Skip to main content
Google Cloud
/
  • English
  • Deutsch
  • Español
  • Español – América Latina
  • Français
  • Indonesia
  • Italiano
  • Português
  • Português – Brasil
  • 中文 – 简体
  • 中文 – 繁體
  • 日本語
  • 한국어
Console Sign in
  • Google Distributed Cloud
Overview Documentation Reference
Contact Us Start free
Google Cloud
  • Docs
    • Overview
    • Documentation
    • Reference
  • Console
  • Contact Us
  • Start free
  • Discover
  • Product overview
  • Documentation audiences
  • Security
  • Release notes
    • 1.14.8
    • 1.14.7
    • 1.14.6
      • 1.14.6 release notes
      • 1.14.6 hotfixes
    • 1.14.5
    • 1.14.4
    • 1.14.3
      • 1.14.3 release notes
      • 1.14.3 hotfixes
    • 1.13.12
    • 1.13.11
    • 1.13.10
    • 1.13.9
    • 1.13.8
    • 1.13.7
    • 1.13.6
    • 1.13.5
    • 1.13.4
    • 1.13.3
    • 1.13.1
    • 1.12.4
    • 1.12.2
    • 1.12.1
    • 1.12.0
    • 1.9.21
    • 1.9.20
    • 1.9.19
    • 1.9.18
    • 1.9.17
    • 1.9.16
    • 1.9.15
    • 1.9.14
    • 1.9.13
    • 1.9.12
    • 1.9.11
    • 1.9.10
    • 1.9.9
    • 1.9.8
    • 1.9.7
    • 1.9.6
    • 1.9.5
    • 1.9.4
    • 1.9.3
    • 1.9.2
    • 1.9.1
    • 1.9.0
  • Glossary
  • Accessibility
  • Feature stages
  • Resource hierarchy and access control
    • Resource hierarchy
    • Design access boundaries
    • Design workload separation
    • Design permissioning setup
  • Manage multi-zone universe
    • Zones in GDC air-gapped
    • Global and zonal resources
    • Data protection
    • Network traffic management
    • Global permissions
    • Manage resources across zones
  • gdcloud Command-Line Interface (CLI)
    • Overview
    • Download
    • Install
    • Manage configurations
    • Manage properties
    • Upgrade
    • Autocompletion
    • View and switch context
    • Authentication
    • Enable accessibility features
  • Provision GDC resources with Terraform
    • Terraform overview
    • Configure Terraform
  • Request support
  • Software support and deprecation policy
  • Administer
  • Control access
    • Connect to an identity provider
    • Sign in
    • Grant and revoke access
    • Predefined role descriptions
    • Role definitions
    • Create a custom role
    • Authenticate with service accounts
    • Secure service account keys
  • Manage projects
    • Overview
    • Create a project
    • Select and view projects
    • Edit a project
    • Delete a project
  • Secure and protect
    • Fetch trust bundles
    • Encryption
      • Encryption at rest
      • Client-side encryption
      • Encryption in transit
    • Manage KMS keys
      • Key management system
      • Rotate a root key
    • Control HSM keys
    • Request threat prevention
    • Manage PKI certs
      • Web TLS certificate configurations
      • Transition to different modes
      • Change the default issuer
      • Reissue PKI web certificates
  • Manage networking
    • Networking overview
    • Manage DNS zones and records
      • About DNS zones and records
      • Prepare IAM permissions
      • Create DNS zones
      • Create DNS records
    • Control data exfiltration
    • Configure project network policies
      • Overview
      • Create intra-project network policies
      • Create cross-project network policies
      • Create organization-external network policies
      • Create allow-all network policies
      • Create network policies for managed services
    • View the virtual network
    • View NAT settings
    • Create organization network policies
    • Manage IP addresses
      • Subnets and IP addresses
      • Planning and architecture
      • Provision internal IP addresses
      • Bring your own external IP addresses
    • Manage flow logs
    • Manage load balancers
      • Overview
      • Configure internal load balancers
      • Configure external load balancers
      • Create global subnets for load balancers
        • About subnets for load balancing
        • Create a global subnet for internal load balancing
        • Create a global subnet for external load balancing
    • Manage outbound traffic from workloads
    • Configure GDC VPN
      • Overview
      • Create a VPN gateway and peer gateway
      • Create a VPN BGP session
      • Create the secret with a PSK
      • Create a VPN tunnel
      • Control egress and ingress traffic
      • Access user VMs
      • Supported IKE ciphers
    • Establish connectivity with interconnects
      • Overview
      • Create an attachment group
      • Create a VLAN attachment
  • Manage Kubernetes clusters
    • Overview
    • Create a Kubernetes cluster
    • Delete a Kubernetes cluster
    • Manage node pools
    • Node isolation
      • Node isolation overview
      • Isolate container workloads
    • Cluster node machines
  • Store data
    • Overview
    • Install the storage CLI
    • Manage buckets
      • Create buckets
      • Delete buckets
      • List and view buckets
      • Set bucket retention periods
      • Manage encrypted buckets
      • Grant and obtain bucket access
      • Create WORM buckets
    • Manage objects
      • Upload and download objects
      • List objects
      • Copy, modify, and move objects
      • Delete objects
      • Set object lifecycle policy
    • Track storage health alerts
    • Transfer data
    • Replicate volumes asynchronously
  • Monitor metrics and logs
    • Overview
    • Prepare IAM permissions
