如何为Google Cloud Compute Engine打开端口或所有端口

时间:2017-08-22 19:03:05

标签: google-cloud-platform google-compute-engine

我在GCP计算引擎中的VM上运行了IOTA IRI实例。 该实例使用端口14265进行通信,并通过执行类似curl http://localhost:14265的操作在本地进行检查确实进行了响应。

我想将此端口打开到vm外部,因此我设置了静态IP和防火墙规则以允许tcp:14265; udp:14265,但端口仍未响应。

我甚至尝试过所有这样做: enter image description here

但没有运气。没有端口打开,除了22为ssh(在port scanner中查找)

我知道这感觉就像是How to open a specific port such as 9090 in Google Compute Engine的副本,但我确实尝试过这些答案而且他们没有为我解决。

修改

运行两个命令我被要求在答案中运行:

D:\Downloads> gcloud compute networks list
NAME     MODE  IPV4_RANGE  GATEWAY_IPV4
default  auto

D:\Downloads>gcloud compute instances describe instance-1 --zone europe-west1-b
canIpForward: false
cpuPlatform: Intel Sandy Bridge
creationTimestamp: '2017-08-22T09:33:12.240-07:00'
description: ''
disks:
- autoDelete: true
  boot: true
  deviceName: instance-1
  index: 0
  interface: SCSI
  kind: compute#attachedDisk
  licenses:
  - https://www.googleapis.com/compute/v1/projects/ubuntu-os-cloud/global/licenses/ubuntu-1604-xenial
  mode: READ_WRITE
  source: https://www.googleapis.com/compute/v1/projects/iota-177616/zones/europe-west1-b/disks/instance-1
  type: PERSISTENT
id: '8895209582493819432'
kind: compute#instance
labelFingerprint: 42WmSpB8rSM=
machineType: https://www.googleapis.com/compute/v1/projects/iota-177616/zones/europe-west1-b/machineTypes/f1-micro
metadata:
  fingerprint: -pkE3KaIzLU=
  kind: compute#metadata
name: instance-1
networkInterfaces:
- accessConfigs:
  - kind: compute#accessConfig
    name: External NAT
    natIP: 35.187.9.204
    type: ONE_TO_ONE_NAT
  kind: compute#networkInterface
  name: nic0
  network: https://www.googleapis.com/compute/v1/projects/iota-177616/global/networks/default
  networkIP: 10.132.0.2
  subnetwork: https://www.googleapis.com/compute/v1/projects/iota-177616/regions/europe-west1/subnetworks/default
scheduling:
  automaticRestart: true
  onHostMaintenance: MIGRATE
  preemptible: false
selfLink: https://www.googleapis.com/compute/v1/projects/iota-177616/zones/europe-west1-b/instances/instance-1
serviceAccounts:
- email: 59105716861-compute@developer.gserviceaccount.com
  scopes:
  - https://www.googleapis.com/auth/devstorage.read_only
  - https://www.googleapis.com/auth/logging.write
  - https://www.googleapis.com/auth/monitoring.write
  - https://www.googleapis.com/auth/servicecontrol
  - https://www.googleapis.com/auth/service.management.readonly
  - https://www.googleapis.com/auth/trace.append
startRestricted: false
status: RUNNING
tags:
  fingerprint: 6smc4R4d39I=
  items:
  - http-server
  - https-server
zone: https://www.googleapis.com/compute/v1/projects/iota-177616/zones/europe-west1-b

1 个答案:

答案 0 :(得分:3)

如果没有一些诊断信息,很难给出确切的答案。

可能是正在为网络创建规则,而您的实例位于不同的网络中。

首先,检查项目中可用的网络:

gcloud compute networks list

其次,检查您的实例所在的网络:

gcloud compute instances describe [Instance Name] --zone [Zone]

检查应用于您的实例所使用的网络的防火墙规则:

gcloud compute firewall-rules list

同时检查目标标签是否合适。

正如您所看到的,没有应用于VM的标签,尽管如果您将规则应用于所有虚拟机应该适用规则,这是一个很好的做法。

  1. 编辑虚拟机并添加标签(例如前台服务器)

    gcloud compute instances add-tags [INSTANCE NAME] --zone [ZONE] --tags frontserver

  2. 现在创建防火墙规则并将其应用于创建的标记

    gcloud beta compute firewall-rules create [NAME_OF_THE_RULE] --direction=INGRESS --priority=1000 --network=default --allow=all --source-ranges=0.0.0.0/0 --target-tags=frontserver

  3. 检查它是否有效可以运行更新以将其限制为所需的端口和协议以及源IP

    gcloud beta compute firewall-rules update [NAME_OF_THE_RULE] --direction=INGRESS --priority=1000 --network=default --allow=tcp:--source-ranges=[your_source_IP] --target-tags=frontserver
    

    希望这会有所帮助,更多信息可以通过示例找到here