khaldoune
khaldoune

Reputation: 131

GCP VPC Service Control: Allow access to a subset of Service Projects that belong to the same Host Project

I've the following GCP resources:

My Service Perimeter protects three projects: network, Apps1 and project-rec. It protects Google Cloud Storage API, Pub/Sub, GKE Connect API and Kubernetes Engine API.

gsutil ls gs://test-bucket/ gives the following results:

Is it possible to have different perimeters on Service Projects that belong to the same Host Project? If so, what I'm doing wrong?

Thanks.

Upvotes: 1

Views: 2582

Answers (2)

sailor
sailor

Reputation: 56

Currently, VPC Service Controls (VPC-SC) can only segment resources by VPC networks i.e. all VMs / Pods in a Shared VPC network always belong to the same Service Perimeter (segment) created by VPC-SC. Sub-VPC segmentation is currently not supported by VPC-SC.

By adding Apps1 to the Service Perimeter, all sub-nets of the Shared VPC(s) in the host Project are part of that Perimeter. Thus, the product is behaving as expected here as "project-dev", "snet-dev", "project-rec", and "snet-rec" are in the same service perimeter.

Upvotes: 4

Parth Mehta
Parth Mehta

Reputation: 1917

Concept of Shared VPC allows you to centrally control VPC assets. However Google Cloud Storage is not a member of VPC, it's part of public apis. So you may not be able to control bucket access through shared VPC.

I am not sure but if you enable private google access you could potentially achieve this.

Upvotes: 0

Related Questions