Develop and Deploy Cloud Run Functions Reviews

9480 reviews

JongSeon O. · Reviewed 10 days ago

Freddy Isaac N. · Reviewed 11 days ago

Wilmar G. · Reviewed 11 days ago

Kyle T. · Reviewed 11 days ago

Shrish J. · Reviewed 11 days ago

Dipali D. · Reviewed 11 days ago

Dipali D. · Reviewed 11 days ago

Had to modify some things myself in the google cloud ui because some command wasn't working. It allow me to finish the lab, but it seems that the lab itself couldn't validate 100% completion because of this

Antoine R. · Reviewed 11 days ago

Dipali D. · Reviewed 11 days ago

This lab did not work. The command results in bugs and prevents me from continuing the lab: gcloud projects add-iam-policy-binding $PROJECT_ID --member serviceAccount:$SERVICE_ACCOUNT --role roles/pubsub.publisher ERROR: (gcloud.projects.add-iam-policy-binding) unrecognized arguments: service-792182286678@gs-project-accounts.iam.gserviceaccount.com To search the help text of gcloud commands, run: gcloud help -- SEARCH_TERMS

Charles P. · Reviewed 11 days ago

good

Jhonatan M. · Reviewed 11 days ago

Dipali D. · Reviewed 12 days ago

rajender B. · Reviewed 12 days ago

ezgi b. · Reviewed 12 days ago

Anil M. · Reviewed 12 days ago

Not working

Gunjan P. · Reviewed 12 days ago

It was not working as the guide was indicating

Martin B. · Reviewed 12 days ago

Sourojit S. · Reviewed 13 days ago

Ying L. · Reviewed 13 days ago

Macarena P. · Reviewed 13 days ago

Luciano V. · Reviewed 13 days ago

I dont think that this labs instructions are new

Islam I. · Reviewed 13 days ago

Hemant V. · Reviewed 13 days ago

fbfb

Mohammed Usama G. · Reviewed 13 days ago

Ran into a blocker on Task 3. Received a "service account does not exist" error despite following the instructions. As a beginner, I was unable to resolve this issue through standard troubleshooting and could not complete subsequent tasks. Edit: After following a comment below from Digvijay J about using the direct value, the following command resolved the blocker in Task 3: gcloud projects add-iam-policy-binding $PROJECT_ID --member="serviceAccount:[hardcoded-service-account-value]" --role="roles/pubsub.publisher" Subsequent tasks went smoothly.

Annabel T. · Reviewed 13 days ago

We do not ensure the published reviews originate from consumers who have purchased or used the products. Reviews are not verified by Google.