Closed fmichaelobrien closed 1 year ago
SSH procedures: https://github.com/GoogleCloudPlatform/pbmm-on-gcp-onboarding/issues/267
when onboarding a services project attached to the host VPC. There will be questions about SSH access inside the vpc and outside all the way through a vpc/interconnect. There is a validated SSH private key procedure below where you override oslogin and update GCE metadata with the public key. Any GCE/GKE vm spun up with an oslogin override will get these keys propagated automatically. There is an initial reconcile hickup possible (both myself and a client later ran into it) - but you will be able to ssh -i key usernamedomain@ip OK. for the username replace any . with and append the org domain.
Additional transit peering instructions related to VPCs peered with the interconnect enabled VPC (perimeter) https://cloud.google.com/vpc/docs/vpc-peering#transit-network from https://cloud.google.com/network-connectivity/docs/network-connectivity-center/concepts/overview#vpc-peering
Thanks Mike, this helped resolve the question that the user had.
I'll add these to the architecture doc https://github.com/GoogleCloudPlatform/pubsec-declarative-toolkit/blob/dev/solutions/landing-zone/architecture.md#design-issues
Chris Carty, 8:24 AM @Michael O'Brien got some question from the team around the networking design and exposing apps. Any strongly held opinions?
In client project – any objection that a developer will create its own VPC / network directly?
Can we provide any permission to users in client project and trust the org policy to keep us safe ?
What’s the right way of open the app to external world. i.e. external ip – as of now external ip usage is blocked by policy.
Answers ongoing Expanded answers in the design issues section of the architecture page
https://github.com/GoogleCloudPlatform/pubsec-declarative-toolkit/blob/dev/solutions/landing-zone/architecture.md#design-issues
SSH procedures: https://github.com/GoogleCloudPlatform/pbmm-on-gcp-onboarding/issues/267