
Ultimate access to all questions.
You have implemented a hub-and-spoke architecture in Google Cloud using VPC Network Peering to connect spoke networks to the hub. For security, you deployed a private GKE cluster in a spoke project with a private control plane endpoint, restricting authorized networks to the GKE node subnet. However, you cannot access the GKE control plane from another spoke project. How can you enable access to the GKE control plane from other spoke projects?
A
Add a firewall rule that allows port 443 from the other spoke projects.
B
Enable Private Google Access on the subnet where the GKE nodes are deployed.
C
Configure the authorized networks to be the subnet ranges of the other spoke projects.
D
Deploy a proxy in the spoke project where the GKE nodes are deployed and connect to the control plane through the proxy.