How to limit public IPs on Google Cloud
ฝัง
- เผยแพร่เมื่อ 24 ก.ค. 2024
- Public IPs can pose a security risk to your cloud infrastructure. In this episode of Networking End to End, we show how administrators can use GCP Organization Policies to limit virtual machines, load balancers, VPN Gateways and Google Kubernetes Engine (GKE) clusters from accidentally opening up endpoints on the internet.
Time stamps:
0:00 - Intro
0:18 - Why are public IPs a risk?
0:56 - Intro to Org Policies
1:59 - Compute Engine IP org policy constraint
3:24 - VPN Gateway IP org policy constraint
3:44 - Load Balancer IP org policy constraint
4:18 - Restricting GKE services
4:57- Conclusion
Organization policy constraints on GCP → goo.gle/2Yl4LJq
Watch more episodes of Networking End to End → goo.gle/NetworkingEndToEnd
Subscribe to get all the episodes as they come out → goo.gle/GCP
Follow Stephanie on Twitter → @swongful
#NetworkingEndToEnd
Product: Networking; fullname: Stephanie Wong; - วิทยาศาสตร์และเทคโนโลยี
I'm a student on the #Andela Scholarship programme for Cloud, these vids and this channel are indispensable. Thank you so much.
So glad to hear Amber - mission accomplished 👍
Good Message & Knowledge 👍 MAY GOD BLESS YOU 💖 AMEEN 💖
Wow very nice
am in Associate Google Cloud Engineering Certification Course inproggress . so is this in our parts of course of study or in an Archrecture streem ? please i like way of demonstration inorder to revise and stick help me answering
It is a very new feature, so probably isn't in the current certification. But it could be in the future (in particular the Networking exam), but I don't have certainty!
it could be better if we can set SUBNET instead project or instance... I don't want public IPs in my private subnet...
💪🏽💪🏽💪🏽
GCP is gonna give AWS, Azure a real tough competition.
🙌