Book Image

Google Cloud Platform for Developers

By : Ted Hunter, Steven Porter
Book Image

Google Cloud Platform for Developers

By: Ted Hunter, Steven Porter

Overview of this book

Google Cloud Platform (GCP) provides autoscaling compute power and distributed in-memory cache, task queues, and datastores to write, build, and deploy Cloud-hosted applications. With Google Cloud Platform for Developers, you will be able to develop and deploy scalable applications from scratch and make them globally available in almost any language. This book will guide you in designing, deploying, and managing applications running on Google Cloud. You’ll start with App Engine and move on to work with Container Engine, compute engine, and cloud functions. You’ll learn how to integrate your new applications with the various data solutions on GCP, including Cloud SQL, Bigtable, and Cloud Storage. This book will teach you how to streamline your workflow with tools such as Source Repositories, Container Builder, and StackDriver. Along the way, you’ll see how to deploy and debug services with IntelliJ, implement continuous delivery pipelines, and configure robust monitoring and alerting for your production systems. By the end of this book, you’ll be well-versed with all the development tools of Google Cloud Platform, and you’ll develop, deploy, and manage highly scalable and reliable applications.
Table of Contents (17 chapters)

Access control and API management

A major component of network architecture is controlling which communications are allowed and which are not. Firewall rules are a fundamental component of GCP networking, and provide a base layer to access control. However, there are many cases where firewall rules are insufficient, such as authorization and authentication-based access. Additionally, some infrastructure components such as target proxies reduce the ability of firewall rules to restrict access by client IP. Fortunately, Google offers a number of additional services for monitoring and controlling network access, including Cloud Endpoints, Identity Aware Proxy, and Cloud Armor. Each of these services provides some form of access control, with varying feature sets and granularity.

Google...