Develop and Deploy Cloud Run Functions Reviews
9480 reviews
JongSeon O. · Reviewed 10 days ago
Freddy Isaac N. · Reviewed 11 days ago
Wilmar G. · Reviewed 11 days ago
Kyle T. · Reviewed 11 days ago
Shrish J. · Reviewed 11 days ago
Dipali D. · Reviewed 11 days ago
Dipali D. · Reviewed 11 days ago
Had to modify some things myself in the google cloud ui because some command wasn't working. It allow me to finish the lab, but it seems that the lab itself couldn't validate 100% completion because of this
Antoine R. · Reviewed 11 days ago
Dipali D. · Reviewed 11 days ago
This lab did not work. The command results in bugs and prevents me from continuing the lab: gcloud projects add-iam-policy-binding $PROJECT_ID --member serviceAccount:$SERVICE_ACCOUNT --role roles/pubsub.publisher ERROR: (gcloud.projects.add-iam-policy-binding) unrecognized arguments: service-792182286678@gs-project-accounts.iam.gserviceaccount.com To search the help text of gcloud commands, run: gcloud help -- SEARCH_TERMS
Charles P. · Reviewed 11 days ago
good
Jhonatan M. · Reviewed 11 days ago
Dipali D. · Reviewed 12 days ago
rajender B. · Reviewed 12 days ago
ezgi b. · Reviewed 12 days ago
Anil M. · Reviewed 12 days ago
Not working
Gunjan P. · Reviewed 12 days ago
It was not working as the guide was indicating
Martin B. · Reviewed 12 days ago
Sourojit S. · Reviewed 13 days ago
Ying L. · Reviewed 13 days ago
Macarena P. · Reviewed 13 days ago
Luciano V. · Reviewed 13 days ago
I dont think that this labs instructions are new
Islam I. · Reviewed 13 days ago
Hemant V. · Reviewed 13 days ago
fbfb
Mohammed Usama G. · Reviewed 13 days ago
Ran into a blocker on Task 3. Received a "service account does not exist" error despite following the instructions. As a beginner, I was unable to resolve this issue through standard troubleshooting and could not complete subsequent tasks. Edit: After following a comment below from Digvijay J about using the direct value, the following command resolved the blocker in Task 3: gcloud projects add-iam-policy-binding $PROJECT_ID --member="serviceAccount:[hardcoded-service-account-value]" --role="roles/pubsub.publisher" Subsequent tasks went smoothly.
Annabel T. · Reviewed 13 days ago
We do not ensure the published reviews originate from consumers who have purchased or used the products. Reviews are not verified by Google.