    • Collect and query metrics
      • Monitoring overview
      • Collect metrics
      • Query and view metrics
      • Encrypt metrics
      • Label metrics
      • Create metrics from metrics
      • Create dashboards
    • Collect and query logs
      • Logging overview
      • Collect logs
      • Query and view logs
      • Create metrics from logs
      • Export logs to a SIEM system
      • Secure and restore audit logs
    • Create and manage alerts
      • Alerting overview
      • Create alert rules
      • Configure notification channels
      • Query and view open alerts
      • Manage policies and groups
    • Logs, metrics, and dashboards
      • View component logs
        • Operational logs overview
        • Audit logs overview
        • Audited components
          • List of components
          • ADD
          • BACK
          • BLOCK
          • CSM
          • DNS
          • DS
          • FW
          • GIS
          • HSM
          • IAM
          • KMS
          • KUB
          • LOG and AL
          • MKS
          • MKT
          • MON
          • NTP
          • OBJ
          • OPA
          • OS
          • RM
          • TS
          • VAI
          • VMM
          • VNET
        • Audit log sources
          • List of audit log sources
          • GKE Identity Service
          • Kubernetes
          • Observability audit logger
          • Service Mesh Envoy
          • Syslog audit logs
      • View component metrics
        • Metrics overview
        • ADD
        • BACK
        • DBS
        • KUB
        • MHS
        • OBJ
        • UPG
        • VAIS
        • VMM
      • View component dashboards
        • Dashboards overview
        • Monitor Harbor metrics
        • Monitor Kubernetes cluster metrics
        • Monitor VM metrics
  • Configure organization policies
  • Configure an upgrade
  • Disaster recovery
    • Overview
    • Configure disaster recovery for a cluster
    • Set up backup repository for database services
    • Import backup repository for database services
  • Billing
    • Create and link accounts
    • Access billing reports
    • View invoices
    • Estimate projected costs
    • Track resource consumption
    • Calculate resource usage
    • Query billing metrics
    • Manage billing alerts
  • Migrate VMs
    • Discover and assess VMs
  • Develop
  • Control access to project resources
    • Sign in
    • Grant access to resources
    • Predefined role descriptions
    • Role definitions
    • Manage service accounts
    • Secure service account keys
  • Deploy container workloads
    • Container workloads in GDC
    • Manage stateless workloads
      • Create stateless workloads
      • Inspect stateless workloads
      • Update stateless workloads
      • Scale stateless workloads
      • Delete stateless workloads
    • Manage stateful workloads
      • Create stateful workloads
      • Inspect stateful workloads
      • Update stateful workloads
      • Scale stateful workloads
      • Delete stateful workloads
    • Deploy GPU container workloads
    • Configure container storage
      • Access persistent storage
      • Create volume snapshots
  • Deploy virtual machine workloads
    • VMs overview
    • Prepare IAM permissions
    • Create VMs
      • Create and start a VM
      • Supported VM images
      • Create custom images
      • Create and manage Windows VMs
      • Import virtual disks
      • Manage VM boot disks
        • Create a boot disk
        • Replace a boot disk
    • Connect to VMs
      • Connect to a VM
      • Transfer files
      • Enable IP addresses
      • Set network policies
    • Manage VMs
      • Manage VM lifecycles
      • Start and stop a VM
      • Minimize the VM start time
      • View VM properties
      • Update VM properties
      • View VM machine type
      • View and maintain VM metadata
      • Delete a VM
      • Securely boot a VM
      • Add a disk to a VM
      • Expand VM disks
    • Manage the OS
      • Manage guest environment
      • Manage OS packages
      • Use a startup script on Linux VMs
      • Use a startup script on Windows VMs
    • Monitor VM metrics
  • Store data
    • Overview
    • Install the storage CLI
    • Manage buckets
      • Create buckets
      • Delete buckets
      • List and view buckets
      • Set bucket retention periods
      • Manage encrypted buckets
      • Grant and obtain bucket access
      • Create WORM buckets
    • Manage objects
      • Upload and download objects
      • List objects
      • Copy, modify, and move objects
      • Delete objects
      • Set object lifecycle policy
    • Track storage health alerts
    • Replicate volumes asynchronously
  • Manage databases
    • Create database clusters
    • Start and stop database clusters
    • Configure database extensions
    • Update database cluster attributes
    • List database clusters
    • Configure high availability
    • Build generative AI applications
    • Call models using model endpoints in AlloyDB
    • Delete database clusters
    • Connect to a database cluster
    • Create a user
    • Clone a database cluster
    • Plan maintenance windows
    • Enable cross-project connections
    • Enable external connections
    • Sign and upload a server certificate
    • Export a database cluster
    • Import from a dump file
    • Preserve database clusters before an upgrade