You can create accounts for each user to be managed by Cloud Identity manually in the Users tab in the Directory section of the Google Admin console by selecting Add new user as shown in Figure 12.7. Alternatively, you can upload user accounts via a CSV file, sync users with your existing LDAP directory, such…
Implementing Identity and Security in Google Cloud
In the previous chapters, topics such as roles, users, and service accounts often appeared in the context of what permissions are needed to access or configure a specific Google Cloud service. This chapter will provide more visibility on identity and access in Google Cloud. In addition, we will focus on the security aspter and learn…
Predefined roles for Google Cloud’s operations suite services
When working with Google Cloud’s operations suite products described in this section (Debugger, Profiler, and Trace, but also Logging and Monitoring, which were presented earlier in this chapter), it is essential to know what the permissions model looks like. For example, what role can be assigned to a user that wants only to view dashboards?…
Using cloud diagnostics to research an application issue
It is possible to diagnose an issue caused by a code in your application using Cloud Monitoring alone. Still, you will have to somehow go from metrics to the request and logs that generated that metric’s data point. Also, examining logs from a web service in Logs Explorer to track the most common errors would…
Configuring log sinks to export logs to external systems
We configured a sink to route logs to a new log bucket in the previous section. Log buckets are the default choice for storing logs. It is also possible to route all or a subset of logs to alternative locations for longer retention (Google Cloud Storage), in-depth analysis (BigQuery), or third-party applications (in the cloud…
Configuring log routers – Google Cloud Engineer Exam Guide
Imagine a situation where you have a policy in your company that requires you to keep all logs coming from your workloads in a specific geographic region. Because the _Default log bucket is global (logs generated in a particular region are stored in this region), you must change this default behavior. To modify the destination…
Create and configure backup policy
Create and configure backup policy You can edit a policy, associate more VMs to a policy, and delete unnecessary policies to meet compliance requirements. To view your current backup policies in the Azure portal, open the Recovery Services vault blade, and then click Backup Policies, as shown in Figure 5-70. Click an existing policy to…
Create an Azure Backup vault – MS AZ-104 Exam Guide
Create an Azure Backup vault Azure Backup service can be used to back up and restore various cloud as well as on-premises resources. Recovery Services vault is used to enable Azure Backup and to configure the backup policies. For Azure workloads, the Azure Backup service can back up the following resources: When you back up…
Fiber-Optic Cabling – 100-150 Exam Guide
Fiber-Optic Cabling (30.5)Networking media selection is being driven by the growing needs for network bandwidth. The distance and performance of fiber-optic cable make it a good media choice to support these network needs. This topic will examine the characteristics of fiber-optic cabling use in data networks.Properties of Fiber-Optic Cabling (30.5.1)As you have learned, fiber-optic cabling…
Use soft delete to recover Azure VMs 2
FIGURE 5-52 Target settings for the replication FIGURE 5-53 Configure the replication policy FIGURE 5-54 Review of all the Enable Replication settings FIGURE 5-55 Site Recovery jobs Once replicated, you can see the Source VM listed in the Recovery Services vault under Replicated Items. The overview is shown in Figure 5-56. FIGURE 5-56 Replicated Items…