Immersive Experiences: The Future of Entertainment in 2025

Networking your Virtual Private Clouds (VPCs) effectively is essential when managing resources in cloud settings, particularly inside Google Cloud Platform (GCP). There are two main ways to join VPCs: VPC Peering and Shared VPC. Both link several VPCs together, but they serve various use cases and have unique benefits.
A VPC is a virtual network within a cloud provider's infrastructure that is logically isolated from other virtual networks. It provides users with the ability to launch resources, such as virtual machines, databases, and other services, in a secure and scalable environment. Users can define their own IP address ranges, create subnets, configure route tables, and set up network gateways.
A Shared VPC allows multiple projects to connect to and use a common VPC network managed by a central host project. This configuration enables centralized control over network policies and security, making it easier to manage and enforce consistent network configurations across multiple projects within an organization.
VPC Peering is a networking connection between two VPCs that allows them to communicate as if they are within the same network. This connection is established directly between the VPCs, enabling private communication without the need for a central managing entity or public IP addresses.
Shared VPC architectural diagram
Shared VPC can be described as a Google Cloud tool which enables an organization to associate certain projects to a single VPC network and be able to share subnets, routes, firewalls, and other components of networking. It affords an approach that allows projects to be compartmentalized at the resource access level but is still able to allow them access to the shared networking resources.
Shared VPC is ideal for organizations that require centralized control over network policies and efficient management of network resources across multiple projects. It is particularly useful for:
Login and Setup:
Login and Setup
Enable Host Project:
Enable Host Project
Select Subnets:
Select Subnets
Attach Service Projects:
Enable Compute Engine API:
Test Shared VPC:
Create a firewall rule in the host project to allow SSH:
$ gcloud compute firewall-rules create allow-ssh \
--network=my-network1 \
--allow=tcp:22 \
--source-ranges=0.0.0.0/0 \
--direction=INGRESS
Update Subnet Permissions:
Update Subnet Permissions
Create and Test New User:
Log in with the new user and verify access to the shared subnetworks.
Grant Subnet Access:
Grant Subnet Access
Retest with New User:
Retest with New User
Attach More Service Projects:
Attach More Service Projects
An organization with separate projects for development, testing, and production environments can use a shared VPC to maintain a unified network infrastructure. The development project can access certain subnets of the shared VPC, while the testing and production projects can access others, with centrally managed security rules.
VPC Peering architectural diagram
VPC peering is a functionality that enables two VPCs whether in the same or in different AWS accounts though in the same region. The VPCs are still fully logically separated but are allowed to communicate by means of private IP addresses. VPC peering does not require the use of a gateway or encryption or a tunnel to allow traffic to pass between differently numbered VPCs – instead, new routes are added to the route tables of the peered VPCs so that traffic can flow between them as if they were on the same VPC. They set up certain or all rules and pathways for transiting traffic between the VPCs through the peering connection. It is on the basis of a request/accept workflow, and once the connection is set, there is the ability to exchange information in both directions. Many VPCs peers may join in creating a star or mesh structure. Inter-communication remains localized within AWS infrastructure giving fastest connection with minimal delay. Extra layers of filtering can be done at the instance level across the peers using security groups.
VPC peer in GCP is a mechanism that enables two VPC networks to be connected, and enables the workloads of the VPC networks to communicate with each other over internal IP address. This enables them to efficiently transfer traffic between the two VPCs without having to use the public Internet.
Sample Situation
An organization has to share data between two departments, each having its own VPC. VolP These VPCs can communicate directly through peering without disclosing any information online.
Feature | Shared VPC | VPC Peering |
---|---|---|
Management | Centralized (managed by host project) | Decentralized (managed independently by each VPC) |
Use Case | Large-scale, multi-project environments | Direct, simple connectivity between VPCs |
Network Policies | Consistent across all connected service projects | Independent policies per VPC |
Security | Centralized control with IAM and firewall | Independent firewall configurations |
Complexity | More complex setup and management | Simpler setup and management |
Scalability | Highly scalable, suitable for large organizations | Suitable for smaller-scale, direct connections |
Performance | High performance with centralized management | Direct connectivity, potentially lower latency |
Inter-Project Communication | Easy, as all projects use the same VPC network | Requires peering connection setup between each pair of VPCs |
Billing | Egress charges typically applied to the host project | Egress charges based on individual VPCs |
Resource Sharing | Subnets shared across multiple projects | No resource sharing; only communication enabled |
Setup Time | Longer setup time due to centralized configuration | Faster setup with simpler configuration |
Subnet Management | Centralized subnet management by host project | Each VPC manages its own subnets independently |
Failure Domain | Single point of failure at the host project | Distributed failure domains |
Compliance | Easier to enforce compliance and security policies | Harder to ensure uniform compliance across VPCs |
Resource Isolation | Projects can be isolated by subnet within the shared VPC | Each VPC is isolated from the other |
Cross-Region Support | Limited to VPCs within the same organization | Can peer VPCs across different regions |
Ans: No, a shared VPC is specific to a single geographical region for the organization or company that is using it. This means that resources in other regions cannot be used to access it.
VPC peering is a direct connection between two VPCs, so it is not possible to get VPC peering connection for another VPC unless there is a VPC peering connection established between them. It does not transversely link other VPCs or other networks for that matter to the system.
No, the route tables must be updated manually in each VPC to reflect how the traffic to the peered VPC should be handled.
Yes, AWS puts VPC peerings in a restriction, where it has a default limit on the number of VPC peerings that is allowed for a given VPC. This can be increased by request.
No, VPC peering only takes place between two VPCs that belong to Amazon Web Service or AWS for short. Likely when attempting to connect to an on-premises network, you’d have to set up hardware VPN or AWS Direct Connect.
Comments
Post a Comment
If you need new topic article please let me know.