Pls Academy Pca Student Slides 1 2301
Pls Academy Pca Student Slides 1 2301
pls-academy-pca-student-slides-1-2301
The information in this presentation is classified:
Thank you!
Source Materials
Google Cloud Skills Boost for Partners
Some of this program's content has been sourced from the ● Preparing for the Professional Cloud Architect Journey
following resources: ● Essential Google Cloud Infrastructure: Foundation
● Essential Google Cloud Infrastructure: Core Services
● Google Cloud certification site
● Elastic Google Cloud Infrastructure: Scaling and
● Google Cloud documentation
Automation
● Google Cloud console
● Getting Started with Google Kubernetes Engine
● Google Cloud courses and workshops
● Google Cloud white papers ● Reliable Google Cloud Infrastructure: Design and
Process
● Google Cloud Blog
● Google Cloud YouTube channel ● Logging, Monitoring and Observability in Google Cloud
● Google Cloud samples
● Google codelabs
● Google Cloud partner-exclusive resources
● Identity Management Technical Deep Dive
● Access Management Technical Deep Dive
This material is shared with you under the terms of your
● Cloud Foundations: Cost Control Technical Deep Dive
Google Cloud Partner Non-Disclosure Agreement. [PSO Y22]
● Cloud Foundations: Networking Technical Deep Dive |
PSO | Y21
● GCP Networking Portfolio overview - LATAM (slides) |
Partners | Pre-Sales | Y20
● These slides are available in the Student Lecture section of your Qwiklabs classroom.
Certification is just one step on your professional journey. Google Cloud also offers
our partners access to advanced solutions training, and a new quality-focused
program called Delivery Readiness Index (DRI) to help you achieve service
excellence with your customers.
Benchmark your skills with DRI
DRI helps to benchmark partner proficiency and capability at any point during
the customer journey however should be used primarily as a lead measure to
predict and prepare for partner delivery success.
With the DRI insights, we can prescriptively advise the partner project team on
the ground and bridge niche capability gaps.
DRI also takes action. For partner consultants, DRI generates a tailored L&D
plan that prescribes personalized learning, training, and skill development to
build GCP proficiency.
Google Cloud Skills Boost for Partners
https://partner.cloudskillsboost.google/
● Hands-on labs
● Skill Badges
● Helpful Links:
○ Getting started on Partner Advantage
○ Join Partner Advantage
○ Get help accessing Partner Advantage
https://www.partneradvantage.goog
Note the top section, “Getting Started & User Guides” and two key documents →
Direct Partners to this if they need to enroll into Partner Advantage
1. Logging in to the Partner Advantage Portal - Quick Reference Guide
2. Enrolling in the Partner Advantage Program - Quick Reference Guide
Please Note
● After a user self-registers, they receive an email that essentially states:
○ “Hi {Partner Name}, you are one step away from joining the Google
Cloud Partner Advantage Community. Please click to continue with the
○ user registration process. See you in the cloud, The Partner Advantage
Team
● Once registered, they can access limited content until their Partner
Administrator approves the user
● Their Partner Administrator also receive an email notifying them that a
member of their organization has registered themselves on their organization’s
Google Cloud Partner Advantage account.
○ It also states that this user has limited access to the portal
○ They are provided instructions on how to review and provision the
appropriate access for the user that has registered
● Once their admin approves the user, they receive an email that states:
○ Hi {User Name}, Your Partner Administrator has updated your access
to the Google Cloud Partner Advantage portal. You have been granted
edit access to additional account information on the portal on behalf of
your organization to help build your business. For additional access
needs, please work with your Partner Administrator. See you in the
cloud, The Partner Advantage Team
The net takeaway is, on the Support Page (the first link on this slide) Google Cloud
Partner Advantage Support, there’s a section “Issue accessing Partner Advantage
Portal? Click here for troubleshooting steps”
● The source of their issue can be related to the different items shown
● Additionally, there’s a Partner Administrator / Partner Adminstrator Team at
their partner organization that has to approve their access.. Until that step is
completed, they will have access issues/limitation. They will need to identify
who this person or team is at their organization
Program issues or concerns?
https://cloud.google.com/certification/cloud-architect
02
Certification
Academy Content
Learning Path - Partner Certification Academy Website
Go to: https://rsvp.withgoogle.com/events/partner-learning/google-cloud-certifications
Click
Click here Professional
Cloud
Architect
Needed for
Exam
Voucher
Needed for
Exam
Voucher
Accessing PDF copies of workshop slide decks
Go to Click “Join” to create
googlecloud.qwiklabs.com a new account
Creating an account
Click the
purple box
Downloading the lecture notes Click the
download icon to
Select the download the
Lecture PDF
Notes tab
Select a
Student
Guide Book
Important: You must allocate time between each weekly session to study and familiarize yourself with any
prerequisite knowledge that will be covered in the workshops. You will not pass the exam if you don’t put in
the work.
