A RetroSearch Logo

Home - News ( United States | United Kingdom | Italy | Germany ) - Football scores

Search Query:

Showing content from http://cloud.google.com/appengine/docs/legacy/standard/python/shared-vpc-host-project below:

Configure connectors in the Shared VPC host project | App Engine standard environment for Python 2

Configure connectors in the Shared VPC host project

Stay organized with collections Save and categorize content based on your preferences.

If your organization uses Shared VPC, you can set up a Serverless VPC Access connector in either the service project or the host project. This guide shows how to set up a connector in the host project.

If you need to set up a connector in a service project, see Configure connectors in service projects. To learn about the advantages of each method, see Connecting to a Shared VPC network.

Before you begin
  1. Check the Identity and Access Management (IAM) roles for the account you are currently using. The active account must have the following roles on the host project:

  2. Select the host project in your preferred environment.

Console
  1. Go to the Google Cloud console dashboard.

    Go to Google Cloud console dashboard

  2. In the menu bar at the top of the dashboard, click the project dropdown menu and select the host project.

gcloud

Set the default project in the gcloud CLI to the host project by running the following in your terminal:

gcloud config set project HOST_PROJECT_ID

Replace the following:

Create a Serverless VPC Access connector

To send requests to your VPC network and receive the corresponding responses, you must create a Serverless VPC Access connector. You can create a connector by using the Google Cloud console, Google Cloud CLI, or Terraform:

Console
  1. Enable the Serverless VPC Access API for your project.

    Enable API

  2. Go to the Serverless VPC Access overview page.

    Go to Serverless VPC Access

  3. Click Create connector.

  4. In the Name field, enter a name for your connector. The name must follow the Compute Engine naming convention and be less than 21 characters. Hyphens (-) count as two characters.

  5. In the Region field, select a region for your connector. This must match the region of your serverless service.

    If your service is in the region us-central or europe-west, use us-central1 or europe-west1.

  6. In the Network field, select the VPC network to attach your connector to.

  7. Click the Subnetwork pulldown menu:

    Select an unused /28 subnet.

  8. (Optional) To set scaling options for additional control over the connector, click Show Scaling Settings to display the scaling form.

    1. Set the minimum and maximum number of instances for your connector, or use the defaults, which are 2 (min) and 10 (max). The connector scales out to the maximum specified as traffic increases, but the connector does not scale back in when traffic decreases. You must use values between 2 and 10, and the MIN value must be less than the MAX value.
    2. In the Instance Type pulldown menu, choose the machine type to be used for the connector, or use the default e2-micro. Notice the cost sidebar on the right when you choose the instance type, which displays bandwidth and cost estimations.
  9. Click Create.

  10. A green check mark will appear next to the connector's name when it is ready to use.

gcloud
  1. Update gcloud components to the latest version:

    gcloud components update
    
  2. Enable the Serverless VPC Access API for your project:

    gcloud services enable vpcaccess.googleapis.com
    
  3. Create a Serverless VPC Access connector:

    gcloud compute networks vpc-access connectors create CONNECTOR_NAME \
    --region=REGION \
    --subnet=SUBNET \
    --subnet-project=HOST_PROJECT_ID \
    # Optional: specify minimum and maximum instance values between 2 and 10, default is 2 min, 10 max.
    --min-instances=MIN \
    --max-instances=MAX \
    # Optional: specify machine type, default is e2-micro
    --machine-type=MACHINE_TYPE

    Replace the following:

    For more details and optional arguments, see the gcloud reference.

  4. Verify that your connector is in the READY state before using it:

    gcloud compute networks vpc-access connectors describe CONNECTOR_NAME \
    --region=REGION

    Replace the following:

    The output should contain the line state: READY.

Terraform

You can use a Terraform resource to enable the vpcaccess.googleapis.com API.

You can use Terraform modules to create a VPC network and subnet and then create the connector.

Provide access to the connector

Provide access to the connector by granting the Serverless VPC Access User IAM role on the host project to the principal that deploys your App Engine service.

Console
  1. Open the IAM page.

