Skip to content
#

gce

Here are 151 public repositories matching this topic...

jhillyerd
jhillyerd commented Apr 24, 2020

I don't find mention of how to install plugins in the README or the docs linked from there.

Assuming most new nixops users are going to want to try nixops with libvirtd or VirtualBox, this is a significant adoption blocker.

carmat88
carmat88 commented Mar 2, 2018

As per our discussion, after having curled the latest version of kn and run kn apply in an already existing working directory (hence previously initialized with an older version of kn), I am getting this error:

/opt/KubeNow/bin/ssh-agent-wrapper: line 7: kn-apply: command not found

By running ls bin in the working folder I noticed that the command kn-apply does not exist. This is becau

cireficc
cireficc commented Jul 6, 2018

I have looked everywhere through Fog documentation, CarrierWave, etc. and no documentation seems to show the correct process for using CarrierWave/Fog with Cloud Storage using a service account (JSON credentials).

This issue talks about issues with using a service account, but gives no solution. It's also 3 years old.

The [Fog website](http://

zbjornson
zbjornson commented Dec 17, 2019

Environment details

  • OS: Debian 8
  • Node.js version: 8.16.2
  • npm version: 6.4.1
  • @google-cloud/compute version: 1.1.8

Steps to reproduce

  1. Create a VM using gce.zone("zone").createVM(name) in a zone that doesn't have enough resources to launch the VM. This step succeeds and returns a vm with status: "RUNNING".

  2. Call vm.waitFor("RUNNING") on that i

Data-Monkey
Data-Monkey commented May 20, 2019

Hi,
I managed to get this to run. Thanks so much for all your work.

The disk management section of the documentation would be nice to be filled in.
At the moment I am struggling to understand where my setup information is stored, as I need to rerun setup every time I open the console.
But it does reuse the snapshot and the game disk.
Happy to help out with the docs if you want to just giv

nuwang
nuwang commented Feb 20, 2019

GCP does not have a direct analogue to firewalls/security group. A firewall resource in GCP is closer to a firewall rule in other providers. Therefore, the current implementation simulates groups of rules by a complicated procedure of tagging.

However, this complicates the code greatly, and has a significant impact on performance, since firewall rules must be repeatedly queried and grouped by t

kkm000
kkm000 commented Mar 13, 2020

From https://cloud.google.com/vpc/docs/add-remove-network-tags#source_filters_for_ingress_firewall_rules:

When you use an ingress firewall rule with source tags, you might observe a propagation delay. This delay is typically a few seconds, but it can be, in rare cases, a few minutes. When you make the following changes, the ingress firewall rule can take time to apply to or be removed from an

Improve this page

Add a description, image, and links to the gce topic page so that developers can more easily learn about it.

Curate this topic

Add this topic to your repo

To associate your repository with the gce topic, visit your repo's landing page and select "manage topics."

Learn more

You can’t perform that action at this time.