Experienced with AWS or Azure?
Welco
me
Speed your learning journey with:
● Google Cloud Fundamentals for Azure Professionals
● Google Cloud Fundamentals for AWS Professionals
● Compare AWS and Azure services to Google Cloud
2. Un-enroll and re-enroll in the Professional Cloud Architect learning path (if
applicable)
This week’s 3. Review the exam guide to assess your own level of expertise and readiness
recommend
4. Familiarize yourself with exam Sample Questions
activities
5. Complete Module 1 content
■ Firewall rules
○ Compute Engine
Virtual Private
Speech-to-Text Text-to-Speech Video Intelligence
■ Machine types API
Cloud
■ Pricing
■ Images Cloud Firewall
Cloud Routes Cloud NAT Compute Engine
Rules
■ Storage options
■ Snapshots
■ Migration Migrate for
Filestore Persistent Disk Persistent Disk Migrate to Containers
Snapshot Compute Engine
Machine learning APIs…
Google Cloud machine learning spectrum
Vertex AI: Custom Training Vertex AI: Auto ML Pre-trained ML models (many more are available)
(via ML frameworks)
your training data + Google’s training data + Google’s models
your training data + your Google’s models
model
Vision
Video Intelligence
Natural language Cloud Cloud Natural Video Recommendations
Translation Translation API Language API Intelligence API
scikit-learn BigQuery ML API
Data tables
But increasingly, you don’t have to do that. Google makes the power of ML available
to you even if you have a limited knowledge of ML. You can use AutoML to build on
Google's ML capabilities to create your own custom ML models that are tailored to
specific business needs, and then integrate those models into applications and web
sites.
Alternatively, Google has a range of pre-trained ML models that are ready for
immediate use within applications in ways that the respective APIs are designed to
support. Such pretrained models are excellent ways to replace user input with ML.
Proprietary + Confidential - DO NOT share outside of your Google Cloud partner organization
Vertex AI
https://cloud.google.com/vertex-ai
Google Cloud machine learning spectrum
Vertex AI: Custom Training Vertex AI: Auto ML Pre-trained ML models (many more are available)
(via ML frameworks)
your training data + Google’s training data + Google’s models
your training data + your Google’s models
model
Vision
Video Intelligence
Natural language Cloud Cloud Natural Video Recommendations
Translation Translation API Language API Intelligence API
scikit-learn BigQuery ML API
Data tables
BigQuery ML
discussed next
Without needing to move your data out of BigQuery, with BigQuery ML, you can train
and deploy machine learning models directly using SQL. That means you've got data
storage, data analytics, and machine learning all within BigQuery.
Proprietary + Confidential - DO NOT share outside of your Google Cloud partner organization
Vision
Video Intelligence
Natural language Cloud Cloud Natural Video Recommendations
Translation Translation API Language API Intelligence API
scikit-learn BigQuery ML API
Data tables
Pre-trained ML models
discussed next
Use the Vision API to understand image content
https://cloud.google.com/vision
Let’s start with the Vision API. There are three major components that all roll up into
this REST API, and behind-the-scenes each of these are powered by many ML
models and years of research.
The first is detecting what an image is and classifying it. The Vision API picks out the
dominant entity, for example a car or a cat, within an image from a broad set of object
categories. This allows you to easily detect broad sets of objects in your images.
Facial detection can detect when a face appears in photos, along with associated
facial features such as eye, nose and mouth placement, and likelihood of over 8
attributes like joy and sorrow. Facial recognition however, isn’t supported and Google
doesn’t store facial detection information on any Google server. You can use the API
to easily build metadata on your image catalog, enabling new scenarios like image
based searches or recommendations.
Next, are images with text, like scanned documents or signs. The Vision API uses
optical character recognition, or OCR, to extract the text of a wide range of languages
into a selectable, searchable format.
Lastly is a bit of intuition from the web and uses the power of Google Image Search.
Does the image contain entities we know, like the Eiffel tower or a famous person?
Landmark detection allows you to identify popular natural and manmade structures,
along with the associated latitude and longitude of the landmark, and logo detection
allows you to identify product logos within an image.
You can build metadata on your image catalog, extract text, moderate offensive
content, or enable new marketing scenarios through image sentiment analysis. You
can also analyze images uploaded in the request or integrate with an image storage
on Cloud Storage.
Derive insights from unstructured text with the Cloud
Natural Language API
https://cloud.google.com/natural-language
The Cloud Natural Language API offers a variety of natural language understanding
technologies. It can do syntax analysis, breaking down sentences into tokens, identify
the nouns, verbs, adjectives, and other parts of speech, and figuring out the
relationships among the words.
