Тёмный
TheCloudBaba
TheCloudBaba
TheCloudBaba
Подписаться
Humanity is the quality that we lack so much in real life, An Abide leaner, Cloud Architect⛅️, Love DevOps, AWS Community Builder 2023, GDE 2024, Proud Hindu 🕉️
Packet Mirroring in Google Cloud
24:57
7 месяцев назад
Cloud Code and Duet AI
12:19
8 месяцев назад
Комментарии
@user-pf8pi6ty5v
@user-pf8pi6ty5v 6 дней назад
Your content is really awesome 🎉
@chea1987
@chea1987 6 дней назад
Great video! But I have a question. What does PSC use to communicate? PSC NAT? Or PSC reserve network ? Or is that one and the same? There is so confusing documentation on Google for this. Please help
@thecloudbaba8668
@thecloudbaba8668 6 дней назад
You can think of PSC as private reserved resources becoz behind the scene it’s an ENI which takes your request privately in Google network to consume other services which is in different network.. Think of Private Service Connect as a VIP express lane that takes you directly from the airport to your terminal, bypassing the usual routes and ensuring a secure and efficient communication
@chea1987
@chea1987 6 дней назад
@@thecloudbaba8668 thanks. So with that being said, what IP does PSC require to communicate with attachments and the wider network ? I thought it was using its own Nat range?
@krishnachaitanya5965
@krishnachaitanya5965 9 дней назад
nice explanation. Thanks for sharing the knowledge sir.
@ghoshsuman9495
@ghoshsuman9495 18 дней назад
please provide the github url?
@DamienMalakay
@DamienMalakay 20 дней назад
finally someone who showed the procedure properly :) how do you setup vpn access to cloud sql? 🤔GCP likes to run those in their own VPC and so I have VPN connectivity but when I try to hit cloud sql from another project nothing happens, there has to be some sort of route that we have to make manually
@thecloudbaba8668
@thecloudbaba8668 12 дней назад
Private service connect is the solution.you don’t need to setup any vpn or something becoz cloud sql is owned by Google Cloud Vpc. Refer the following url cloud.google.com/sql/docs/mysql/configure-private-service-connect
@DamienMalakay
@DamienMalakay 12 дней назад
@@thecloudbaba8668 actually you do need VPN, it's from VPC to VPC (project to project) and therefore you do need VPN. I was able to se it up and my mistake had been that my subnets were regional as oppose to global so the cloud router was only advertising regional routes to one another. Once I made both subnets global VPN created the routes
@DamienMalakay
@DamienMalakay 12 дней назад
@@thecloudbaba8668 actually you do NEED VPN, the question is how you can get from one vpc to another (project to project) and gcp hosts your SQL and peers your VPC to that SQL endpoint but the other project's VPC can't get to this even if it's peered. The mistake I made was that the VPCs I created had a regional Routing Mode instead of Global. Once I set both VPCs to Global Routing, the HA VPN connection added the routes and I could get to the SQL endpoint from the other VPC
@ghoshsuman9495
@ghoshsuman9495 23 дня назад
Thank you
@WilliamHutton_GA
@WilliamHutton_GA Месяц назад
Thanks for putting this together. Possible Extension to this would be a terraform script to configure the cloud dns. Thanks again.
@thanhtung2922
@thanhtung2922 Месяц назад
sir. do you know which role/permissions are required for creating the NEG ? i got the error when trying to create NEG in terraform Error: Error creating RegionNetworkEndpointGroup: googleapi: Error 403: Required 'compute.regionNetworkEndpointGroups.create' permission for 'projects/woo-pick-inventory/regions/us-central1/networkEndpointGroups/woopick-backend-cloudrun-neg-us', forbidden btw. great video series!
@thecloudbaba8668
@thecloudbaba8668 Месяц назад
Well, the permission which you are looking for is in the error :) see carefully in the error. It’s starts with compute.regionNetwork…….. Alternatively you can give wider role like network Adminn for simplicity Hope it helps!
@ravinasty
@ravinasty Месяц назад
very well explained the complex subject
@zacharyh5027
@zacharyh5027 2 месяца назад
Well explained. Thank you!
