리뷰 Implementing a Hub and Spoke using NCC개
로드 중...
검색 결과가 없습니다.

Google Cloud Skills Boost

Google Cloud 콘솔에서 기술 적용

리뷰 Implementing a Hub and Spoke using NCC개

리뷰 2157개

Pablo R. · 8개월 전에 리뷰됨

Mohammed O. · 8개월 전에 리뷰됨

Sriram P. · 8개월 전에 리뷰됨

Prashant Y. · 8개월 전에 리뷰됨

Muhammed Shafi K. · 8개월 전에 리뷰됨

Mykola L. · 8개월 전에 리뷰됨

Alansarang M. · 8개월 전에 리뷰됨

Chuck Y. · 8개월 전에 리뷰됨

Sandiep K. · 8개월 전에 리뷰됨

Javier G. · 8개월 전에 리뷰됨

Bikram S. · 8개월 전에 리뷰됨

Lucas d. · 8개월 전에 리뷰됨

Jialiang G. · 8개월 전에 리뷰됨

Nico M. · 8개월 전에 리뷰됨

Vivesh T. · 8개월 전에 리뷰됨

Vivesh T. · 8개월 전에 리뷰됨

CHANG LI L. · 8개월 전에 리뷰됨

Fabian B. · 8개월 전에 리뷰됨

تمام

محمد ه. · 8개월 전에 리뷰됨

Felix M. · 8개월 전에 리뷰됨

The lab does a really bad job at introducing: - How to manage a hub-and-spoke topology with NCC - The Network Topology tool # The NCC is very opaque and "hub-vpc" is completely left out The lab begins with 3 separate VPCs but hub-vpc ends up never connecting to anything. After clearing step 5 and ensuring both VMs on the spokes can ping each other, SSH-ing to hub-vm and pinging to either spokes through internal IP yields no pingbacks. While this should be obvious because hub-vpc was not a hub nor a spoke in the NCC creation process, one wonders why the "hub-vpc" misnomer and why was it even created here. Also, it is not obvious how I could use NCC to manage traffic for the supposed hub-and-spoke topology. I checked the list of available VPCs through the Cloud console and there was no additional network to manage. There was the "hub-vpc" but that, as mentioned above, was completely detached from the topology. # The Network Topology tool has no data By the time I begin task 6, there was no data on Network Topology. Maybe I am supposed to create more traffic myself so I spammed more pings on the two spoke but after some 2 minutes of trying, the Topology stayed blank. While this might be the 1-hour data block limitation, it would be nice to have something here to explore during the lab. Maybe some more steps to generate some more noise during the previous tasks? Extra: One of the firewall rule supposed for spoke2-vpc is assigned to spoke1-vpc instead (specifically the app-allow-ssh-rdp-spoke2). This does not affect anything of course, because the `app-allow-icmp-spoke2` also allows ssh (of which its spoke1 counterpart has it properly configured to only allow icmp).

Julian L. · 8개월 전에 리뷰됨

Ricardo Daniel T. · 8개월 전에 리뷰됨

Christian M. · 8개월 전에 리뷰됨

Brad B. · 8개월 전에 리뷰됨

Nurhavid Y. · 8개월 전에 리뷰됨

Google은 게시된 리뷰가 제품을 구매 또는 사용한 소비자에 의해 작성되었음을 보증하지 않습니다. 리뷰는 Google의 인증을 거치지 않습니다.