It can also do entity recognition, in other words, it can parse text and flag mentions of
people, organizations, locations, events, products and media.
https://cloud.google.com/translate
The Cloud Translation API provides a simple programmatic interface for translating an
arbitrary string into any supported language. The Cloud Translation API is highly
responsive, so websites and applications can integrate with the API for fast, dynamic
translation of source text from the source language to a target language, for example
from French to English. Language detection is also available in cases where the
source language is unknown.
Make your media more discoverable with the
Video Intelligence API
https://cloud.google.com/video-intelligence
If you don’t know much about this API, watch this video
(https://www.youtube.com/watch?v=_IeS1m8r6SY), which is accessible from the site
above. It’s a nice overview of the capabilities.
The Video Intelligence API allows users to use Google video analysis technology as
part of their applications. The REST API enables users to annotate videos stored in
Cloud Storage with video and 1 frame-per-second contextual information. It helps you
identify key entities -- that is, nouns -- within your video, and when they occur. You
can use it to make video content searchable and discoverable.
The API supports the annotation of common video formats, including .MOV, .MPEG4,
.MP4, and .AVI.
Use the Speech-to-Text /Text-to-Speech APIs to
convert speech to text and vice versa
Text-to-Speech
Speech-to-Text
https://cloud.google.com/speech-to-text
https://cloud.google.com/text-to-speech
The Text-to-Speech API converts text into human-like speech in more than 180 voices
across more than 30 languages and variants. It applies research in speech synthesis
and Google's powerful neural networks to deliver high-fidelity audio. With this API, you
can create lifelike interactions with users that transform customer service, device
interaction, and other applications.
Vision
Video Intelligence
Natural language Cloud Cloud Natural Video Recommendations
Translation Translation API Language API Intelligence API
scikit-learn BigQuery ML API
Data tables
AutoML Vision
Derive insights from images in
the cloud or at the edge.
AutoML
https://cloud.google.com/automl
VPC Network…
Google Cloud Network
PoPs and network
It is designed to give customers the highest possible throughput and lowest possible
latencies for their applications.
The network interconnects at more than 90 Internet exchanges and more than 100
points of presence worldwide. When an Internet user sends traffic to a Google
resource, Google’s edge caching nodes respond to users requests from an Edge
Network location that will provide the lowest latency.
VPC objects
Virtual
Private
● Projects ● IP addresses Cloud
● Networks
○ Internal, external, range
○ Default, auto mode,
● Virtual machines (VMs)
custom mode
● Subnetworks ● Routes
● Zones
With Google Cloud, you can provision your Google Cloud resources, connect them to
each other, and isolate them from each other in a Virtual Private Cloud. You can also
define fine-grained networking policies within Google Cloud, and between Google
Cloud and on-premises or other public clouds. Essentially, VPC is a comprehensive
set of Google-managed networking objects, which we will explore in detail throughout
this module.
VPC networks
● Created within projects, which means there is no cross-project communication
by default. More on that soon.
● Global resources, for example: VM in US can communicate with a VM in
APAC
● Private RFC 1918 IP range
● Can be non RFC 1918 IP range
Subnets
● Are part of a VPC network
● Regional objects
● VMs which are zonal resources are allocated with an IP from a subnet in the
same region
● Do not provide network boundaries. VMs can communicate across subnets.
● However, default firewall rules deny traffic between VMs regardless of
subnets.
Subnet creation modes
Welco
me Default Auto Mode Custom Mode
Every project is provided with a default VPC network with preset subnets and firewall
rules. Specifically, a subnet is allocated for each region with non-overlapping CIDR
blocks and firewall rules that allow ingress traffic for ICMP, RDP, and SSH traffic from
anywhere, as well as ingress traffic from within the default network for all protocols
and ports.
In an auto mode network, one subnet from each region is automatically created within
it. The default network is actually an auto mode network. These automatically created
subnets use a set of predefined IP ranges with a /20 mask that can be expanded to
/16. All of these subnets fit within the 10.128.0.0/9 CIDR block. Therefore, as new
Google Cloud regions become available, new subnets in those regions are
automatically added to auto mode networks using an IP range from that block.
A custom mode network does not automatically create subnets. This type of network
provides you with complete control over its subnets and IP ranges. You decide which
subnets to create, in regions you choose, and using IP ranges you specify within the
RFC 1918 address space. These IP ranges cannot overlap between subnets of the
same network.
Now, you can convert an auto mode network to a custom mode network to take
advantage of the control that custom mode networks provide. However, this
conversion is one way, meaning that custom mode networks cannot be changed to
auto mode networks. So, carefully review the considerations for auto mode networks
to help you decide which type of network meets your needs.
