You deployed a hub-and-spoke architecture in your Google Cloud environment that uses VPC Network Peering to connect the spokes to the hub. For security reasons, you deployed a private Google Kubernetes Engine (GKE) cluster in one of the spoke projects with a private endpoint for the control plane. You configured authorized networks to be the subnet range where the GKE nodes are deployed. When you attempt to reach the GKE control plane from a different spoke project, you cannot access it. You need to allow access to the GKE control plane from the other spoke projects. What should you do?
jitu028
Highly Voted 2 years agonosense
Highly Voted 2 years ago1f01b87
Most Recent 3 months agosaraali
4 months agowaelghaith
5 months, 2 weeks agogcpengineer
1 year, 3 months agodidek1986
1 year, 4 months agoaygitci
11 months, 2 weeks agormgsfs
1 year, 7 months agoBen756
1 year, 9 months agoFalconite
1 year, 11 months agoHetavi
1 year, 6 months agodesertlotus1211
9 months, 4 weeks agopk349
1 year, 11 months agoAzureDP900
2 years agonosense
2 years agogcpengineer
1 year, 4 months agopfilourenco
2 years agoccieman2016
2 years ago