Opinie (Omnibond: Creating an HPC Environment in Google Cloud with CloudyCluster)
2339 opinii
CloudyCluster can't Connect
Inzaghi P. · Sprawdzono 6 miesięcy temu
Ryan C. · Sprawdzono 6 miesięcy temu
Lucky R. · Sprawdzono 6 miesięcy temu
Desfantio W. · Sprawdzono 6 miesięcy temu
Richard H. · Sprawdzono 6 miesięcy temu
Gabrielle S. · Sprawdzono 6 miesięcy temu
Mandalan M. · Sprawdzono 6 miesięcy temu
good
THERESE WATTS G. · Sprawdzono 8 miesięcy temu
There wasn't us-central1 available while creating Filestore Database. Consequently, CloudyCluster could not complete the Deploy operation.
Rohit D. · Sprawdzono 10 miesięcy temu
ROHIT A. · Sprawdzono 11 miesięcy temu
dufjames@oihyoiy9oiu.online d. · Sprawdzono 12 miesięcy temu
thanks
Islam H. · Sprawdzono około rok temu
Papa Moussa . · Sprawdzono około rok temu
Papa Moussa . · Sprawdzono około rok temu
Wejdan A. · Sprawdzono około rok temu
~ (qwiklabs-gcp-00-c3d2013877b0)$ gcloud compute config-ssh --ssh-key-file=~/.ssh/vm-ssh-key ERROR: (gcloud.compute.config-ssh) Could not fetch resource: - Required 'compute.projects.get' permission for 'projects/qwiklabs-gcp-00-c3d2013877b0' :~ (qwiklabs-gcp-00-c3d2013877b0)$ export PROJECT=$(gcloud config get-value project) export NAME="omnibond-sa" Your active configuration is: [cloudshell-15714] :~ (qwiklabs-gcp-00-c3d2013877b0)$ # Create the service account gcloud iam service-accounts create $NAME --project=$PROJECT --display-name "CloudyCluster service account" # Add the Datastore Permissions gcloud projects add-iam-policy-binding $PROJECT --member serviceAccount:$NAME@$PROJECT.iam.gserviceaccount.com --role roles/datastore.user # Add the Network Admin Permissions gcloud projects add-iam-policy-binding $PROJECT --member serviceAccount:$NAME@$PROJECT.iam.gserviceaccount.com --role roles/compute.networkAdmin # Add the Security Admin Permissions gcloud projects add-iam-policy-binding $PROJECT --member serviceAccount:$NAME@$PROJECT.iam.gserviceaccount.com --role roles/compute.securityAdmin # Add the Project IAM Admin Permissions gcloud projects add-iam-policy-binding $PROJECT --member serviceAccount:$NAME@$PROJECT.iam.gserviceaccount.com --role roles/resourcemanager.projecgcloud projects add-iam-policy-binding $PROJECT --member serviceAccount:$NAME@$PROJECT.iam.gserviceaccount.com --role roles/storage.adminiterdmin. ERROR: (gcloud.iam.service-accounts.create) User [stronciy16@gmail.com] does not have permission to access projects instance [qwiklabs-gcp-00-c3d2013877b0] (or it may not exist): Permission 'iam.serviceAccounts.create' denied on resource (or it may not exist). - '@type': type.googleapis.com/google.rpc.ErrorInfo domain: iam.googleapis.com metadata: permission: iam.serviceAccounts.create reason: IAM_PERMISSION_DENIED ERROR: (gcloud.projects.add-iam-policy-binding) User [stronciy16@gmail.com] does not have permission to access projects instance [qwiklabs-gcp-00-c3d2013877b0:getIamPolicy] (or it may not exist): The caller does not have permission ERROR: (gcloud.projects.add-iam-policy-binding) User [stronciy16@gmail.com] does not have permission to access projects instance [qwiklabs-gcp-00-c3d2013877b0:getIamPolicy] (or it may not exist): The caller does not have permission ERROR: (gcloud.projects.add-iam-policy-binding) User [stronciy16@gmail.com] does not have permission to access projects instance [qwiklabs-gcp-00-c3d2013877b0:getIamPolicy] (or it may not exist): The caller does not have permission ERROR: (gcloud.projects.add-iam-policy-binding) User [stronciy16@gmail.com] does not have permission to access projects instance [qwiklabs-gcp-00-c3d2013877b0:getIamPolicy] (or it may not exist): The caller does not have permission ERROR: (gcloud.projects.add-iam-policy-binding) User [stronciy16@gmail.com] does not have permission to access projects instance [qwiklabs-gcp-00-c3d2013877b0:getIamPolicy] (or it may not exist): The caller does not have permission ERROR: (gcloud.projects.add-iam-policy-binding) User [stronciy16@gmail.com] does not have permission to access projects instance [qwiklabs-gcp-00-c3d2013877b0:getIamPolicy] (or it may not exist): The caller does not have permission ERROR: (gcloud.projects.add-iam-policy-binding) User [stronciy16@gmail.com] does not have permission to access projects instance [qwiklabs-gcp-00-c3d2013877b0:getIamPolicy] (or it may not exist): The caller does not have permission ERROR: (gcloud.projects.add-iam-policy-binding) User [stronciy16@gmail.com] does not have permission to access projects instance [qwiklabs-gcp-00-c3d2013877b0:getIamPolicy] (or it may not exist): The caller does not have permission ERROR: (gcloud.projects.add-iam-policy-binding) User [stronciy16@gmail.com] does not have permission to access projects instance [qwiklabs-gcp-00-c3d2013877b0:getIamPolicy] (or it may not exist): The caller does not have permission
Ceргeй В. · Sprawdzono około rok temu
Ayush M. · Sprawdzono około rok temu
Aldo A. · Sprawdzono około rok temu
The given service account's permission are not enough apparently. We get the error, after repeated attempts on different days and following the instructions exactly: {"ResourceType":"compute.v1.instance","ResourceErrorCode":"403","ResourceErrorMessage":{"code":403,"errors":[{"domain":"global","message":"Required 'compute.images.useReadOnly' permission for 'projects/public-marketplace-cc/global/images/cloudycluster-v3-3-4-release'","reason":"forbidden"}],"message":"Required 'compute.images.useReadOnly' permission for 'projects/public-marketplace-cc/global/images/cloudycluster-v3-3-4-release'","statusMessage":"Forbidden","requestPath":"https://compute.googleapis.com/compute/v1/projects/qwiklabs-gcp-03-b0aaa43d579a/zones/us-central1-f/instances","httpMethod":"POST","suggestion":"Consider granting permissions to 546309135087@cloudservices.gserviceaccount.com"}}
Muhammad S. · Sprawdzono ponad rok temu
Vasanth Kumar N. · Sprawdzono ponad rok temu
Lina B. · Sprawdzono ponad rok temu
3030_Km Deep S. · Sprawdzono ponad rok temu
Chanakya K. · Sprawdzono ponad rok temu
Nie gwarantujemy, że publikowane opinie pochodzą od konsumentów, którzy dane produkty kupili lub ich używali. Google nie weryfikuje opinii.