Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.

Unlimited Access

Get Unlimited Contributor Access to the all ExamTopics Exams!
Take advantage of PDF Files for 1000+ Exams along with community discussions and pass IT Certification Exams Easily.

Exam Professional Data Engineer topic 1 question 216 discussion

Actual exam question from Google's Professional Data Engineer
Question #: 216
Topic #: 1
[All Professional Data Engineer Questions]

You are developing an Apache Beam pipeline to extract data from a Cloud SQL instance by using JdbcIO. You have two projects running in Google Cloud. The pipeline will be deployed and executed on Dataflow in Project A. The Cloud SQL. instance is running in Project B and does not have a public IP address. After deploying the pipeline, you noticed that the pipeline failed to extract data from the Cloud SQL instance due to connection failure. You verified that VPC Service Controls and shared VPC are not in use in these projects. You want to resolve this error while ensuring that the data does not go through the public internet. What should you do?

  • A. Set up VPC Network Peering between Project A and Project B. Add a firewall rule to allow the peered subnet range to access all instances on the network.
  • B. Turn off the external IP addresses on the Dataflow worker. Enable Cloud NAT in Project A.
  • C. Add the external IP addresses of the Dataflow worker as authorized networks in the Cloud SQL instance.
  • D. Set up VPC Network Peering between Project A and Project B. Create a Compute Engine instance without external IP address in Project B on the peered subnet to serve as a proxy server to the Cloud SQL database.
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
Lenifia
2 days, 4 hours ago
Selected Answer: A
A is correct
upvoted 1 times
...
kajitsu
5 days, 16 hours ago
Selected Answer: A
no proxy needed
upvoted 1 times
...
Lestrang
4 weeks, 1 day ago
Selected Answer: A
People referencing "VPC Network Peering does not provide transitive routing. For example, if VPC networks net-a and net-b are connected using VPC Network Peering, and VPC networks net-a and net-c are also connected using VPC Network Peering, VPC Network Peering does not provide connectivity between net-b and net-c." the question states that cloud sql is running in project B. Which means the instance is already part of the VPC in project B, so with Network Peering workers from A can definitely access data in B. No proxy is needed.
upvoted 1 times
...
fabiogoma
1 month, 2 weeks ago
Selected Answer: A
Why so many people are voting for D? There's no need for a proxy, the peering is enough to allow network traffic between subnets.
upvoted 2 times
fabiogoma
1 month, 2 weeks ago
Now I see why, I put this on ChatGPT and it thinks the right answer is D. I'm pretty sure that's a hallucination.
upvoted 2 times
...
...
ccpmad
1 month, 2 weeks ago
Proxy? no, it is not necessary.. A
upvoted 2 times
...
josech
1 month, 2 weeks ago
Selected Answer: D
https://cloud.google.com/sql/docs/mysql/connect-multiple-vpcs
upvoted 2 times
...
chrissamharris
4 months, 1 week ago
Selected Answer: A
A - The requirement for a proxy is un-necessary: https://cloud.google.com/sql/docs/mysql/private-ip#multiple_vpc_connectivity
upvoted 3 times
...
ML6
4 months, 2 weeks ago
Option D. Source: https://cloud.google.com/sql/docs/mysql/private-ip#multiple_vpc_connectivity
upvoted 2 times
...
JyoGCP
4 months, 3 weeks ago
Selected Answer: D
Option D
upvoted 1 times
...
lipa31
5 months, 2 weeks ago
Selected Answer: D
the reason : Cloud SQL supports private IP addresses through private service access. When you create a Cloud SQL instance, Cloud SQL creates the instance within its own virtual private cloud (VPC), called the Cloud SQL VPC. Enabling private IP requires setting up a peering connection between the Cloud SQL VPC and your VPC network.
upvoted 2 times
...
saschak94
5 months, 3 weeks ago
Selected Answer: D
Using VPC Network Peering, Cloud SQL implements private service access internally, which allows internal IP addresses to connect across two VPC networks regardless of whether they belong to the same project or organization. However, since VPC Network Peering isn't transitive, it only broadcasts routes between the two VPCs that are directly peered. If you have an additional VPC, it won't be able to access your Cloud SQL resources using the connection set up with your original VPC.
upvoted 1 times
...
datapassionate
5 months, 3 weeks ago
Selected Answer: D
D. Set up VPC Network Peering between Project A and Project B. Create a Compute Engine instance without external IP address in Project B on the peered subnet to serve as a proxy server to the Cloud SQL database.
upvoted 1 times
...
Matt_108
5 months, 3 weeks ago
Selected Answer: D
Option D is the most aligned to best practices for me
upvoted 1 times
...
BIGQUERY_ALT_ALT
5 months, 4 weeks ago
Selected Answer: D
Option D is the correct answer. The reason is you cannot access cloud sql or alloydb instances from a peered vpc connection as they will be hosted in service project not in Project B. The VPC Peering doesn't give transitive routing so accessing cloud sql directly is not possible without a proxy vm. https://cloud.google.com/vpc/docs/vpc-peering#spec-general
upvoted 3 times
...
MaxNRG
6 months ago
Selected Answer: D
D is the correct solution. To allow the Dataflow workers in Project A to connect to the private Cloud SQL instance in Project B, you need to set up VPC Network Peering between the two projects. Then create a Compute Engine instance without external IP in Project B on the peered subnet. This instance can serve as a proxy server to connect to the private Cloud SQL instance. The Dataflow workers can connect through the peered network to the proxy instance, which then connects to Cloud SQL. This allows accessing the private Cloud SQL instance without going over the public internet. Option A would allow access but still goes over the public internet. Option B and C would not work since the Cloud SQL instance does not have a public IP address. So D is the right approach to resolve the connection issue while keeping the data private.
upvoted 4 times
chrissamharris
4 months, 1 week ago
I think you're incorrect. VPC Peering does not traverse the public internet. https://cloud.google.com/vpc/docs/using-vpc-peering
upvoted 2 times
...
...
raaad
6 months ago
Selected Answer: A
VPC Network Peering allows for the connection of two VPC networks so that they can communicate internally as if they were part of the same network.
upvoted 2 times
Anudeep58
1 month, 2 weeks ago
The Cloud SQL. instance is running in Project B and does not have a public IP address. Correct would be D. Any thoughts ?
upvoted 1 times
...
...
e70ea9e
6 months, 1 week ago
Selected Answer: A
Secure Private Communication: Establishes a direct, private connection between the VPCs, eliminating exposure to the public internet. Ensures data confidentiality and integrity.
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
ex Want to SAVE BIG on Certification Exam Prep?
close
ex Unlock All Exams with ExamTopics Pro 75% Off
  • arrow Choose From 1000+ Exams
  • arrow Access to 10 Exams per Month
  • arrow PDF Format Available
  • arrow Inline Discussions
  • arrow No Captcha/Robot Checks
Limited Time Offer
Ends in