Container Registry is a container image repository to manage Docker images, perform vulnerability analysis, and define fine-grained access control. Features Automatically build and push images to a private registry when you commit code to Cloud Source Repositories, GitHub, or Bitbucket. You can push and pull Docker images to your private Container Registry utilizing the standard Docker command-line interface. The system creates a Cloud Storage bucket to store all of your images the first time you push an image to Container Registry You have the ability to maintain control over who can access, view, or download images. Pricing Container Registry charges [...]
About SenseiThis author has not yet filled in any details.
So far Sensei has created 355 blog entries.
A fully managed git repository where you can securely manage your code. Features You will be able to extend your git workflow with Cloud Source Repositories. Set up a repository as a Git remote. Push, pull, clone, log, and perform other Git operations as required by your workflow. You can create multiple repositories for a single Google Cloud project. This allows you to organize the code associated with your cloud project in the best way. View repository files from within the Cloud Source Repositories using Source Browser. You can filter your view to focus on a specific branch, tag, or [...]
Google Cloud Deployment Manager is an infrastructure deployment service that automates the creation and management of Google Cloud resources. Features You can write template and configuration files and utilize them to create deployments that have a variety of Google Cloud services working together, such as: Cloud Storage Compute Engine Cloud SQL A configuration defines the structure of your deployment. You must specify a configuration on a YAML file to create a deployment. It contains the following: type and properties of the resources that are part of the deployment any templates the configuration should use additional subfiles that can be executed [...]
Bookmarks Features Workspaces Cloud Monitoring Agent Pricing Validate Your Knowledge Cloud Monitoring collects metrics, events, and metadata, hosted uptime probes, and application instrumentation to gain visibility into the performance, availability, and health of your applications and infrastructure. Features Collect metrics from multicloud and hybrid infrastructure in real time. Metrics, events, and metadata are displayed with rich query language that helps identify issues and uncover significant patterns. Reduces time spent navigating between systems with one integrated service for metrics, uptime monitoring, dashboards, and alerts. Workspaces Cloud Monitoring utilizes workspaces to organize and manage [...]
Bookmarks Features Cloud Audit Logs Exporting Audit Logs Pricing Validate Your Knowledge An exabyte-scale, fully managed service for real-time log management. Helps you to securely store, search, analyze, and alert on all of your log data and events. Features Write any custom log, from any source, into Cloud Logging using the public write APIs. You can search, sort, and query logs through query statements, along with rich histogram visualizations, simple field explorers, and the ability to save the queries. Integrates with Cloud Monitoring to set alerts on the logs events and logs-based [...]
Bookmarks Features Cloud Billing Account & Payments Profile Cloud Billing Reports Cloud Billing Budgets Overview of Cloud Billing roles in IAM Validate Your Knowledge You can configure billing on Google Cloud in a variety of ways to meet different needs. To use Google Cloud services, you must have a valid Cloud Billing account, Features If you have a project that is not linked to a Cloud Billing account, you will have limited use of products and services available for your project. Cloud Billing Account & Payments Profile Cloud Billing Account It [...]
Google Cloud Console is a web admin interface to manage your Google cloud infrastructure. Features You can create projects on Google Cloud Console. With Cloud Console, you can quickly find and check the health of all your cloud resources in one place, including virtual machines, network settings, and data storage. Logging Manage and audit user access to project resources. Track down production issues quickly by viewing logs. You can explore the Google Cloud Marketplace and launch cloud solutions with just a few clicks. Billing View a detailed billing breakdown of your bills. Set spending budgets to avoid unexpected surprises Cloud [...]
Secret Manager is a secure and convenient method to store API keys, passwords, certificates, and other sensitive data. It provides a central place as the source of truth to manage, access, and audit secrets across Google Cloud. Features Secret names are project-global resources, but secret data is stored in regions. You can choose specific regions in which to store your secrets. Secret data is immutable and most operations take place on secret versions. Secret Manager integrates with IAM. Every interaction with Secret Manager generates an audit entry with Cloud Logging enabled to help you detect system anomalies. You can enable [...]
The Google Cloud Key Management Service (KMS) is a cloud-hosted key management service that enables you to manage encryption keys on the Google Cloud Platform. Features Lets you manage your symmetric and asymmetric cryptographic keys the same way you manage them in an on-premises environment. You can decide to use the keys generated by Cloud KMS with other Google Cloud services. These keys are known as customer-managed encryption keys (CMEK). Can use external KMS to protect your data in Google Cloud and separate data from key. You can generate a new key version for your symmetric keys automatically at a [...]
Help protect your applications and websites against denial of service and web attacks. Detect and mitigate attacks against your Cloud Load Balancing workloads. Mitigate OWASP Top 10 risks and help protect workloads on-premises or in the cloud. Features Comes with predefined rules for protection against OWASP Top 10 risks. Easily monitor the metrics associated with your policies in the Cloud Monitoring dashboard. View suspicious traffic patterns on the Cloud Armor dashboard directly. Can be run in preview mode to understand and study ahead of the effects of the rules defined on production traffic. Identify and enforce access control based on [...]