首页 > 解决方案 > 防火墙规则名称与命令中提供的不同

问题描述

我编写了一个创建 VPC、防火墙规则和实例的小脚本。我给脚本提供了参数。但不是为防火墙规则采用参数,而是在防火墙名称字段中采用 instancename2 值。

ZONE=$2
MACHINE_TYPE=$3
IMAGE_FAMILY=$4
IMAGE_PROJECT=$5
BOOT_DISK_SIZE=$6
BOOT_DISK_TYPE=$7
NETWORK_NAME=$8
FIREWALL_RULE=$9
FIREWALL_NAME=$10
TAGS=$11
gcloud compute networks create $NETWORK_NAME --subnet-mode=auto
gcloud compute firewall-rules create $FIREWALL_NAME --network=$NETWORK_NAME --allow=$FIREWALL_RULE --source-tags=$TAGS
gcloud compute instances create $INSTANCE_NAME \
    --zone=$ZONE \
    --machine-type=$MACHINE_TYPE \
    --image-family=$IMAGE_FAMILY \
    --image-project=$IMAGE_PROJECT \
    --boot-disk-size=$BOOT_DISK_SIZE \
    --boot-disk-type=$BOOT_DISK_TYPE \
    --network-interface network=$NETWORK_NAME,no-address \
    --tags=$TAGS \


command : bash network.sh myvm us-west1-a f1-micro ubuntu-1810 ubuntu-os-cloud 10 pd-ssd mynetwork tcp:80 myrule mytag

output :
Created .
NAME       SUBNET_MODE  BGP_ROUTING_MODE  IPV4_RANGE  GATEWAY_IPV4
mynetwork  AUTO         REGIONAL

Instances on this network will not be reachable until firewall rules
are created. As an example, you can allow all internal traffic between
instances as well as SSH, RDP, and ICMP by running:

$ gcloud compute firewall-rules create <FIREWALL_NAME> --network mynetwork --allow tcp,udp,icmp --source-ranges <IP_RANGE>
$ gcloud compute firewall-rules create <FIREWALL_NAME> --network mynetwork --allow tcp:22,tcp:3389,icmp

Creating firewall...⠛Created 
Creating firewall...done.                                                                                      
NAME   NETWORK    DIRECTION  PRIORITY  ALLOW   DENY  DISABLED
myvm0  mynetwork  INGRESS    1000      tcp:80        False
Created.
NAME  ZONE        MACHINE_TYPE  PREEMPTIBLE  INTERNAL_IP  EXTERNAL_IP  STATUS
myvm  us-west1-a  f1-micro                   10.138.0.2                RUNNING

please check the name of firewall created (below 'creating firewall...done.'). It's not what i provided in command. Its similar to INSTANCE_NAME variable. 


标签: google-cloud-platform

解决方案


推荐阅读