1.1 GCP - VPC - and - Subnets PDF
1.1 GCP - VPC - and - Subnets PDF
• All Compute Engine VM instances, GKE clusters, and App Engine Flex
instances rely on a VPC network for communication.
• The network connects the resources to each other and to the Internet.
• Shareable
• Single shared VCP
• Firewalls, Routes, VPN configured once
• Private IP space managed centrally
• Private
• Private access to Google APIs
• No need for public Ips to access Google services
• Secure
• Encryption of data in transit
• Cloud Armor – secure the VPC perimeter
• Distributed firewalls
• Scalable
• Distributed network
• No choke points
• Performance
• High bandwidth and availability
• Andromeda control plane
• Support for Kubernetes via GKE
Adding subnets
1. Click the name of a VPC network to show its VPC network details page.
2. Click Add subnet. In the panel that appears: Provide a Name, select a Region.
3. Enter an IP address range.
4. To define a secondary range for the subnet, click Create secondary IP range.
5. Private Google access: You can enable Private Google Access for the subnet when
you create it or later by editing it.
6. Flow logs: You can enable VPC flow logs for the subnet when you create it or later
by editing it.
7. Click Add.
Alias IP ranges
• You can give each service a different internal IP address using Alias IP Ranges for
multiple services.
• The VPC network forwards packets destined for each configured alias IP to the
corresponding VM.
• Firewall rules apply to both outgoing (egress) and incoming (ingress) traffic in
the network.
• Firewall rules control traffic even if it is entirely within the network, including
communication among VM instances.
• Every VPC network has two implied firewall rules – One rule allows most
egress traffic, and the other denies all ingress traffic.
• For one instance to be able to communicate with another, appropriate
firewall rules must also be configured because of the implied deny firewall
rule for ingress traffic.
• For an instance to have outgoing Internet access, Firewall rules must allow
egress traffic from the instance and it must have an external IP address.
VPN
• Allows you to connect your VPC network to your physical, on-premises
network or another cloud provider using a secure Virtual Private Network.
Interconnect
• Allows you to connect your VPC network to your on-premises network using
a high speed physical connection.
Load balancing
• Global external load balancing, including HTTP(S) load balancing, SSL Proxy,
and TCP Proxy offerings.
• Regional, external network load balancing
• Regional internal load balancing
Shared VPC
• You can share a VPC network from one project (called a host project) to
other projects in your GCP organization.
• You can grant access to entire Shared VPC networks or select subnets