{"id":69879,"date":"2019-01-24T12:12:54","date_gmt":"2019-01-24T12:12:54","guid":{"rendered":"https:\/\/www.whizlabs.com\/blog\/?p=69879"},"modified":"2020-08-31T13:02:19","modified_gmt":"2020-08-31T13:02:19","slug":"gcp-best-practices","status":"publish","type":"post","link":"https:\/\/www.whizlabs.com\/blog\/gcp-best-practices\/","title":{"rendered":"10 GCP Best Practices You Should Know"},"content":{"rendered":"<p class=\"p2\" style=\"text-align: justify;\"><span class=\"s1\">As the fastest growing major cloud provider, <a href=\"https:\/\/www.whizlabs.com\/blog\/google-cloud-platform\/\" target=\"_blank\" rel=\"noopener noreferrer\">Google Cloud Platform<\/a> (GCP) is making a significant impact on the cloud adoption choices by several retail users &amp; enterprises these days. More and more new users are getting attracted by the convenience and features offered by this platform. <\/span><span class=\"s1\">With the rapid adoption rates, concerns related to the susceptibility of security and related things can also take place here. Accordingly, users have to keep an eye on the top GCP best practices that can benefit them to effortlessly meet their business objectives with fewer security concerns. <\/span><\/p>\n<p class=\"p2\" style=\"text-align: justify;\"><span class=\"s1\">If you are a GCP user or want to adopt this platform for your business, make sure to follow the best practices of Google Cloud Platform. Adopting GCP best practices can help you not only to tackle cloud security issues but to aid in many other areas including best practices for reducing speed in GCP, ensuring continuous delivery, storage issues and much more.\u00a0<\/span><\/p>\n<blockquote><p>Google Cloud is coming up with something new every year. Let\u2019s go through\u00a0<a href=\"https:\/\/www.whizlabs.com\/blog\/google-cloud-trends\/\" target=\"_blank\" rel=\"noopener follow noreferrer\" data-wpel-link=\"internal\">Google Cloud Trends<\/a>\u00a0for 2019!<\/p><\/blockquote>\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_76 ez-toc-wrap-left counter-hierarchy ez-toc-counter ez-toc-custom ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #ea7e02;color:#ea7e02\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #ea7e02;color:#ea7e02\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/www.whizlabs.com\/blog\/gcp-best-practices\/#List_of_Must-Known_GCP_Best_Practices\" >List of Must-Known GCP Best Practices<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/www.whizlabs.com\/blog\/gcp-best-practices\/#1_Optimizing_Persistent_Disk_Performance\" >1. Optimizing Persistent Disk Performance<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/www.whizlabs.com\/blog\/gcp-best-practices\/#2_Ensuring_Continuous_Delivery\" >2. Ensuring Continuous Delivery<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/www.whizlabs.com\/blog\/gcp-best-practices\/#3_Firewall_Rules\" >3. Firewall Rules<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/www.whizlabs.com\/blog\/gcp-best-practices\/#4_VPC_Flow_Logs\" >4. VPC Flow Logs<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/www.whizlabs.com\/blog\/gcp-best-practices\/#5_Logging_and_Versioning_of_Cloud_Storage_Buckets\" >5. Logging and Versioning of Cloud Storage Buckets<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/www.whizlabs.com\/blog\/gcp-best-practices\/#6_Stackdriver_Logging_and_Monitoring\" >6. Stackdriver Logging and Monitoring<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-8\" href=\"https:\/\/www.whizlabs.com\/blog\/gcp-best-practices\/#7_Zombie_Instances\" >7. Zombie Instances<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-9\" href=\"https:\/\/www.whizlabs.com\/blog\/gcp-best-practices\/#8_Committed_Sustained_Use_Discounts\" >8. Committed &amp; Sustained Use Discounts<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-10\" href=\"https:\/\/www.whizlabs.com\/blog\/gcp-best-practices\/#9_Limiting_the_Use_of_Cloud_Identity_and_Access_Management_IAM_Primitive_Roles\" >9. Limiting the Use of Cloud Identity and Access Management (IAM) Primitive Roles<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-11\" href=\"https:\/\/www.whizlabs.com\/blog\/gcp-best-practices\/#10_Delete_Persistent_Disk_Snapshots\" >10. Delete Persistent Disk Snapshots<\/a><\/li><\/ul><\/li><\/ul><\/nav><\/div>\n<h2><span class=\"ez-toc-section\" id=\"List_of_Must-Known_GCP_Best_Practices\"><\/span>List of Must-Known GCP Best Practices<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p class=\"p2\" style=\"text-align: justify;\"><span class=\"s1\">You can see the list of GCP best practices below. It is listed out in no specific order or pattern. While some of these practices are effective to tackle multiple issues faced by GCP customers, some are exclusive for specific issues. Let&#8217;s read on!