Omnibond: Creating an HPC Environment in Google Cloud with CloudyCluster Rezensionen

Omnibond: Creating an HPC Environment in Google Cloud with CloudyCluster Rezensionen

2307 Rezensionen

good

THERESE WATTS G. · Vor etwa ein Monat überprüft

Thomas L. · Vor 2 Monate überprüft

Thomas L. · Vor 3 Monate überprüft

There wasn't us-central1 available while creating Filestore Database. Consequently, CloudyCluster could not complete the Deploy operation.

Rohit D. · Vor 3 Monate überprüft

ROHIT A. · Vor 4 Monate überprüft

dufjames@oihyoiy9oiu.online d. · Vor 6 Monate überprüft

thanks

Islam H. · Vor 7 Monate überprüft

Papa M. · Vor 7 Monate überprüft

Papa M. · Vor 7 Monate überprüft

Wejdan A. · Vor 7 Monate überprüft

~ (qwiklabs-gcp-00-c3d2013877b0)$ gcloud compute config-ssh --ssh-key-file=~/.ssh/vm-ssh-key ERROR: (gcloud.compute.config-ssh) Could not fetch resource: - Required 'compute.projects.get' permission for 'projects/qwiklabs-gcp-00-c3d2013877b0' :~ (qwiklabs-gcp-00-c3d2013877b0)$ export PROJECT=$(gcloud config get-value project) export NAME="omnibond-sa" Your active configuration is: [cloudshell-15714] :~ (qwiklabs-gcp-00-c3d2013877b0)$ # Create the service account gcloud iam service-accounts create $NAME --project=$PROJECT --display-name "CloudyCluster service account" # Add the Datastore Permissions gcloud projects add-iam-policy-binding $PROJECT --member serviceAccount:$NAME@$PROJECT.iam.gserviceaccount.com --role roles/datastore.user # Add the Network Admin Permissions gcloud projects add-iam-policy-binding $PROJECT --member serviceAccount:$NAME@$PROJECT.iam.gserviceaccount.com --role roles/compute.networkAdmin # Add the Security Admin Permissions gcloud projects add-iam-policy-binding $PROJECT --member serviceAccount:$NAME@$PROJECT.iam.gserviceaccount.com --role roles/compute.securityAdmin # Add the Project IAM Admin Permissions gcloud projects add-iam-policy-binding $PROJECT --member serviceAccount:$NAME@$PROJECT.iam.gserviceaccount.com --role roles/resourcemanager.projecgcloud projects add-iam-policy-binding $PROJECT --member serviceAccount:$NAME@$PROJECT.iam.gserviceaccount.com --role roles/storage.adminiterdmin. ERROR: (gcloud.iam.service-accounts.create) User [stronciy16@gmail.com] does not have permission to access projects instance [qwiklabs-gcp-00-c3d2013877b0] (or it may not exist): Permission 'iam.serviceAccounts.create' denied on resource (or it may not exist). - '@type': type.googleapis.com/google.rpc.ErrorInfo domain: iam.googleapis.com metadata: permission: iam.serviceAccounts.create reason: IAM_PERMISSION_DENIED ERROR: (gcloud.projects.add-iam-policy-binding) User [stronciy16@gmail.com] does not have permission to access projects instance [qwiklabs-gcp-00-c3d2013877b0:getIamPolicy] (or it may not exist): The caller does not have permission ERROR: (gcloud.projects.add-iam-policy-binding) User [stronciy16@gmail.com] does not have permission to access projects instance [qwiklabs-gcp-00-c3d2013877b0:getIamPolicy] (or it may not exist): The caller does not have permission ERROR: (gcloud.projects.add-iam-policy-binding) User [stronciy16@gmail.com] does not have permission to access projects instance [qwiklabs-gcp-00-c3d2013877b0:getIamPolicy] (or it may not exist): The caller does not have permission ERROR: (gcloud.projects.add-iam-policy-binding) User [stronciy16@gmail.com] does not have permission to access projects instance [qwiklabs-gcp-00-c3d2013877b0:getIamPolicy] (or it may not exist): The caller does not have permission ERROR: (gcloud.projects.add-iam-policy-binding) User [stronciy16@gmail.com] does not have permission to access projects instance [qwiklabs-gcp-00-c3d2013877b0:getIamPolicy] (or it may not exist): The caller does not have permission ERROR: (gcloud.projects.add-iam-policy-binding) User [stronciy16@gmail.com] does not have permission to access projects instance [qwiklabs-gcp-00-c3d2013877b0:getIamPolicy] (or it may not exist): The caller does not have permission ERROR: (gcloud.projects.add-iam-policy-binding) User [stronciy16@gmail.com] does not have permission to access projects instance [qwiklabs-gcp-00-c3d2013877b0:getIamPolicy] (or it may not exist): The caller does not have permission ERROR: (gcloud.projects.add-iam-policy-binding) User [stronciy16@gmail.com] does not have permission to access projects instance [qwiklabs-gcp-00-c3d2013877b0:getIamPolicy] (or it may not exist): The caller does not have permission ERROR: (gcloud.projects.add-iam-policy-binding) User [stronciy16@gmail.com] does not have permission to access projects instance [qwiklabs-gcp-00-c3d2013877b0:getIamPolicy] (or it may not exist): The caller does not have permission

Ceргeй В. · Vor 8 Monate überprüft

Ayush M. · Vor 8 Monate überprüft

Aldo A. · Vor 8 Monate überprüft

The given service account's permission are not enough apparently. We get the error, after repeated attempts on different days and following the instructions exactly: {"ResourceType":"compute.v1.instance","ResourceErrorCode":"403","ResourceErrorMessage":{"code":403,"errors":[{"domain":"global","message":"Required 'compute.images.useReadOnly' permission for 'projects/public-marketplace-cc/global/images/cloudycluster-v3-3-4-release'","reason":"forbidden"}],"message":"Required 'compute.images.useReadOnly' permission for 'projects/public-marketplace-cc/global/images/cloudycluster-v3-3-4-release'","statusMessage":"Forbidden","requestPath":"https://compute.googleapis.com/compute/v1/projects/qwiklabs-gcp-03-b0aaa43d579a/zones/us-central1-f/instances","httpMethod":"POST","suggestion":"Consider granting permissions to 546309135087@cloudservices.gserviceaccount.com"}}

Muhammad S. · Vor 9 Monate überprüft

Vasanth Kumar N. · Vor 9 Monate überprüft

Lina B. · Vor 10 Monate überprüft

3030_Km Deep S. · Vor 10 Monate überprüft

Chanakya K. · Vor 10 Monate überprüft

Pratyush K. · Vor 11 Monate überprüft

nice

Raushan kumar M. · Vor 11 Monate überprüft

Abhay G. · Vor 11 Monate überprüft

savar s. · Vor 11 Monate überprüft

Swarup M. · Vor 11 Monate überprüft

easy

SIDDHIPRADA M. · Vor 11 Monate überprüft

AKASH S. · Vor 11 Monate überprüft

Wir können nicht garantieren, dass die veröffentlichten Rezensionen von Verbrauchern stammen, die die Produkte gekauft oder genutzt haben. Die Rezensionen werden von Google nicht überprüft.