VMs must have internal IP and can have external
IP addresses
Internet
Internal IP External IP
● Allocated from subnet range to ● Assigned from pool (ephemeral)
VMs by DHCP ● Alternatively, can reserve (static)
● Alternatively, can reserve (static) external IP address
internal IP address ● Bring Your Own IP address (BYOIP)
IP addresses
https://cloud.google.com/compute/docs/ip-addresses
Proprietary + Confidential
VM alias IP range:
Routes automatically created for primary and alias IP
10.2.1.0/24
ranges for the subnet of the primary network
interface
Alias IP overview
https://cloud.google.com/vpc/docs/alias-ip
VMs can connect to multiple VPCs
Welco
● me
VMs have Multi-NIC support (8 max)
○ Each NIC must connect to a different VPC
network
○ Allows communication between VPCs using
private IPs
● Are other ways to accomplish private IP
communication between VPCs, such as
○ VPC Peering
○ VPN
○ These will be discussed later
● A and B can communicate over internal IPs even though they are in different regions.
● C and D must communicate over external IPs even though they are in the same region.
On this slide, we have an example of a project that contains 5 networks. All of these
networks span multiple regions across the world, as you can see on the right.
VMs C and D, however, are not in the same network. Therefore, by default, these
VMs must communicate using their external IP addresses, even though they are in
the same region. The traffic between VMs C and D isn’t actually touching the public
internet, but is going through the Google Edge routers. This has different billing and
security ramifications that we will explore later.
Routes map traffic to destination networks
●
Welco
Managed at the VPC level
●
●
me
Applies to traffic egressing a VM
Enables VMs on same network (VPC) to communicate via private IP
○ Only if it is allowed by a firewall rule
● Automatically created when a subnet is created
● Can manually create static/custom routes
○ Next hop can be: Instance IP or name, Cloud VPN, Internal TCP/UDP load balancer, default
internet gateway
● Routes can be selectively applied to
○ All instances, instances with specific network tags, instances with specific service accounts
● Internet access is enabled by a default route (priority=1000)
○ Applies to VMs with external IPs
○ No gateway or public component needed
Routes
https://cloud.google.com/vpc/docs/routes
Subnet routes
● System-generated. Added for each subnet.
● Allows routing between subnets.
● Non Removable and non overridable.
● Exchanged with VPC Peering, and by default through Cloud Router. More on
that in a later slide.
● The narrowest possible IP range, which means it cannot be overridden.
Static routes
● Considered a custom route
● Manually added by users
● Next hop can be: Instance IP or name, Cloud VPN, Internal TCP/UDP load
balancer, default internet gateway
Dynamic routes
● Considered a custom route
● Added by Cloud Router through a BGP session
● Next hop is alway the BGP peer
Unlike other cloud providers, internet access is enabled by a default route
(priority=1000). No gateway or public component is needed.
● It doesn’t mean all VM’s have internet access. an external IP on VM’s is
needed for public Internet access.
● Removable with caveats
○ A public internet route to destination of Google API’s is needed for
Private Google Access
○ Cloud CDN requires the default internet route
VPC Firewall rules protect your VM instances from
Welco
unapproved connections
me
● VPC network functions as a distributed firewall. ● Consist of:
Google Cloud firewall rules protect your virtual machine instances from unapproved
connections, both inbound and outbound, known as ingress and egress, respectively.
Essentially, every VPC network functions as a distributed firewall.
Google Cloud firewall rules provide effective protection and traffic control regardless
of the operating system your instances use. Google Cloud firewall rules are defined
for the VPC network as a whole, and since VPC networks can be global in Google
Cloud, firewall rules are also global.
Although firewall rules are applied to the network as a whole, connections are allowed
or denied at the instance level. You can think of the firewall as existing not only
between your instances and other networks, but between individual instances within
the same network.
Google Cloud firewall rules are stateful. This means that if a connection is allowed
between a source and a target or a target and a destination, all subsequent traffic in
either direction will be allowed. In other words, firewall rules allow bidirectional
communication once a session is established.
Also, if for some reason, all firewall rules in a network are deleted, there is still an
implied "Deny all" ingress rule and an implied "Allow all" egress rule for the network.
Creating Firewall Rules
● When creating rules, specify
○ Source
■ Could be the internet (0.0.0.0/0 IP range)
■ Individual or ranges of IPv4 or IPv6
addresses
■ Could be VMs with specific network tags or
Will revisit the
last 2 after the service accounts
service ○ Target - Defines which VMs the rule applies to
account ■ All instances in the network
discussion ■ VMs with specific network tags
■ VM’s with service accounts
All VPCs have implied firewall rules
Implied IPv4/IPv6 firewall rules are present in all VPC networks
Implied IPv4 firewall rules are present in all VPC networks, regardless of how the
networks are created, and whether they are auto mode or custom mode VPC
networks. The default network has the same implied rules.
● Implied IPv4 allow egress rule. An egress rule whose action is allow,
destination is 0.0.0.0/0, and priority is the lowest possible (65535) lets any
instance send traffic to any destination, except for traffic blocked by Google
Cloud.
