11 месяцев назад

      Org level rolesresourcemanager.organizationAdmin or roles/compute.xpnAdmin Project level: roles/compute.networkAdmin

  • @DevopsLearning-q1z
    @DevopsLearning-q1z 11 месяцев назад

    What are the permissions required for the service account using in the terraform.

  • @boscodomingo
    @boscodomingo Год назад

    At 4:44 there's a Traffic tag option. What is that? I can't find anything in Google's own documentation

    • @thecloudbaba8668
      @thecloudbaba8668 Год назад

      I will cover this option in future video..stay tuned

  • @learndevopsonline
    @learndevopsonline Год назад

    Hey, Nice content, Sad to see you not getting views. But good one,.

  • @Pandit_001
    @Pandit_001 Год назад

    Baba

  • @VikasKhatri-u3s
    @VikasKhatri-u3s Год назад

    can we deploy same in Private GKE cluster

  • @RanjanFinancials
    @RanjanFinancials Год назад

    Good One!

  • @bankea.8153
    @bankea.8153 Год назад

    Thank you for this series! its very helpful!

  • @VikasKhatri-u3s
    @VikasKhatri-u3s Год назад

    thanks for such informative videos 💥

  • @sqlsql4304
    @sqlsql4304 Год назад

    Very well explained, please make some videos on gcp kubernetes

    • @thecloudbaba8668
      @thecloudbaba8668 Год назад

      Thanks.. Will surely cover GKE topic in future videos soon

  • @VikasKhatri-u3s
    @VikasKhatri-u3s Год назад

    if we are using shared VPC network, can we create endpoints in service projects

    • @thecloudbaba8668
      @thecloudbaba8668 Год назад

      You can but what is the use case ?

    • @VikasKhatri-u3s
      @VikasKhatri-u3s Год назад

      i want to create private uptime check but VPC information is showing only in host project not in the service project i.e monitoring project.

    • @thecloudbaba8668
      @thecloudbaba8668 Год назад

      I think you can do that.. will try to cover this use case .. could you elaborate more specific details around your requirements..

    • @VikasKhatri-u3s
      @VikasKhatri-u3s Год назад

      Thanks@@thecloudbaba8668 i would like to create private uptime check for the applications which are running on GCP VM and GKE clusters with internal IP only.

  • @RanjanFinancials
    @RanjanFinancials Год назад

    Great Sumit bhai!

  • @shadyapp7416
    @shadyapp7416 Год назад

    My vpc peering status says inactive after creation

    • @thecloudbaba8668
      @thecloudbaba8668 Год назад

      Your terraform ram successfully? If yes than pls recheck your peering code block again. There must be something that may be wrong.

    • @shadyapp7416
      @shadyapp7416 Год назад

      @@thecloudbaba8668 i figured out the problem yesterday. I was missing the vpc2 to vpc1 resource block code. I had just written code block to peer vpc1 to vpc2. Post i applied vpc2 to vpc1 peering block it changed to active immediately from inactive state.thanks