Author Archives: anuj - Page 6
Synchronizing Users versus Federating Users in GCP
From your Corporate AD, you have two options to bring your users into GCP Federation = Use Cloud Identity to accomplish this Synchronization = Use GCP Cloud Directory Sync Service…
Customer supplied keys and cloud storage
There is often a data compliance requirement - to use your own corporate provided encryption keys. If you want to user your own supplied encryption keys, you HAVE to use…
Organizations in GCP versus Organizations in AWS
What are organizations in GCP used for? Organizations in GCP are used to group resources - not to federate identities ( AWS Control Tower). You can connect VPCs in two…
Object level permissions in GCP Storage
How do you ensure that individual Object level permissions can be set in GCP Storage? Disable Uniform Access (set Fine Grained Access to true). This will allow you to use…
Scopes and GCP Service Accounts
Scopes let you control what services / APIs can be called from DEFAULT service accounts. Only Default SAs get to be defined by scopes (since their default scope can be…
Centralized Logging in GCP – Log Analytics Buckets
Logs - Platform Logs, Application Logs and Networking Logs Platform Logs - are three types of auditable activities: Data Access, Admin Activity, and System Event activity. And thus, there are…
VM Instance Level Metrics in GCP
GCP VM Level Monitoring metrics Active Metric Categories Firewall Metrics - Remember that FW rules are applied at the instance level in GCP. So Ingress Bytes and Egress Bytes are…
Connecting ServiceNow to GCP
Need Help with your GCP Project? Contact a certified professional GoogleCloudArchitect today. What are we trying to do? There are going to be discovered VMs through service now discovery. These…
Windows Server VMs on GCP Compute Engine
Quick tips for creating and installing a windows server VM on GCP The creation of the instance is straightforward - pick the instance name, the boot disk, any special networking…
Sandbox Environments on Google Cloud
also read - AWS isolated sandbox environments More importantly, how do you control user access to these sandboxes? And what if your sandbox needed applications (say your own inhouse apps)…