exam questions

Exam Professional Cloud Network Engineer All Questions

View all questions & answers for the Professional Cloud Network Engineer exam

Exam Professional Cloud Network Engineer topic 1 question 94 discussion

Actual exam question from Google's Professional Cloud Network Engineer
Question #: 94
Topic #: 1
[All Professional Cloud Network Engineer Questions]

You deployed a hub-and-spoke architecture in your Google Cloud environment that uses VPC Network Peering to connect the spokes to the hub. For security reasons, you deployed a private Google Kubernetes Engine (GKE) cluster in one of the spoke projects with a private endpoint for the control plane. You configured authorized networks to be the subnet range where the GKE nodes are deployed. When you attempt to reach the GKE control plane from a different spoke project, you cannot access it. You need to allow access to the GKE control plane from the other spoke projects. What should you do?

  • A. Add a firewall rule that allows port 443 from the other spoke projects.
  • B. Enable Private Google Access on the subnet where the GKE nodes are deployed.
  • C. Configure the authorized networks to be the subnet ranges of the other spoke projects.
  • D. Deploy a proxy in the spoke project where the GKE nodes are deployed and connect to the control plane through the proxy.
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
jitu028
Highly Voted 1 year, 10 months ago
Correct answer - D https://cloud.google.com/architecture/creating-kubernetes-engine-private-clusters-with-net-proxies#:~:text=To%20enable%20access%20to%20the%20controller%20from%20another%20VPC%20network%20or%20from%20on%2Dpremises%20connected%20through%20another%20VPC%20network%20peering%20(such%20as%20in%20hub%2Dand%2Dspoke%20designs)%2C%20create%20a%20proxy%20hosted%20in%20authorized%20IP%20address%20space%2C%20because%20VPC%20network%20peering%20is%20non%2Dtransitive.
upvoted 11 times
...
nosense
Highly Voted 1 year, 10 months ago
Selected Answer: D
Agree D is right To enable access such as in hub-and-spoke designs, create a proxy hosted in authorized IP address space, because VPC network peering is non-transitive.
upvoted 11 times
...
1f01b87
Most Recent 1 month, 2 weeks ago
Selected Answer: D
D is the correct answer
upvoted 1 times
...
saraali
2 months, 2 weeks ago
Selected Answer: C
Option C is the best solution. To allow access to the GKE control plane from other spoke projects, you need to configure the authorized networks to include the subnet ranges of those other spoke projects. Deploying a proxy adds unnecessary complexity to the solution and would not address the core issue of controlling access to the GKE control plane via authorized networks.
upvoted 1 times
...
waelghaith
4 months ago
Selected Answer: C
D) option is incorrect because it miss to add authorized networks for the new subnet. C) is correct because in a hub-and-spoke architecture, the connection between VPCs occurs through a hub VPC.
upvoted 1 times
...
gcpengineer
1 year, 1 month ago
Selected Answer: D
D is the ans . https://cloud.google.com/kubernetes-engine/docs/archive/creating-kubernetes-engine-private-clusters-with-net-proxies
upvoted 4 times
...
didek1986
1 year, 2 months ago
Selected Answer: D
Access to the control plane for private GKE clusters is through VPC Network Peering. VPC Network Peering is non-transitive, therefore you cannot access the cluster's control plane from another peered network. If you want direct access from another peered network or from on-premises when using a hub-and-spoke architecture, deploy proxies for control plane traffic.
upvoted 3 times
aygitci
9 months, 4 weeks ago
How the proxy will enable the access from a non-peered VPC?
upvoted 1 times
...
...
rmgsfs
1 year, 5 months ago
Selected Answer: D
D is right. VPC Peering is not transitive.
upvoted 4 times
...
Ben756
1 year, 7 months ago
Selected Answer: C
The correct answer is C. Configure the authorized networks to be the subnet ranges of the other spoke projects. Since the GKE cluster has a private endpoint for the control plane, only the authorized networks can access it. The current configuration only allows access from the subnet range where the GKE nodes are deployed, but in order to allow access from the other spoke projects, the authorized networks need to be updated to include the subnet ranges of those projects. Option D, deploying a proxy in the spoke project where the GKE nodes are deployed and connecting to the control plane through the proxy, would add unnecessary complexity and introduce additional points of failure. Updating the authorized networks is a simpler and more direct solution to allow access to the GKE control plane from the other spoke projects.
upvoted 3 times
...
Falconite
1 year, 9 months ago
In this case: Spoke 1 <--peering--> Hub <--peering--> Spoke 2 The peering does not allow transitivity: https://cloud.google.com/vpc/docs/vpc-peering#specifications "Only directly peered networks can communicate. Transitive peering is not supported. In other words, if VPC network N1 is peered with N2 and N3, but N2 and N3 are not directly connected, VPC network N2 cannot communicate with VPC network N3 over VPC Network Peering." Answer D it is the only way to achieve the communication.
upvoted 5 times
Hetavi
1 year, 5 months ago
Hub VPC is transitve
upvoted 2 times
desertlotus1211
8 months, 1 week ago
No it's not... you need Cloud VPN or explict routing to so do... VPC Peering is non-transitive
upvoted 1 times
...
...
...
pk349
1 year, 9 months ago
• D. Deploy a proxy in the spoke project where the GKE nodes are deployed and connect to the control plane through the ***** proxy. To enable access to the controller from another VPC network or from on-premises connected through another VPC network peering (such as in hub-and-spoke ***** designs), create a proxy hosted in authorized IP address space, because VPC network peering is non-transitive.
upvoted 2 times
...
AzureDP900
1 year, 10 months ago
C is right https://cloud.google.com/network-connectivity/docs/network-connectivity-center/concepts/overview https://cloud.google.com/kubernetes-engine/docs/how-to/authorized-networks
upvoted 1 times
nosense
1 year, 10 months ago
check this link https://cloud.google.com/architecture/creating-kubernetes-engine-private-clusters-with-net-proxies
upvoted 2 times
gcpengineer
1 year, 2 months ago
D doesnt make any sense, when u create the proxy in same vpc whr the control plane is. how u access that proxy outside the vpc from another spoke project?
upvoted 1 times
...
...
...
pfilourenco
1 year, 11 months ago
Selected Answer: C
c is right.
upvoted 2 times
...
ccieman2016
1 year, 11 months ago
Selected Answer: C
If you want to access the control plane from outside VPC, you must authorize at least one address range to have access to the private endpoint. https://cloud.google.com/kubernetes-engine/docs/how-to/private-clusters
upvoted 5 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago