Omnibond: Creating an HPC Environment in Google Cloud with CloudyCluster Reviews

Omnibond: Creating an HPC Environment in Google Cloud with CloudyCluster Reviews

2307 reviews

good

THERESE WATTS G. · Reviewed 24 days ago

Thomas L. · Reviewed about 2 months ago

Thomas L. · Reviewed 3 months ago

There wasn't us-central1 available while creating Filestore Database. Consequently, CloudyCluster could not complete the Deploy operation.

Rohit D. · Reviewed 3 months ago

ROHIT A. · Reviewed 4 months ago

dufjames@oihyoiy9oiu.online d. · Reviewed 5 months ago

thanks

Islam H. · Reviewed 6 months ago

Papa M. · Reviewed 7 months ago

Papa M. · Reviewed 7 months ago

Wejdan A. · Reviewed 7 months ago

~ (qwiklabs-gcp-00-c3d2013877b0)$ gcloud compute config-ssh --ssh-key-file=~/.ssh/vm-ssh-key ERROR: (gcloud.compute.config-ssh) Could not fetch resource: - Required 'compute.projects.get' permission for 'projects/qwiklabs-gcp-00-c3d2013877b0' :~ (qwiklabs-gcp-00-c3d2013877b0)$ export PROJECT=$(gcloud config get-value project) export NAME="omnibond-sa" Your active configuration is: [cloudshell-15714] :~ (qwiklabs-gcp-00-c3d2013877b0)$ # Create the service account gcloud iam service-accounts create $NAME --project=$PROJECT --display-name "CloudyCluster service account" # Add the Datastore Permissions gcloud projects add-iam-policy-binding $PROJECT --member serviceAccount:$NAME@$PROJECT.iam.gserviceaccount.com --role roles/datastore.user # Add the Network Admin Permissions gcloud projects add-iam-policy-binding $PROJECT --member serviceAccount:$NAME@$PROJECT.iam.gserviceaccount.com --role roles/compute.networkAdmin # Add the Security Admin Permissions gcloud projects add-iam-policy-binding $PROJECT --member serviceAccount:$NAME@$PROJECT.iam.gserviceaccount.com --role roles/compute.securityAdmin # Add the Project IAM Admin Permissions gcloud projects add-iam-policy-binding $PROJECT --member serviceAccount:$NAME@$PROJECT.iam.gserviceaccount.com --role roles/resourcemanager.projecgcloud projects add-iam-policy-binding $PROJECT --member serviceAccount:$NAME@$PROJECT.iam.gserviceaccount.com --role roles/storage.adminiterdmin. ERROR: (gcloud.iam.service-accounts.create) User [stronciy16@gmail.com] does not have permission to access projects instance [qwiklabs-gcp-00-c3d2013877b0] (or it may not exist): Permission 'iam.serviceAccounts.create' denied on resource (or it may not exist). - '@type': type.googleapis.com/google.rpc.ErrorInfo domain: iam.googleapis.com metadata: permission: iam.serviceAccounts.create reason: IAM_PERMISSION_DENIED ERROR: (gcloud.projects.add-iam-policy-binding) User [stronciy16@gmail.com] does not have permission to access projects instance [qwiklabs-gcp-00-c3d2013877b0:getIamPolicy] (or it may not exist): The caller does not have permission ERROR: (gcloud.projects.add-iam-policy-binding) User [stronciy16@gmail.com] does not have permission to access projects instance [qwiklabs-gcp-00-c3d2013877b0:getIamPolicy] (or it may not exist): The caller does not have permission ERROR: (gcloud.projects.add-iam-policy-binding) User [stronciy16@gmail.com] does not have permission to access projects instance [qwiklabs-gcp-00-c3d2013877b0:getIamPolicy] (or it may not exist): The caller does not have permission ERROR: (gcloud.projects.add-iam-policy-binding) User [stronciy16@gmail.com] does not have permission to access projects instance [qwiklabs-gcp-00-c3d2013877b0:getIamPolicy] (or it may not exist): The caller does not have permission ERROR: (gcloud.projects.add-iam-policy-binding) User [stronciy16@gmail.com] does not have permission to access projects instance [qwiklabs-gcp-00-c3d2013877b0:getIamPolicy] (or it may not exist): The caller does not have permission ERROR: (gcloud.projects.add-iam-policy-binding) User [stronciy16@gmail.com] does not have permission to access projects instance [qwiklabs-gcp-00-c3d2013877b0:getIamPolicy] (or it may not exist): The caller does not have permission ERROR: (gcloud.projects.add-iam-policy-binding) User [stronciy16@gmail.com] does not have permission to access projects instance [qwiklabs-gcp-00-c3d2013877b0:getIamPolicy] (or it may not exist): The caller does not have permission ERROR: (gcloud.projects.add-iam-policy-binding) User [stronciy16@gmail.com] does not have permission to access projects instance [qwiklabs-gcp-00-c3d2013877b0:getIamPolicy] (or it may not exist): The caller does not have permission ERROR: (gcloud.projects.add-iam-policy-binding) User [stronciy16@gmail.com] does not have permission to access projects instance [qwiklabs-gcp-00-c3d2013877b0:getIamPolicy] (or it may not exist): The caller does not have permission

Ceргeй В. · Reviewed 7 months ago

Ayush M. · Reviewed 8 months ago

Aldo A. · Reviewed 8 months ago

The given service account's permission are not enough apparently. We get the error, after repeated attempts on different days and following the instructions exactly: {"ResourceType":"compute.v1.instance","ResourceErrorCode":"403","ResourceErrorMessage":{"code":403,"errors":[{"domain":"global","message":"Required 'compute.images.useReadOnly' permission for 'projects/public-marketplace-cc/global/images/cloudycluster-v3-3-4-release'","reason":"forbidden"}],"message":"Required 'compute.images.useReadOnly' permission for 'projects/public-marketplace-cc/global/images/cloudycluster-v3-3-4-release'","statusMessage":"Forbidden","requestPath":"https://compute.googleapis.com/compute/v1/projects/qwiklabs-gcp-03-b0aaa43d579a/zones/us-central1-f/instances","httpMethod":"POST","suggestion":"Consider granting permissions to 546309135087@cloudservices.gserviceaccount.com"}}

Muhammad S. · Reviewed 8 months ago

Vasanth Kumar N. · Reviewed 8 months ago

Lina B. · Reviewed 10 months ago

3030_Km Deep S. · Reviewed 10 months ago

Chanakya K. · Reviewed 10 months ago

Pratyush K. · Reviewed 10 months ago

nice

Raushan kumar M. · Reviewed 10 months ago

Abhay G. · Reviewed 11 months ago

savar s. · Reviewed 11 months ago

Swarup M. · Reviewed 11 months ago

easy

SIDDHIPRADA M. · Reviewed 11 months ago

AKASH S. · Reviewed 11 months ago

We do not ensure the published reviews originate from consumers who have purchased or used the products. Reviews are not verified by Google.