You deployed a hub-and-spoke architecture in your Google Cloud environment that uses VPC Network Peering to connect the spokes to the hub. For security reasons, you deployed a private Google Kubernetes Engine (GKE) cluster in one of the spoke projects with a private endpoint for the control plane. You configured authorized networks to be the subnet range where the GKE nodes are deployed. When you attempt to reach the GKE control plane from a different spoke project, you cannot access it. You need to allow access to the GKE control plane from the other spoke projects. What should you do?
jitu028
Highly Voted 2 years, 2 months agonosense
Highly Voted 2 years, 2 months agoglb2
Most Recent 1 month, 3 weeks ago1f01b87
5 months agosaraali
6 months agowaelghaith
7 months, 2 weeks agogcpengineer
1 year, 5 months agodidek1986
1 year, 6 months agoaygitci
1 year, 1 month agormgsfs
1 year, 9 months agoBen756
1 year, 11 months agoFalconite
2 years agoHetavi
1 year, 8 months agodesertlotus1211
11 months, 4 weeks agopk349
2 years, 1 month agoAzureDP900
2 years, 2 months agonosense
2 years, 2 months agogcpengineer
1 year, 6 months agopfilourenco
2 years, 2 months agoccieman2016
2 years, 2 months ago