@user-pc1pm1vb7p
@user-pc1pm1vb7p 2 месяца назад
Sir, I wanted to know about PROXY_PASS and upstream_server . How does this work . Is forwarding rule is PROXY_PASS ?? And backend server are instance group?
@user-pc1pm1vb7p
@user-pc1pm1vb7p 2 месяца назад
please also explain about the GKE and GKE events !!
@devopsulting4862
@devopsulting4862 3 месяца назад
Hi, you have created very detailed demo of AWS Directory service, however there is voice echo after 16th minute which goes on for quite sometime and is very disturbing.
@anandahum2572
@anandahum2572 3 месяца назад
Explain this log entry is not showing to me , any idea ?
@thecloudbaba8668
@thecloudbaba8668 3 месяца назад
Understand the logic. You can ask Gemini to explain any logs that you want to read.. this particular log is about checking my impersonator service account to verify that whether it’s creating my resources or not.. hope it helps!
@meenasumit
@meenasumit 3 месяца назад
Thank you for the amazing content👍
@pxiao1
@pxiao1 3 месяца назад
hi there, thanks for the amazing video! could u do a demo using gke as backend with gateway api as well? TIA!
@thecloudbaba8668
@thecloudbaba8668 3 месяца назад
I will try my best to create it soon
@Sreedhar-Berlin
@Sreedhar-Berlin 4 месяца назад
Thanks a lot Sumit , very insightful session ….Looking forward for more with terraform integration. Appreciate your lecture ❤
@leandrojpg
@leandrojpg 4 месяца назад
Congratulations for sharing, this helps a lot, hundreds of materials explain in key terms what is very insecure. One question, don't you need to log in with gcloud before running terraform? Just setting the service account will Terraform take care of this under the hood?
@thecloudbaba8668
@thecloudbaba8668 4 месяца назад
Yes, absolutely. Cloud auth login is needed before you run terraform..
@leandrojpg
@leandrojpg 4 месяца назад
But understand what it looks like in automation in a real environment, why did you do this on your machine. But it's not ideal, right? what is the solution?
@thecloudbaba8668
@thecloudbaba8668 4 месяца назад
It’s an ideal approach. When you run gclouud auth login, you get authenticated using password and MFA. This approach is secure from the key-based approach. Hope it make sense
@leandrojpg
@leandrojpg 4 месяца назад
@@thecloudbaba8668 So this is good for you to run on your machine, right? because in an automation to use terraform this wouldn't be the best method, would it?
@thecloudbaba8668
@thecloudbaba8668 4 месяца назад
That is the best method.. always use impersonation service account which is keyless based authentication and authorization
@GulabDigambarNandanvar
@GulabDigambarNandanvar 5 месяцев назад
This should work for the below case. 2 Diff Projects, 2 diff. network, 2 Jenkins,1 Windows JH - from the JH needs to access both Jenkins via private IP for that needs to networking. For networking, I am looking for another option like VPC peering and PSC, Can you please let me PSC will work in this use case.
@thecloudbaba8668
@thecloudbaba8668 5 месяцев назад
If you want to expose Jenkins as a service to your consumer, yes you can use PSC.. peering also works here
@GulabDigambarNandanvar
@GulabDigambarNandanvar 5 месяцев назад
PSC should be work diff-network and cross-project ?..
@thecloudbaba8668
@thecloudbaba8668 5 месяцев назад
Yup. Both separate network and project works
@leandrojpg
@leandrojpg 5 месяцев назад
Your contribution to this matter is valuable, thank you for everything.
@rajasekar2804
@rajasekar2804 5 месяцев назад
Excellent Video and perfect content. I Subscribed your channel bro. Thanks
@debajyotimukhopadhyay1080
@debajyotimukhopadhyay1080 5 месяцев назад
Very nice
@tusharkantisahu5649
@tusharkantisahu5649 6 месяцев назад
One of the best videos on NEG over internet so far..