<\/span><\/p>\n<h3><span class=\"ez-toc-section\" id=\"1_Optimizing_Persistent_Disk_Performance\"><\/span><span class=\"s1\">1. Optimizing Persistent Disk Performance<\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><span class=\"s1\">If you are looking to figure out Google cloud storage best practices, you can\u2019t neglect the optimization of persistent disks. Here, we shall try to explain the scenario with minimal tech jargon. When a virtual machine Compute Engine is launched in GCP, a disk is attached to act as the local storage for the application. When this Compute Engine is terminated, there are chances that the unattached disk will be still running. Even though the disks are not being used, GCP will continue to charge for the full price of the disk. This can cost you a lot of money from your cloud allocation. <\/span><\/p>\n<p class=\"p3\" style=\"text-align: justify;\"><span class=\"s1\">So, removing such unattached persistent disks would be one of the Google cloud storage best practices that can save a lot from your monthly bill. With Google compute engine, it is a hassle-free task that is described below.<\/span><\/p>\n<p><span class=\"s1\">Step 1: Open the list of projects from Google Cloud Engine. <\/span><\/p>\n<p><span class=\"s1\">Step 2: Find out the disks which are unattached to any instance<\/span><\/p>\n<p><span class=\"s1\">Step 3: Get the label key\/value of unattached disks.<\/span><\/p>\n<p><span class=\"s1\">Step 4: Finally, execute the \u201cdelete\u201d command on the selected disk. <\/span><\/p>\n<p class=\"p3\" style=\"text-align: justify;\"><span class=\"s1\">Hope, you have learned one of the GCP Best Practices that are very much important to a retail customer. These disks can only cost you money if these are still running even the engine is inactive. So, you need to continuously check for unattached disks in your GCP infrastructure to avoid unwanted expenses. <\/span><\/p>\n<h3><span class=\"ez-toc-section\" id=\"2_Ensuring_Continuous_Delivery\"><\/span><span class=\"s1\">2. Ensuring Continuous Delivery<\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><span class=\"s1\">While thinking about the best practices for continuous delivery on GCP, there are 4 main practices you can follow. First one is operational integration that takes care of the process flow of the software development which can go back and forth. The next factor is automation which can bring consistency to your Continuous Delivery process. Formulating effective deployment strategies can be considered as the 3<\/span><span class=\"s2\"><sup>rd<\/sup><\/span><span class=\"s1\"> factor. Finally, immutable infrastructure &#8211; creating infrastructure components with a clear set of specifications without any changes. All these 4 practices altogether can be considered as the best practices for continuous delivery on GCP. <\/span><\/p>\n<h3><span class=\"ez-toc-section\" id=\"3_Firewall_Rules\"><\/span><span class=\"s1\">3. Firewall Rules<\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><span class=\"s1\">Sometimes, you need to configure VPC firewall rules in Google Cloud platform for allowing specific network access only to certain hosts who are having legitimate requirements. Even though this type of configuring isn\u2019t practical in many situations, this can become very crucial while considering google cloud security best practices. <\/span><\/p>\n<p class=\"p5\" style=\"text-align: justify;\"><span class=\"s1\">There are certain text attributes known by the name \u201cnetwork tags\u201d which can be added to instances. It is recommended to leverage these tags to apply firewall rules. Also, these tags can be used for routing to logically related instances. Using these tags can save a lot of effort compared to working with IP addresses. <\/span><\/p>\n<h3><span class=\"ez-toc-section\" id=\"4_VPC_Flow_Logs\"><\/span><span class=\"s1\">4. VPC Flow Logs<\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><span class=\"s1\">This is a feature that allows you to capture traffic information which is moving back and forth in VPC network interfaces. If you enable flow logs for network subnets which are hosting active instances, you can easily troubleshoot specific traffic when it is not reaching an instance. Also, it can help you to perform detailed analysis of expenses occurred and find out the ways to optimize it. Enabling VPC flow logs is one of the GCP best practices to ensure cloud security by monitoring the traffic which is reaching instances. <\/span><\/p>\n<p class=\"p5\" style=\"text-align: justify;\"><span class=\"s1\">You can view these flow logs in\u00a0Stackdriver Logging and can be able to export these logs into a destination that are supported by Stackdriver Logging. For example BigQuery, Cloud Pub\/Sub etc.\u00a0<\/span><\/p>\n<h3><span class=\"ez-toc-section\" id=\"5_Logging_and_Versioning_of_Cloud_Storage_Buckets\"><\/span><span class=\"s1\">5. Logging and Versioning of Cloud Storage Buckets<\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><span class=\"s1\">While considering google cloud security best practices, logging and versioning of cloud storage buckets find its own place. These features must be enabled for cloud storage buckets as it contains very important data. As it helps to maintain, access and change logs for storage buckets, it can be very helpful during the inspection of security incidents. Versioning enables you to keep multiple variants of an object in the same storage bucket. In GCP, versioning helps to maintain and retrieve different versions of objects stored in the buckets. If you enable versioning, objects in buckets can be recovered both from application failures and user actions.\u00a0<\/span><\/p>\n<p class=\"p5\" style=\"text-align: justify;\"><span class=\"s1\">Although object versioning can result in increased storage costs, this can be partially reduced by implementing object lifecycle management process to older versions. However, these practices can always put into the list of the GCP best practices you can follow in order to ensure security and version control of your GCP infrastructure.<\/span><\/p>\n<blockquote><p>Also Read: <a href=\"https:\/\/www.whizlabs.com\/blog\/google-cloud-hosting\/\" target=\"_blank\" rel=\"noopener noreferrer\">Top Reasons to Choose Google Cloud Hosting<\/a><\/p><\/blockquote>\n<h3><span class=\"ez-toc-section\" id=\"6_Stackdriver_Logging_and_Monitoring\"><\/span><span class=\"s1\">6. Stackdriver Logging and Monitoring<\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><span class=\"s1\">Enabling the effective configuration of Stackdriver logging and monitoring is one of the best practices of the Google Cloud Platform to monitor the uptime and performance of GCP projects and their resources. As soon as you enable the Stackdriver logging, it is required to make sure that the monitoring alerts are configured. It will provide real-time alerts on various issues related to the resources. When one of the configured events trigger an alert condition, Stackdriver creates an incident in monitoring console. If notifications are properly configured, Stack will send notifications to third-party services as well to the point of contact.<span class=\"Apple-converted-space\">\u00a0 <\/span><\/span><\/p>\n<p class=\"p6\" style=\"text-align: justify;\"><span class=\"s1\">Also, keep in mind that the Stackdriver retention period is limited to 30 days. So for getting logs for an extended period, export sinks should be configured correctly. In the list of GCP Best Practices, this method is the one that provides real-time insights from the very large volume of system log files. <\/span><\/p>\n<h3><span class=\"ez-toc-section\" id=\"7_Zombie_Instances\"><\/span><span class=\"s1\">7. Zombie Instances<\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><span class=\"s1\">These are infrastructure components running on a cloud environment which are seldom or never used for any purpose. For example, there can be compute engine virtual machines that were used before, but no longer in use now. These instances will not be turned off after their consumption or it could be protected with some kinds of flags like \u2018deletionProtection\u2019. These instances can also get created by the failure of Compute Engine VMs, idle load balancers, and so on. <\/span><\/p>\n<p class=\"p5\" style=\"text-align: justify;\"><span class=\"s1\">Whatever be the cause of this zombie assets, you will get charged for them as long as these items remain\u00a0active. It is mandatory to terminate these kinds of assets so as to follow best practices on GCP as we have done till now. But, make sure to take backup of each asset to ensure the chances of recovery at a later time. <\/span><\/p>\n<h3><span class=\"ez-toc-section\" id=\"8_Committed_Sustained_Use_Discounts\"><\/span><span class=\"s1\">8. Committed &amp; Sustained Use Discounts<\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><span class=\"s1\">For stable workloads, Google Cloud Platform offers a discount in purchasing a specific amount of compute and memory. At a commitment of up to 3 years and no upfront payment, customers can save money up to 57% of the normal price with this purchase. Availing these discounts can be one among GCP best practices as these discounts can be utilized for standard, highcpu, highmem and custom machine types and node groups which are sole-tenant. When these discounts expire, Compute Engine Virtual Machines get charged at the normal price. Also, note that once these committed discounts got purchased, customers can\u2019t cancel these.\u00a0<\/span><\/p>\n<p class=\"p5\" style=\"text-align: justify;\"><span class=\"s1\">Suppose you want to get discounts for a long period nevertheless you haven\u2019t opted for these committed discounts, there is a way out. GCP has a plan called \u201cSustained Use Discounts\u201d which you can avail when you consume certain resources for a better part of a billing month. As these discounts are applicable to a lot of resource like sole-tenant nodes, GPU devices, custom machine, etc. opting for these discounts would be another best practice on GCP.\u00a0<\/span><\/p>\n<h3><span class=\"ez-toc-section\" id=\"9_Limiting_the_Use_of_Cloud_Identity_and_Access_Management_IAM_Primitive_Roles\"><\/span><b><\/b><span class=\"s1\">9. Limiting the Use of Cloud Identity and Access Management (IAM) Primitive Roles<\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p class=\"p5\" style=\"text-align: justify;\"><span class=\"s1\">As per the top GCP best practices, it is recommended to grant predefined roles to identities whenever possible, since they provide more granular access as compared to primitive roles. The use of primitive roles should be limited to few cases as given below<\/span><\/p>\n<ul>\n<li><span class=\"s1\">In case of projects working under small teams<\/span><\/li>\n<li><span class=\"s1\">When there is a requirement of changing the permissions of a project by a member<\/span><\/li>\n<li><span class=\"s1\">When there is a requirement to allow broader permissions for a project<\/span><\/li>\n<li><span class=\"s1\">When the platform won\u2019t provide a role that includes desired permissions. <\/span><\/li>\n<\/ul>\n<h3><span class=\"ez-toc-section\" id=\"10_Delete_Persistent_Disk_Snapshots\"><\/span><span class=\"s1\">10. Delete Persistent Disk Snapshots<\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><span class=\"s1\">The persistent disk snapshots are created for the purpose of backup of disks in case of data loss. Anyhow, it will cost you a lot of money if you haven\u2019t properly monitored these snapshots. Effective management of these snapshots can be one of GCP best practices which can help you work effortlessly. You can set a standard in your organization for how many of these snapshots should be retained per Compute Engine Virtual Machine. Also, note that recovery can occur from the most recent snapshots most of the time.<\/span><\/p>\n<blockquote><p>A Google Cloud Certification helps to\u00a0demonstrate your knowledge and expertise on Google Cloud Platform. Read our previous blog to know more about\u00a0<a href=\"https:\/\/www.whizlabs.com\/blog\/google-cloud-certifications\/\" target=\"_blank\" rel=\"noopener noreferrer\">Google Cloud Certifications<\/a>.<\/p><\/blockquote>\n<h4 class=\"p2\" style=\"text-align: justify;\"><span class=\"s1\">Final Words<\/span><\/h4>\n<p class=\"p2\" style=\"text-align: justify;\"><span class=\"s1\">Apart from those are listed here, there are many options in GCP such as containers which can be the best practice for reducing speed in GCP<span class=\"Apple-converted-space\">\u00a0 <\/span>as well as memory overhead. Anyway, we\u2019ve discussed most of the GCP best practices that you can follow in order to improve the performance of your GCP infrastructure and to reduce cost. Even for reducing the time incurred for operations, these can be GCP best practices that won\u2019t cost you anything. There is no rule of thumb that you need to follow all these practices in your Google Cloud. But, following these practices will definitely bring notable improvements in your GCP infrastructure.\u00a0<\/span><\/p>\n<p>Achieving a Google Cloud certification gives you expertise and thus enables you to implement GCP best practices. We at Whizlabs are aimed to help you in your certification preparation and so provide practice test series for the <a href=\"https:\/\/www.whizlabs.com\/google-cloud-certified-professional-cloud-architect\/\" target=\"_blank\" rel=\"noopener noreferrer\">Google Cloud Certified Professional Cloud Architect<\/a> and <a href=\"https:\/\/www.whizlabs.com\/google-cloud-certified-professional-data-engineer\/\" target=\"_blank\" rel=\"noopener noreferrer\">Google Cloud Certified Professional Data Engineer<\/a> certification exams.<\/p>\n<p>Become a Google Cloud certified professional now!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>As the fastest growing major cloud provider, Google Cloud Platform (GCP) is making a significant impact on the cloud adoption choices by several retail users &amp; enterprises these days. More and more new users are getting attracted by the convenience and features offered by this platform. With the rapid adoption rates, concerns related to the susceptibility of security and related things can also take place here. Accordingly, users have to keep an eye on the top GCP best practices that can benefit them to effortlessly meet their business objectives with fewer security concerns. If you are a GCP user or [&hellip;]<\/p>\n","protected":false},"author":169,"featured_media":69885,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_uag_custom_page_level_css":"","site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[12],"tags":[411,412,413,414,817,821,1553],"class_list":["post-69879","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-google-cloud","tag-best-practice-for-continuous-delivery-on-gcp","tag-best-practices-for-reducing-speed-in-gcp","tag-best-practices-of-google-cloud-platform","tag-best-practices-on-gcp","tag-google-cloud-security-best-practices","tag-google-cloud-storage-best-practices","tag-top-gcp-best-practices"],"uagb_featured_image_src":{"full":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2019\/01\/gcp-best-practices.png",600,315,false],"thumbnail":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2019\/01\/gcp-best-practices-150x150.png",150,150,true],"medium":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2019\/01\/gcp-best-practices-300x158.png",300,158,true],"medium_large":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2019\/01\/gcp-best-practices.png",600,315,false],"large":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2019\/01\/gcp-best-practices.png",600,315,false],"1536x1536":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2019\/01\/gcp-best-practices.png",600,315,false],"2048x2048":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2019\/01\/gcp-best-practices.png",600,315,false],"profile_24":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2019\/01\/gcp-best-practices.png",24,13,false],"profile_48":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2019\/01\/gcp-best-practices.png",48,25,false],"profile_96":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2019\/01\/gcp-best-practices.png",96,50,false],"profile_150":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2019\/01\/gcp-best-practices.png",150,79,false],"profile_300":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2019\/01\/gcp-best-practices.png",300,158,false],"tptn_thumbnail":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2019\/01\/gcp-best-practices-250x250.png",250,250,true],"web-stories-poster-portrait":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2019\/01\/gcp-best-practices.png",600,315,false],"web-stories-publisher-logo":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2019\/01\/gcp-best-practices.png",96,50,false],"web-stories-thumbnail":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2019\/01\/gcp-best-practices.png",150,79,false]},"uagb_author_info":{"display_name":"Girdharee Saran","author_link":"https:\/\/www.whizlabs.com\/blog\/author\/girdharee\/"},"uagb_comment_info":65,"uagb_excerpt":"As the fastest growing major cloud provider, Google Cloud Platform (GCP) is making a significant impact on the cloud adoption choices by several retail users &amp; enterprises these days. More and more new users are getting attracted by the convenience and features offered by this platform. With the rapid adoption rates, concerns related to the&hellip;","_links":{"self":[{"href":"https:\/\/www.whizlabs.com\/blog\/wp-json\/wp\/v2\/posts\/69879","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.whizlabs.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.whizlabs.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.whizlabs.com\/blog\/wp-json\/wp\/v2\/users\/169"}],"replies":[{"embeddable":true,"href":"https:\/\/www.whizlabs.com\/blog\/wp-json\/wp\/v2\/comments?post=69879"}],"version-history":[{"count":1,"href":"https:\/\/www.whizlabs.com\/blog\/wp-json\/wp\/v2\/posts\/69879\/revisions"}],"predecessor-version":[{"id":75901,"href":"https:\/\/www.whizlabs.com\/blog\/wp-json\/wp\/v2\/posts\/69879\/revisions\/75901"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.whizlabs.com\/blog\/wp-json\/wp\/v2\/media\/69885"}],"wp:attachment":[{"href":"https:\/\/www.whizlabs.com\/blog\/wp-json\/wp\/v2\/media?parent=69879"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.whizlabs.com\/blog\/wp-json\/wp\/v2\/categories?post=69879"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.whizlabs.com\/blog\/wp-json\/wp\/v2\/tags?post=69879"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}