You deployed a hub-and-spoke architecture in your Google Cloud environment that uses VPC Network Peering to connect the spokes to the hub. For security reasons, you deployed a private Google Kubernetes Engine (GKE) cluster in one of the spoke projects with a private endpoint for the control plane. You configured authorized networks to be the subnet range where the GKE nodes are deployed. When you attempt to reach the GKE control plane from a different spoke project, you cannot access it. You need to allow access to the GKE control plane from the other spoke projects. What should you do?
jitu028
Highly Voted 1 year, 10 months agonosense
Highly Voted 1 year, 10 months ago1f01b87
Most Recent 1 month, 2 weeks agosaraali
2 months, 2 weeks agowaelghaith
4 months agogcpengineer
1 year, 1 month agodidek1986
1 year, 2 months agoaygitci
9 months, 4 weeks agormgsfs
1 year, 5 months agoBen756
1 year, 7 months agoFalconite
1 year, 9 months agoHetavi
1 year, 5 months agodesertlotus1211
8 months, 1 week agopk349
1 year, 9 months agoAzureDP900
1 year, 10 months agonosense
1 year, 10 months agogcpengineer
1 year, 2 months agopfilourenco
1 year, 11 months agoccieman2016
1 year, 11 months ago