● Implied IPv4 deny ingress rule. An ingress rule whose action is deny, source
is 0.0.0.0/0, and priority is the lowest possible (65535) protects all instances by
blocking incoming connections to them. A higher priority rule might allow
incoming access.
If IPv6 is enabled, the VPC network also has these two implied rules:
● Implied IPv6 allow egress rule. An egress rule whose action is allow,
destination is ::/0, and priority is the lowest possible (65535) lets any instance
send traffic to any destination, except for traffic blocked by Google Cloud. A
higher priority firewall rule may restrict outbound access. Internet access is
allowed if no other firewall rules deny outbound traffic and if the instance has
an external IP address.
● Implied IPv6 deny ingress rule. An ingress rule whose action is deny, source
● is ::/0, and priority is the lowest possible (65535) protects all instances by
blocking incoming connections to them. A higher priority rule might allow
incoming access.
The implied rules cannot be removed, but they have the lowest possible priorities.
For more information on implied rules check out the link in the speaker notes.
● Link: cloud.google.com/vpc/docs/firewalls#default_firewall_rules
Default VPCs have additional allow rules
Rule Description
In Google Cloud, all projects get a default VPC created automatically. In addition to
the implied rules, the default VPC network is pre-populated with firewall rules that
allow incoming, or ingress, traffic to instances.The first rule is default-allow-internal
which allows ingress connections for all protocols and ports among instances within
the VPC network. It effectively permits incoming connections to VM instances from
others in the same network.
The other three rules in the default network are default-allow-ssh, default-allow-rdp
and default-allow-icmp.These rules allow port 22 - secure shell (ssh), port 3389 -
remote desktop protocol (RDP), and ICMP traffic respectively, from any source IP
address to any instance in the VPC network.
As you may have noticed some of these rules can be a little dangerous. These rules
can (and should) be deleted or modified as necessary.
Hierarchical firewall policies Hierarchical firewall policies
VPC firewall rules
Hierarchical firewall policies let you create and enforce a consistent firewall policy
across your organization. You can assign hierarchical firewall policies to the
organization as a whole or to individual folders. These policies contain rules that can
explicitly deny or allow connections, as do Virtual Private Cloud (VPC) firewall rules.
In addition, hierarchical firewall policy rules can delegate evaluation to lower-level
policies or VPC network firewall rules with a goto_next action. Lower-level rules
cannot override a rule from a higher place in the resource hierarchy. This lets
organization-wide admins manage critical firewall rules in one place.
By default, all hierarchical firewall policy rules apply to all VMs in all projects under the
organization or folder where the policy is associated. However, you can restrict which
VMs get a given rule by specifying a target network or target service account. The
levels of the hierarchy at which firewall rules can now be applied are represented in
the diagram, shown here. The yellow boxes near the top represent hierarchical
firewall policies, while the blue boxes at the bottom represent VPC firewall rules.
Network pricing (subject to change)
Traffic type Price
Ingress No charge
Egress to a different Google Cloud service (within same region; exceptions) No charge
Egress between regions within the US and Canada (per GB) $0.01
Egress between regions, not including traffic between US regions Varies by region
This table is from the Compute Engine documentation, and it lists the price of each
traffic type.
First of all, ingress or traffic coming into Google Cloud’s network is not charged,
unless there is a resource such as a load balancer that is processing ingress traffic.
Responses to requests count as egress and are charged.
The rest of this table lists egress or traffic leaving a virtual machine. Egress traffic to
the same zone is not charged, as long as that egress is through the internal IP
address of an instance. Also, egress traffic to Google products, like YouTube, Maps,
Drive, or traffic to a different Google Cloud service within the same region is not
charged for.
However, there is a charge for egress between zones in the same region, egress
within a zone if the traffic is through the external IP address of an instance, and
egress between regions.
As for the difference in egress traffic to the same zone, Compute Engine cannot
determine the zone of a virtual machine through the external IP address. Therefore,
this traffic is treated like egress between zones in the same region.
Also, there are some exceptions, and pricing can always change, so please refer to
the documentation page.
Bring your own IP (BYOIP)
Bring your own IP (BYOIP) lets you provision and use your own public IPv4 addresses for
Google Cloud resources.
After the IP addresses are imported, Google Cloud manages them in the same way as
Google-provided IP addresses, with these exceptions:
● The IP addresses are available only to the customer who imported them
● There are no charges for idle or in-use IP addresses.
(NAT Gateway)
Cloud NAT is Google’s managed network address translation service. It lets you
provision your application instances without public IP addresses, while also allowing
them to access the internet in a controlled and efficient manner. This means your
private instances can access the internet for updates, patching, configuration
management, and more.
In this diagram, Cloud NAT enables two private instances to access an update server
on the internet, which is referred to as outbound NAT. However, Cloud NAT does not
implement inbound NAT. In other words, hosts outside your VPC network cannot
directly access any of the private instances behind the Cloud NAT gateway. This helps
you keep your VPC networks isolated and secure.
Suggested lab: Multiple VPC Networks (if time allows)
https://partner.cloudskillsboost.google/catalog_lab/1031
https://partner.cloudskillsboost.google/catalog_lab/1031
VPC peering
Welco
● VMs in different VPC networks cannot communicate over private IPs by default
me
● VPC Peering connects two VPC Networks
○ As long as there are no overlapping subnet IP ranges
○ Networks can be in the same project, different projects or different
organizations
● Traffic latency within a peering group is the same as if they were the same VPC
network
Network Network
Subnet Subnet
10.0.0.0/9 10.128.0.0/9
Subnet Subnet
192.168.0.128/25 192.168.0.0/25
Private IP
Project customer-prod Project service-prod
VPC Network Peering allows private RFC 1918 connectivity across two VPC
networks, regardless of whether they belong to the same project or the same
organization.
Now, remember that each VPC network will have firewall rules that define what traffic
is allowed or denied between the networks.
For example, in this diagram there are two organizations that represent a consumer
and a producer, respectively. Each organization has its own organization node, VPC
network, VM instances, Network Admin and Instance Admin. In order for VPC
Network Peering to be established successfully, the Producer Network Admin needs
to peer the Producer Network with the Consumer Network, and the Consumer
Network Admin needs to peer the Consumer Network with the Producer Network.
When both peering connections are created, the VPC Network Peering session
becomes Active and routes are exchanged This allows the VM instances to
communicate privately, using their internal IP addresses.
https://partner.cloudskillsboost.google/catalog_lab/935
Shared VPC
allows an organization to connect resources from multiple projects to a common VPC
network so that they can communicate with each other securely and efficiently using
internal IPs from that network. When you use Shared VPC, you designate a project as
a host project and attach one or more other service projects to it. The VPC networks
in the host project are called Shared VPC networks. Eligible resources from service
projects can use subnets in the Shared VPC network. Eligible resources include
Compute Engine resources, GKE clusters, and App Engine flexible instances.
1. Implement the security best practice of least privilege for network admin,
auditing, and access control. Shared VPC admins delegate admin tasks to
admins in the shared network without allowing service project admins to make
1. network-affecting changes. They can only create and manage instances that
use the shared VPC.
2. Apply and enforce consistent access control policies at the network level for
multiple service projects.
Shared VPC
In this diagram, the Shared VPC Admin configured the Web Application Project to be
a host project with subnet-level permissions. Doing so allowed the Shared VPC
Admin to selectively share subnets from the VPC network.
Next, the Shared VPC Admin attached the three service projects to the host project
and gave each project owner the Network User role for the corresponding subnets.
Each project owner then created VM instances from their service projects in the
shared subnets. By the way, billing for those VM instances is attributed to the project
where the resources are created, which are the service projects.
Shared VPC Admins have full control over the resources in the host project, including
administration of the shared VPC network. They can optionally delegate the Network
Admin and Security Admin roles for the host project. Overall, shared VPC is a
centralized approach to multi-project networking because security and network policy
occurs in a single designated VPC network.
For a demo on how to create VM instances in a Shared VPC network, please refer
here:
https://storage.googleapis.com/cloud-training/gcpnet/student/M3_Demo_SharedVPC.
mp4
Shared VPC vs. VPC peering
Now, that we’ve talked about Shared VPC and VPC Network Peering, let’s compare
both of these configurations to help you decide which is appropriate for a given
situation.
● Web servers
● Containerized
microservices
● Data-logging
processing
● Media transcoding
● Large-scale Java
applications
Tau VMs ideal for scale-out workloads including web servers, containerized
microservices, data-logging processing, media transcoding, and large-scale Java
applications.
Compute
WelcomeOptimized Machine Types
Memory Optimized Machine Types
Welcome
Accelerator
WelcomeOptimized Machine Types
CUDA:
Nvidia calls its parallel processing platform CUDA. CUDA Cores are the processing
units inside a GPU just like AMD’s Stream Processors.
Shielded VMs
Confidential Computing w/Confidential VMs
Confidential Computing
Google Cloud encrypts data at-rest and in-transit, but customer data must be
decrypted for processing. Confidential Computing is a breakthrough technology which
encrypts data in-use—while it is being processed. Confidential Computing
environments keep data encrypted in memory and elsewhere outside the central
processing unit (CPU).
Sole Tenant Nodes
● A physical Compute Engine server that is
dedicated to hosting only your project's VMs
● Use cases
○ Meet security or compliance requirements
with workloads that require physical isolation
from other workloads or VMs
○ Meet dedicated hardware requirements for
bring your own license (BYOL) scenarios that
require per-core or per-processor licenses
Bare Metal
With Bare Metal Solution, you can bring your specialized workloads to Google Cloud,
allowing you access and integrate with GCP services with minimal latency.