    Go to IAM

  2. Click the project dropdown menu and select the host project.

  3. Click Add.

  4. In the New principals field, add the principal that deploys your App Engine service.

  5. In the Role field, select Serverless VPC Access User.

  6. Click Save.

gcloud

Run the following in your terminal:

gcloud projects add-iam-policy-binding HOST_PROJECT_ID \
--member=PRINCIPAL \
--role=roles/vpcaccess.user

Replace the following:

Make the connector discoverable

To see the connector, principals need certain viewing roles on both the host project and the service project. To make your connector appear when principals view available connectors in the Google Cloud console or from their terminal, add IAM roles for principals who deploy App Engine services.

Grant IAM roles on the host project

On the host project, grant principals who deploy App Engine services the Serverless VPC Access Viewer (vpcaccess.viewer) role.

Console
  1. Open the IAM page.

    Go to IAM

  2. Click the project dropdown menu and select the host project.

  3. Click Add.

  4. In the New principals field, enter the email address of the principal that should be able to see the connector from the service project. You can enter multiple emails in this field.

  5. In the Role field, select Serverless VPC Access Viewer.

  6. Click Save.

gcloud

Run the following in your terminal:

gcloud projects add-iam-policy-binding HOST_PROJECT_ID \
--member=PRINCIPAL \
--role=roles/vpcaccess.viewer

Replace the following:

Grant IAM roles on the service project

On the service project, grant principals who deploy App Engine services the Compute Network Viewer (compute.networkViewer) role.

Console
  1. Open the IAM page.

    Go to IAM

  2. Click the project dropdown menu and select the service project.

  3. Click Add.

  4. In the New principals field, enter the email address of the principal that should be able to see the connector from the service project. You can enter multiple emails in this field.

  5. In the Role field, select Compute Network Viewer.

  6. Click Save.

gcloud

Run the following in your terminal:

gcloud projects add-iam-policy-binding SERVICE_PROJECT_ID \
--member=PRINCIPAL \
--role=roles/compute.networkViewer

Replace the following:

Configure your service to use a connector

For each App Engine service that requires access to your Shared VPC, you must specify the connector for the service. The following steps show how to configure your service to use a connector.

  1. Disable the URL Fetch default and discontinue any explicit use of the urlfetch library. Serverless VPC Access is not compatible with the URL Fetch service.

  2. Add the vpc_access_connector to your service's app.yaml file:

    vpc_access_connector:
    name: projects/HOST_PROJECT_ID/locations/REGION/connectors/CONNECTOR_NAME
    

    Replace the following:

  3. Deploy the service:

    gcloud app deploy

After deploying, your service is able to send requests to your Shared VPC network and receive the corresponding responses.

Next steps

Except as otherwise noted, the content of this page is licensed under the Creative Commons Attribution 4.0 License, and code samples are licensed under the Apache 2.0 License. For details, see the Google Developers Site Policies. Java is a registered trademark of Oracle and/or its affiliates.

Last updated 2025-08-07 UTC.

[[["Easy to understand","easyToUnderstand","thumb-up"],["Solved my problem","solvedMyProblem","thumb-up"],["Other","otherUp","thumb-up"]],[["Hard to understand","hardToUnderstand","thumb-down"],["Incorrect information or sample code","incorrectInformationOrSampleCode","thumb-down"],["Missing the information/samples I need","missingTheInformationSamplesINeed","thumb-down"],["Other","otherDown","thumb-down"]],["Last updated 2025-08-07 UTC."],[[["This guide outlines how to set up a Serverless VPC Access connector within a Shared VPC host project, providing connectivity between serverless services and a VPC network."],["To begin, users must have specific IAM roles in the host project, including Compute Network Viewer, Project IAM Admin, Service Usage Admin, and Serverless VPC Access Admin, ensuring they have adequate permissions."],["Creating the connector can be done using the Google Cloud console, gcloud CLI, or Terraform, requiring the selection of a region, a VPC network, and an unused /28 subnet that is exclusively used for the connector."],["For App Engine services to use the connector, the `vpc_access_connector` must be specified in the `app.yaml` file, and relevant principals need the Serverless VPC Access User role on the host project."],["To make the connector discoverable, principals need Serverless VPC Access Viewer on the host project and Compute Network Viewer on the service project, allowing them to see and select the connector."]]],[]]


RetroSearch is an open source project built by @garambo | Open a GitHub Issue

Search and Browse the WWW like it's 1997 | Search results from DuckDuckGo

HTML: 3.2 | Encoding: UTF-8 | Version: 0.7.4