Omnibond: Creating an HPC Environment in Google Cloud with CloudyCluster avis
2339 avis
CloudyCluster can't Connect
Inzaghi P. · Examiné il y a 7 mois
Ryan C. · Examiné il y a 7 mois
Lucky R. · Examiné il y a 7 mois
Desfantio W. · Examiné il y a 7 mois
Richard H. · Examiné il y a 7 mois
Gabrielle S. · Examiné il y a 7 mois
Mandalan M. · Examiné il y a 7 mois
good
THERESE WATTS G. · Examiné il y a 8 mois
There wasn't us-central1 available while creating Filestore Database. Consequently, CloudyCluster could not complete the Deploy operation.
Rohit D. · Examiné il y a 10 mois
ROHIT A. · Examiné il y a 11 mois
dufjames@oihyoiy9oiu.online d. · Examiné il y a environ un an
thanks
Islam H. · Examiné il y a environ un an
Papa Moussa . · Examiné il y a environ un an
Papa Moussa . · Examiné il y a environ un an
Wejdan A. · Examiné il y a environ un an
~ (qwiklabs-gcp-00-c3d2013877b0)$ gcloud compute config-ssh --ssh-key-file=~/.ssh/vm-ssh-key ERROR: (gcloud.compute.config-ssh) Could not fetch resource: - Required 'compute.projects.get' permission for 'projects/qwiklabs-gcp-00-c3d2013877b0' :~ (qwiklabs-gcp-00-c3d2013877b0)$ export PROJECT=$(gcloud config get-value project) export NAME="omnibond-sa" Your active configuration is: [cloudshell-15714] :~ (qwiklabs-gcp-00-c3d2013877b0)$ # Create the service account gcloud iam service-accounts create $NAME --project=$PROJECT --display-name "CloudyCluster service account" # Add the Datastore Permissions gcloud projects add-iam-policy-binding $PROJECT --member serviceAccount:$NAME@$PROJECT.iam.gserviceaccount.com --role roles/datastore.user # Add the Network Admin Permissions gcloud projects add-iam-policy-binding $PROJECT --member serviceAccount:$NAME@$PROJECT.iam.gserviceaccount.com --role roles/compute.networkAdmin # Add the Security Admin Permissions gcloud projects add-iam-policy-binding $PROJECT --member serviceAccount:$NAME@$PROJECT.iam.gserviceaccount.com --role roles/compute.securityAdmin # Add the Project IAM Admin Permissions gcloud projects add-iam-policy-binding $PROJECT --member serviceAccount:$NAME@$PROJECT.iam.gserviceaccount.com --role roles/resourcemanager.projecgcloud projects add-iam-policy-binding $PROJECT --member serviceAccount:$NAME@$PROJECT.iam.gserviceaccount.com --role roles/storage.adminiterdmin. ERROR: (gcloud.iam.service-accounts.create) User [stronciy16@gmail.com] does not have permission to access projects instance [qwiklabs-gcp-00-c3d2013877b0] (or it may not exist): Permission 'iam.serviceAccounts.create' denied on resource (or it may not exist). - '@type': type.googleapis.com/google.rpc.ErrorInfo domain: iam.googleapis.com metadata: permission: iam.serviceAccounts.create reason: IAM_PERMISSION_DENIED ERROR: (gcloud.projects.add-iam-policy-binding) User [stronciy16@gmail.com] does not have permission to access projects instance [qwiklabs-gcp-00-c3d2013877b0:getIamPolicy] (or it may not exist): The caller does not have permission ERROR: (gcloud.projects.add-iam-policy-binding) User [stronciy16@gmail.com] does not have permission to access projects instance [qwiklabs-gcp-00-c3d2013877b0:getIamPolicy] (or it may not exist): The caller does not have permission ERROR: (gcloud.projects.add-iam-policy-binding) User [stronciy16@gmail.com] does not have permission to access projects instance [qwiklabs-gcp-00-c3d2013877b0:getIamPolicy] (or it may not exist): The caller does not have permission ERROR: (gcloud.projects.add-iam-policy-binding) User [stronciy16@gmail.com] does not have permission to access projects instance [qwiklabs-gcp-00-c3d2013877b0:getIamPolicy] (or it may not exist): The caller does not have permission ERROR: (gcloud.projects.add-iam-policy-binding) User [stronciy16@gmail.com] does not have permission to access projects instance [qwiklabs-gcp-00-c3d2013877b0:getIamPolicy] (or it may not exist): The caller does not have permission ERROR: (gcloud.projects.add-iam-policy-binding) User [stronciy16@gmail.com] does not have permission to access projects instance [qwiklabs-gcp-00-c3d2013877b0:getIamPolicy] (or it may not exist): The caller does not have permission ERROR: (gcloud.projects.add-iam-policy-binding) User [stronciy16@gmail.com] does not have permission to access projects instance [qwiklabs-gcp-00-c3d2013877b0:getIamPolicy] (or it may not exist): The caller does not have permission ERROR: (gcloud.projects.add-iam-policy-binding) User [stronciy16@gmail.com] does not have permission to access projects instance [qwiklabs-gcp-00-c3d2013877b0:getIamPolicy] (or it may not exist): The caller does not have permission ERROR: (gcloud.projects.add-iam-policy-binding) User [stronciy16@gmail.com] does not have permission to access projects instance [qwiklabs-gcp-00-c3d2013877b0:getIamPolicy] (or it may not exist): The caller does not have permission
Ceргeй В. · Examiné il y a environ un an
Ayush M. · Examiné il y a environ un an
Aldo A. · Examiné il y a environ un an
The given service account's permission are not enough apparently. We get the error, after repeated attempts on different days and following the instructions exactly: {"ResourceType":"compute.v1.instance","ResourceErrorCode":"403","ResourceErrorMessage":{"code":403,"errors":[{"domain":"global","message":"Required 'compute.images.useReadOnly' permission for 'projects/public-marketplace-cc/global/images/cloudycluster-v3-3-4-release'","reason":"forbidden"}],"message":"Required 'compute.images.useReadOnly' permission for 'projects/public-marketplace-cc/global/images/cloudycluster-v3-3-4-release'","statusMessage":"Forbidden","requestPath":"https://compute.googleapis.com/compute/v1/projects/qwiklabs-gcp-03-b0aaa43d579a/zones/us-central1-f/instances","httpMethod":"POST","suggestion":"Consider granting permissions to 546309135087@cloudservices.gserviceaccount.com"}}
Muhammad S. · Examiné il y a plus d'un an
Vasanth Kumar N. · Examiné il y a plus d'un an
Lina B. · Examiné il y a plus d'un an
3030_Km Deep S. · Examiné il y a plus d'un an
Chanakya K. · Examiné il y a plus d'un an
Nous ne pouvons pas certifier que les avis publiés proviennent de consommateurs qui ont acheté ou utilisé les produits. Les avis ne sont pas vérifiés par Google.