Bare Metal Solution is a managed solution that provides purpose-built HPE or Atos
bare-metal servers in regional extensions that are connected to Google Cloud by a
managed, high-performance connection with a low-latency network fabric.
With Bare Metal Solution, Google Cloud provides and manages the core
infrastructure, the network, the physical and network security, and hardware
monitoring capabilities in an environment from which you can access all of the Google
Cloud services. The core infrastructure includes secure, controlled-environment
facilities, and power.
The Bare Metal Solution also includes the provisioning and maintenance of the
custom, sole-tenancy hardware with local SAN, and smart hands support.
This is why we’re excited to introduce Bare Metal Solution: to jumpstart the migration
of applications that have been holding back your cloud adoption.
Bare Metal Solution consists of all the infrastructure you need to run your specialized
workload such as Oracle Database close to Google Cloud. This infrastructure is
connected with a dedicated, low-latency and highly resilient interconnect, and
connects to all native Google Cloud services. Bare Metal Solution uses OEM
hardware that is certified to run multiple enterprise applications, most of which can be
migrated to this infrastructure with little or no change, minimizing the risk of migration
while simultaneously increasing its velocity.
Bare Metal Solution also comes with automation tools to help you onboard your
environment quickly—provisioning your applications, relational databases, configuring
popular operating systems and setting up services such as backups and monitoring.
The management interface will be familiar to your existing IT teams or systems
integrator, allowing you to leverage your investments in existing tools, processes and
personnel.
VMware Engine: VMware-as-a-Service
Note: You might have valid reasons for running a particular instance at very low or
very high utilization. Machine type recommendations are suggestions to help you
more efficiently use your instances, but they might not be appropriate for every
situation.
Preemptible and Spot VMs
● A highly discounted VM compared to the price of standard VMs
○ Discount of 60-91% discount
○ Availability depends on having excess compute capacity in a zone
■ May or may not have availability in a given zone at a given time
■ Will have to try another zone or wait for the resource to be available
● Compute Engine might stop preemptible/spot instances at any time due to system
events
○ Preemptible VMs - always stopped after they run for 24 hours.
■ May be stopped before the 24 hour time period
■ When restarted, the 24 hour clock resets
○ Spot VMs - stopped/deleted when Google needs the resource elsewhere
■ Spot VMs are the latest version of preemptible VMs
■ Can specify termination or deletion when creating the VM
Preemptible VM instances
https://cloud.google.com/compute/docs/instances/preemptible
Spot VMs
https://cloud.google.com/spot-vms
https://cloud.google.com/compute/docs/instances/spot
Preemptible/Spot VMs - additional details
● Offer the same machine types, options, and performance as regular compute instances
● Use cases
○ Stateless and scalable workloads that can be stopped and checkpointed in less
than 30 seconds, or is location and hardware flexible
● Provides no live migration or automatic restart during maintenance events
● Not covered by Service Level Agreement due to the preceding limitations,
● No free tier
Tip: Look through all the links in Top 5 use cases for Google Cloud Spot VMs explained + best
practices
Compute Engine Pricing
Welco
●
me
Based on per-second usage of:
○ Machine types
○ Persistent disks
○ Other resources you select for your VMs
● Estimate cost with with Google Cloud Pricing Calculator
● Manage Costs with:
○ Sustained use discounts
○ Committed Use Discounts (CUDs)
○ Preemptible VMs
○ Spot VMs
Pricing for Compute Engine is based on per-second usage of the machine types,
persistent disks, and other resources that you select for your virtual machines.
● You pay only for the compute time that you use.
● If you have a specific project in mind, use the pricing calculator to estimate
cost.
Compute Engine lets you purchase and renew committed use discounts in return for
deeply discounted prices for VM usage. These discounts are referred to as
resource-based committed use discounts.
● Committed use discounts are ideal for workloads with predictable resource
needs.
● When you purchase a committed use contract, you purchase Compute Engine
resources—such as vCPUs, memory, GPUs, local SSDs, and sole-tenant
nodes—at a discounted price in return for committing to paying for those
resources for 1 year or 3 years.
Premptible VMs
If your apps are fault-tolerant and can withstand possible instance preemptions, then
preemptible instances can reduce your Compute Engine costs significantly. For
example, batch processing jobs can run on preemptible instances. If some of those
instances stop during processing, the job slows but does not completely stop.
Preemptible instances complete your batch processing tasks without placing
additional workload on your existing instances and without requiring you to pay full
price for additional normal instances.
Spot VMs
Spot VMs are the latest version of preemptible VMs. To learn more about VMs in
general, read the Virtual machine instances documentation.
