You have two VPC networks in Google Cloud: VPC-A and VPC-B. You create a VPC peering connection between them. Which statement best describes the connectivity after peering?
Think about how VPC peering connects networks internally.
VPC peering allows instances in peered VPCs to communicate using internal IP addresses without needing manual route creation. It does not merge networks or require public IPs.
You have two peered VPCs in Google Cloud. You want to allow traffic from VPC-A to VPC-B instances on port 8080. What must you do to allow this traffic?
Remember which side controls incoming traffic.
Firewall rules are stateful and applied per VPC. To allow traffic to VPC-B instances, you must create an ingress rule in VPC-B allowing traffic from VPC-A's IP range on the desired port.
You have three VPCs: VPC-A, VPC-B, and VPC-C. VPC-A is peered with VPC-B, and VPC-B is peered with VPC-C. Can instances in VPC-A communicate directly with instances in VPC-C through VPC-B?
Think about whether VPC peering allows traffic to pass through a third VPC.
VPC peering does not support transitive routing. Traffic cannot pass through a peered VPC to reach another peered VPC. Each peering connection is isolated.
You try to create a VPC peering connection between two VPCs, but the request fails. Both VPCs have overlapping IP ranges. What is the reason?
Consider IP address conflicts in network connections.
VPC peering connections require that the IP address ranges of the two VPCs do not overlap to avoid routing conflicts.
You manage 10 VPCs in Google Cloud and want to enable communication between all of them. What is the best approach to connect all VPCs efficiently?
Think about scalability and manageability of network connections.
Full mesh peering grows exponentially and is hard to manage. Transitive peering is not supported. Using a shared VPC as a hub and peering other VPCs to it simplifies management and scales better.