-
Cloud VPN
Cloud VPN securely extends your peer network to your Virtual Private Cloud (VPC) network through an IPsec VPN connection. The VPN connection encrypts traffic traveling between the networks, with one VPN gateway handling encryption and the other handling decryption. This process protects your data during transmission. You can also connect two VPC networks together by…
-
Turn a VM into a router
In certain scenarios, simulating a network environment requires configuring a VM to function as a router.
-
AWS Transit Gateway
-
Storage options decision tree
The following decision tree diagram guides you through the Google Cloud storage recommendations :
-
Filestore
High-performance, fully managed network attached storage (NAS) forfiles Pay for what you use Capacity scales automatically scale based on demand Use cases:
-
Transfer Appliance
One of the data transfer barriers that all companies face is their available network. Transfer Appliance is a high-capacity storage device that enables you to transfer and securely ship your data to a Google upload facility, where we upload your data to Cloud Storage.
-
Cloud Spanner
Cloud Spanner is the only enterprise-grade, globally-distributed, and strongly-consistent database service built for the cloud, specifically to combine the benefits of relational database structure with non-relational horizontal scale. It is a unique database that combines transactions, SQL queries, and relational structure with the scalability that you typically associate with non-relational or NoSQL databases.
-
Scaling Cloud SQL Databases
Cloud SQL can scale in the following ways: Cloud SQL read replicas provide:
-
Choosing a storage classes
Cloud Storage has four storage classes: Standard, Nearline, Coldline and Archive. Each of those storage classes provide 3 location types: Characteristics applicable to all storage classes:
-
Setting up trusted image policies
By default, users in your project can create persistent disks or copy images using any of the public images and any images that principals can access through IAM roles. However, in some situations you might want to restrict principals so that they can create boot disks only from images that contain approved software that meets your policy or…