exam questions

Exam Professional Cloud Network Engineer All Questions

View all questions & answers for the Professional Cloud Network Engineer exam

Exam Professional Cloud Network Engineer topic 1 question 45 discussion

Actual exam question from Google's Professional Cloud Network Engineer
Question #: 45
Topic #: 1
[All Professional Cloud Network Engineer Questions]

You create a Google Kubernetes Engine private cluster and want to use kubectl to get the status of the pods. In one of your instances you notice the master is not responding, even though the cluster is up and running.
What should you do to solve the problem?

  • A. Assign a public IP address to the instance.
  • B. Create a route to reach the Master, pointing to the default internet gateway.
  • C. Create the appropriate firewall policy in the VPC to allow traffic from Master node IP address to the instance.
  • D. Create the appropriate master authorized network entries to allow the instance to communicate to the master.
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
terrain
Highly Voted 4 years, 3 months ago
"D" is correct https://cloud.google.com/kubernetes-engine/docs/how-to/authorized-networks
upvoted 13 times
ThisisJohn
2 years, 12 months ago
I believe the question means both the instance and the master are internal resources. If so, authorized network does not apply because "Note: Authorized networks block untrusted IP addresses from outside Google Cloud. Addresses from inside Google Cloud (such as traffic from Compute Engine VMs) can reach your control plane using HTTPS, provided that they have the necessary Kubernetes credentials. " https://cloud.google.com/kubernetes-engine/docs/how-to/authorized-networks#overview
upvoted 3 times
...
...
saraali
Most Recent 2 months, 2 weeks ago
Selected Answer: D
In a GKE private cluster, the master is not accessible from the public internet, so you need to explicitly allow access from specific networks to the Kubernetes master. You do this by adding the IP of your instance (or the subnet it belongs to) in the "Master authorized networks" section of the GKE cluster. This will allow the instance to communicate with the master over the private network.
upvoted 1 times
...
RKS_2021
3 months, 2 weeks ago
Selected Answer: D
updated the authorized networks
upvoted 1 times
...
xhilmi
10 months, 2 weeks ago
Selected Answer: D
D. Create the appropriate master authorized network entries to allow the instance to communicate with the master. In a Google Kubernetes Engine (GKE) private cluster, the master is not directly accessible from the public internet. Instead, communication with the master is restricted to specific IP addresses defined in the master authorized network. To resolve the issue of the master not responding, you should ensure that the instance's IP address is included in the master authorized network entries. Option D, creating the appropriate master authorized network entries, allows you to specify which IP addresses are allowed to connect to the GKE master. By including the IP address of the instance in these entries, you enable communication between the instance and the GKE master, resolving the problem.
upvoted 2 times
...
gcpengineer
1 year, 2 months ago
Selected Answer: C
C is the ans as the other options r not appropriate
upvoted 1 times
gcpengineer
1 year, 1 month ago
Change ans to D
upvoted 2 times
...
...
Komal697
1 year, 7 months ago
Selected Answer: D
When you create a private cluster in Google Kubernetes Engine, the master nodes are not accessible from the public internet. To access the master nodes, you need to create one or more master authorized networks. These networks can be the VPC networks that the worker nodes are using or a different VPC network. To solve the problem of the non-responsive master node, you should create the appropriate master authorized network entries to allow the instance to communicate to the master. This will enable the instance to reach the master node and retrieve the status of the pods using kubectl. Options A, B, and C are not correct because assigning a public IP address to the instance, creating a route to reach the master, or creating a firewall policy in the VPC would not enable the instance to communicate with the master node in a private cluster.
upvoted 3 times
gcpengineer
1 year, 2 months ago
master authorized ntw is used for accessing the master/control plane from whitelisted ip for admin purpose, not for comm with nodes
upvoted 1 times
gcpengineer
1 year, 1 month ago
ans is indeed D
upvoted 1 times
...
...
...
pk349
1 year, 9 months ago
D: Private clusters run nodes that only have internal IP addresses and—similar to authorized networks—do not allow untrusted IP addresses from outside Google Cloud to access the control plane endpoint. Using authorized *** networks in private clusters makes your control plane reachable only by the following: • Addresses inside Google Cloud, such as Compute Engine virtual machines (VMs) Adding authorized networks can provide additional security benefits for your cluster. Authorized networks grant access to a specific set of addresses that you designate, such as those that originate from your environment. This can help protect access to your cluster in the case of a vulnerability in the cluster's authentication or authorization mechanisms.
upvoted 2 times
...
small1_small2
2 years, 2 months ago
Selected Answer: D
When private cluster is activated, you can only access the master through dedicated IP ranges https://cloud.google.com/kubernetes-engine/docs/how-to/authorized-networks
upvoted 1 times
...
kumarp6
2 years, 10 months ago
Answer is : D
upvoted 1 times
...
walkwolf3
2 years, 10 months ago
Answer is D. Private clusters run nodes that only have internal IP addresses, and do not allow public IPs over the internet to access the control plane endpoint. Additionally, private clusters do not allow Google Cloud IP addresses to access the control plane endpoint by default. Using authorized networks in private clusters makes your control plane reachable only by allowed CIDRs, by nodes and Pods within your cluster's VPC, and by Google's internal production jobs that manage your control plane. https://cloud.google.com/kubernetes-engine/docs/how-to/authorized-networks
upvoted 2 times
AzureDP900
1 year, 11 months ago
D. Create the appropriate master authorized network entries to allow the instance to communicate to the master.
upvoted 1 times
...
...
qaz_132
3 years ago
I will go with `D`. But this question is not very good. There are private cluster, public endpoint; private cluster, private endpoint. I believe they intened to ask for private cluster, private endpoint. If that is the case, then D for sure.
upvoted 1 times
...
qaz_132
3 years ago
I will go with `D`. But this question is not very good. There are private cluster, public endpoint; private cluster, private endpoint. I believe they intened to ask for private cluster, private endpoint. If that is the case, then D for sure.
upvoted 1 times
...
PeppaPig
3 years, 1 month ago
D 100% If you disable public endpoint access, then you must configure authorized networks for the private endpoint. If you don't do this, you can only connect to the private endpoint from cluster nodes or VMs in the same subnet as the cluster https://cloud.google.com/kubernetes-engine/docs/concepts/private-cluster-concept#overview
upvoted 1 times
...
Vidyasagar
3 years, 7 months ago
D is the one
upvoted 4 times
...
ArizonaClassics
3 years, 7 months ago
ans- D
upvoted 1 times
...
[Removed]
3 years, 11 months ago
Ans - D
upvoted 2 times
...
saurabh1805
4 years, 2 months ago
D is correct answer here.
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago