Does any have some problem with me?
I cannot list the private connection services. But, I can list the allocated ip address ranges.
Below is the error with the gcloud command.
ERROR: (gcloud.services.vpc-peerings.list) User [john.doe@gm.com] does not have permission to access services instance [-] (or it may not exist): Required 'compute.networks.get' permission for 'projects/1234567890/global/networks/default'
Help Token: jashdkjashdjkashdjksa
- '@type': type.googleapis.com/google.rpc.PreconditionFailure
violations:
- subject: '120002'
type: googleapis.com
- '@type': type.googleapis.com/google.rpc.ErrorInfo
domain: servicenetworking.googleapis.com
reason: COMPUTE_IO_EXTERNAL
Solved! Go to Solution.
1) Go to IAM & Admin > IAM section and select Include Google-provided role grants checkbox on the top right
2) Verify that the default account in the format service-(project number)@service-networking.iam.gserviceaccount.com is available and the role servicenetworking.serviceAgent is assigned to it
3) check if the account is missing, create the account and assign the role servicenetworking.serviceAgentO
4)once the account is created, enable the private service connectio n again.
Hi @martonowibowo,
Based from that error that you've shared, the service accounts in the service project that will use its resouce sub-network must be allowed. To do this, you just have to grant the necessary permissions to the service account(s) by including the 'roles/compute.networkUser' role. This role enables access to a shared VPC network.
Hi
Thanks for the reply, but im still face the problem.
Even my user role is owner an editor and also attache the compute.networkUser role.
Please let me know if something wrong with the current roles.
Thanks
Hi.
I am facing the same issue both using gcloud command and in the web UI (VPC Networks > Private Service Connections > PRIVATE CONNECTIONS TO SERVICES).
Is there anyone who has had this problem and has been able to solve it?
1) Go to IAM & Admin > IAM section and select Include Google-provided role grants checkbox on the top right
2) Verify that the default account in the format service-(project number)@service-networking.iam.gserviceaccount.com is available and the role servicenetworking.serviceAgent is assigned to it
3) check if the account is missing, create the account and assign the role servicenetworking.serviceAgentO
4)once the account is created, enable the private service connectio n again.
Hello, I would like to share some of my experience in this problem
1. I was following this tutorial Connect Cloud Run to Cloud SQL
2 to the point I need to create IP ranges and then Private Connection to Services,
in Console, experiment went very well, no problems,
In gcloud cli, I can create the the IP ranges