Images
https://cloud.google.com/compute/docs/images
You can choose from both Linux and Windows images. Some of these images are
premium images, as indicated in parentheses with a p. These images will have
per-second charges after a 1-minute minimum, with the exception of SQL Server
images, which are charged per minute after a 10-minute minimum. Premium image
prices vary with the machine type. However, these prices are global and do not vary
by region or zone.
You can also use custom images. For example, you can create and use a custom
image by pre-installing software that's been authorized for your particular
organization.
You also have the option of importing images from your on-premises or workstation,
or from another cloud provider. This is a no-cost service that is as simple as installing
an agent, and we highly recommend that you look at it. You can also share custom
images with anybody in your project or among other projects, too.
Compute Engine Storage Options…
Compute Engine Data Storage
● Each VM has a boot persistent disk (PD) that contains the
operating system
○ Not best practice to place non-system data on the boot
disk
● When apps require additional storage space add one or
more additional storage options
○ Cloud Storage buckets: Affordable object storage
○ Additional persistent disk(s): Efficient, reliable block
storage.
○ Local SSD: High performance, transient, local block
storage.
○ Filestore: High performance file storage for Google
Cloud users.
Compute Engine Data Storage
● Each VM has a boot persistent disk (PD) that
contains the operating system
○ Not best practice to place non-system data
on the boot disk
● When apps require additional storage space
add one or more additional storage options
○ Cloud Storage buckets: Affordable object
storage
○ Additional persistent disk(s): Efficient,
reliable block storage.
○ Local SSD: High performance, transient,
local block storage.
○ Filestore: High performance file storage for
Google Cloud users.
Next
discussion
Persistent Disk
The first disk that we create is what we call a persistent disk. That means it's going to
be attached to the VM through the network interface. Even though it's persistent, it's
not physically attached to the machine. This separation of disk and compute allows
the disk to survive if the VM terminates. You can also perform snapshots of these
disks, which are incremental backups that we’ll discuss later.
The choice between HDD and SSD disks comes down to cost and performance. To
learn more about disk performance and how it scales with disk size, please refer to
the documentation page.
Another cool feature of persistent disks is that you can dynamically resize them, even
while they are running and attached to a VM.
You can also attach a disk in read-only mode to multiple VMs. This allows you to
share static data between multiple instances, which is cheaper than replicating your
data to unique disks for individual instances.
Zonal persistent disks offer efficient, reliable block storage. Regional persistent disks
provide active-active disk replication across two zones in the same region. Regional
persistent disks deliver durable storage that is synchronously replicated across zones
and are a great option for high-performance databases and enterprise applications
that also require high availability. When you configure a zonal or regional persistent
disk, you can select one of the following disk types.
By default, Compute Engine encrypts all data at rest. Google Cloud handles and
manages this encryption for you without any additional actions on your part. However,
if you wanted to control and manage this encryption yourself, you can either use
Cloud Key Management Service to create and manage key encryption keys (which is
known as customer-managed encryption keys) or create and manage your own key
encryption keys (known as customer-supplied encryption keys).
Adding disks to VMs with the Console
Must format
a blank disk
after creation
Filestore
https://cloud.google.com/filestore
Filestore use cases
SAP NetWeaver
application tier
requires shared files
across many VMs
Note that this blog is from 2021, and the “public preview” items mentioned in the blog
are now generally available (GA)
Compute Engine Disk Snapshots
Snapshots
Snapshots
https://cloud.google.com/compute/docs/disks/snapshots
https://cloud.google.com/compute/docs/disks/create-snapshots
Select source
disk
Select location
Snapshot Service
Compute Engine
Cloud
Storage
root data
Snapshots have many use cases. For example, they can be used to backup critical
data into a durable storage solution to meet application, availability, and recovery
requirements.
Example - create disk from snapshot
Options are:
blank disk, image
or snapshot
Snapshot name
Another use case is the ability to create a new disk from a snapshot. Afterwards, this
disk can be attached to a VM.
Example - using a snapshot migrate data between zones
Zone 1 Zone 2
Snapshot
Snapshots can also be used to migrate data between zones. For example, you might
want to minimize latency by migrating data to a drive that can be attached to a VM in
another zone.
Example - Transferring data to SSD to improve
performance
Compute Engine
PD HDD PD SSD
root
Snapshot Service
Another snapshot use case of transferring data to a different disk type. For example, if
you want to improve disk performance, you could use a snapshot to transfer data
from a standard HDD persistent disk to a SSD persistent disk.
Snapshots vs Images
Both can be used as the basis for a new VM
● Takes longer to spin up a VM from a snapshot (data needs to be restored) versus an image
(which is already in the state to be booted)
Snapshots Images
https://cloud.google.com/migrate/containers
Blog: Migrating apps to containers? Why Migrate to Containers is your best bet
https://cloud.google.com/blog/products/containers-kubernetes/how-migrate-for-anthos
-improves-vm-to-container-migration