@user-pf8pi6ty5v
@user-pf8pi6ty5v 6 месяцев назад
What are the permissions required at the project level and organization level
@thecloudbaba8668
@thecloudbaba8668 6 месяцев назад
Org level rolesresourcemanager.organizationAdmin or roles/compute.xpnAdmin Project level: roles/compute.networkAdmin
@user-pf8pi6ty5v
@user-pf8pi6ty5v 6 месяцев назад
What are the permissions required for the service account using in the terraform.
@boscodomingo
@boscodomingo 7 месяцев назад
At 4:44 there's a Traffic tag option. What is that? I can't find anything in Google's own documentation
@thecloudbaba8668
@thecloudbaba8668 7 месяцев назад
I will cover this option in future video..stay tuned
@learndevopsonline
@learndevopsonline 7 месяцев назад
Hey, Nice content, Sad to see you not getting views. But good one,.
@Pandit_001
@Pandit_001 8 месяцев назад
Baba
@user-tq1mi8iq6f
@user-tq1mi8iq6f 8 месяцев назад
can we deploy same in Private GKE cluster
@thecloudbaba8668
@thecloudbaba8668 8 месяцев назад
Yes,using IAP or bastion host
@RanjanFinancials
@RanjanFinancials 8 месяцев назад
Good One!
@bankea.8153
@bankea.8153 8 месяцев назад
Thank you for this series! its very helpful!
@user-tq1mi8iq6f
@user-tq1mi8iq6f 8 месяцев назад
thanks for such informative videos 💥
@sqlsql4304
@sqlsql4304 8 месяцев назад
Very well explained, please make some videos on gcp kubernetes
@thecloudbaba8668
@thecloudbaba8668 8 месяцев назад
Thanks.. Will surely cover GKE topic in future videos soon
@user-tq1mi8iq6f
@user-tq1mi8iq6f 8 месяцев назад
if we are using shared VPC network, can we create endpoints in service projects
@thecloudbaba8668
@thecloudbaba8668 8 месяцев назад
You can but what is the use case ?
@user-tq1mi8iq6f
@user-tq1mi8iq6f 8 месяцев назад
i want to create private uptime check but VPC information is showing only in host project not in the service project i.e monitoring project.
@thecloudbaba8668
@thecloudbaba8668 8 месяцев назад
I think you can do that.. will try to cover this use case .. could you elaborate more specific details around your requirements..
@user-tq1mi8iq6f
@user-tq1mi8iq6f 8 месяцев назад
Thanks@@thecloudbaba8668 i would like to create private uptime check for the applications which are running on GCP VM and GKE clusters with internal IP only.
@RanjanFinancials
@RanjanFinancials 9 месяцев назад
Great Sumit bhai!
@shadyapp7416
@shadyapp7416 10 месяцев назад
My vpc peering status says inactive after creation
@thecloudbaba8668
@thecloudbaba8668 10 месяцев назад
Your terraform ram successfully? If yes than pls recheck your peering code block again. There must be something that may be wrong.
@shadyapp7416
@shadyapp7416 10 месяцев назад
@@thecloudbaba8668 i figured out the problem yesterday. I was missing the vpc2 to vpc1 resource block code. I had just written code block to peer vpc1 to vpc2. Post i applied vpc2 to vpc1 peering block it changed to active immediately from inactive state.thanks
@dreY95
@dreY95 11 месяцев назад
Thank you TheCloudBaba, this is very helpful, Do you mind if you add the script here, please
@SumitKumar-rj5qr
@SumitKumar-rj5qr 11 месяцев назад
Which script ?
@rahulmadan6174
@rahulmadan6174 11 месяцев назад
Knowledgeable video thanks for sharing..!!!
@rahulmadan6174
@rahulmadan6174 11 месяцев назад
Great content.
@amitgarg3652
@amitgarg3652 11 месяцев назад
Good knowledge sharing.. :)
@amitgarg3652
@amitgarg3652 11 месяцев назад
Nicely explained 🙂
@thecloudbaba8668
@thecloudbaba8668 11 месяцев назад
Thanks Amit.
@amittiwari1800
@amittiwari1800 11 месяцев назад
Very Well explained
@gauravstar2000
@gauravstar2000 Год назад
Thank you.. very useful information.