Book Image

Google Cloud Platform for Developers

By : Ted Hunter, Steven Porter
Book Image

Google Cloud Platform for Developers

By: Ted Hunter, Steven Porter

Overview of this book

Google Cloud Platform (GCP) provides autoscaling compute power and distributed in-memory cache, task queues, and datastores to write, build, and deploy Cloud-hosted applications. With Google Cloud Platform for Developers, you will be able to develop and deploy scalable applications from scratch and make them globally available in almost any language. This book will guide you in designing, deploying, and managing applications running on Google Cloud. You’ll start with App Engine and move on to work with Container Engine, compute engine, and cloud functions. You’ll learn how to integrate your new applications with the various data solutions on GCP, including Cloud SQL, Bigtable, and Cloud Storage. This book will teach you how to streamline your workflow with tools such as Source Repositories, Container Builder, and StackDriver. Along the way, you’ll see how to deploy and debug services with IntelliJ, implement continuous delivery pipelines, and configure robust monitoring and alerting for your production systems. By the end of this book, you’ll be well-versed with all the development tools of Google Cloud Platform, and you’ll develop, deploy, and manage highly scalable and reliable applications.
Table of Contents (17 chapters)

Data governance in Cloud Storage

An important component of successfully managing data on any public cloud is data governance. The tools and mechanisms available for access control on a given storage solution largely determine what can be realistically achieved while maintaining security at scale. GCS offers three primary mechanisms for access control; Google Cloud IAM, Access Control Lists (ACLs), and signed URLs. Each of these mechanisms addresses the core issue of access control, but they go about it in different ways, with somewhat different goals.

It's important to understand how each one works, and how they overlap. By using these tools in conjunction with each other, developers can implement very flexible access control patterns. On the other hand, a lack of understanding of how these tools interact can lead to access policies that are unintentionally overly-permissive...