
Answer-first summary for fast verification
Answer: Use Datastream to replicate data from your on-premises MySQL database to BigQuery. Set up Cloud Interconnect between your on-premises data center and Google Cloud. Use Private connectivity as the connectivity method and allocate an IP address range within your VPC network to the Datastream connectivity configuration. Use Server-only as the encryption type when setting up the connection profile in Datastream.
The correct answer is **A**. This option involves using Datastream to replicate data from the on-premises MySQL database to BigQuery, leveraging Cloud Interconnect for a private connection that bypasses the public internet. This method ensures secure data ingestion by allocating an IP address range within your VPC network to the Datastream configuration and using Server-only encryption for secure data transfer. - **Option B** suggests modifying an existing ETL tool to use the BigQuery ODBC driver, which does not meet the requirement of avoiding the public internet for secure data transfer. - **Option C** proposes using a Forward-SSH tunnel for Datastream, which, while secure, still involves data transfer over the public internet, contrary to the requirement. - **Option D** relies on IP allowlisting and public IP addresses for Datastream, which does not fully secure the data transfer process as it still uses the public internet.
Author: LeetQuiz Editorial Team
Ultimate access to all questions.
No comments yet.
You are migrating your on-premises data warehouse to BigQuery. One of your data sources is a MySQL database in your on-premises data center, which lacks public IP addresses. How can you securely transfer data from this MySQL database into BigQuery without utilizing the public internet?
A
Use Datastream to replicate data from your on-premises MySQL database to BigQuery. Set up Cloud Interconnect between your on-premises data center and Google Cloud. Use Private connectivity as the connectivity method and allocate an IP address range within your VPC network to the Datastream connectivity configuration. Use Server-only as the encryption type when setting up the connection profile in Datastream.
B
Update your existing on-premises ETL tool to write to BigQuery by using the BigQuery Open Database Connectivity (ODBC) driver. Set up the proxy parameter in the simba.googlebigqueryodbc.ini file to point to your data center’s NAT gateway.
C
Use Datastream to replicate data from your on-premises MySQL database to BigQuery. Use Forward-SSH tunnel as the connectivity method to establish a secure tunnel between Datastream and your on-premises MySQL database through a tunnel server in your on-premises data center. Use None as the encryption type when setting up the connection profile in Datastream.
D
Use Datastream to replicate data from your on-premises MySQL database to BigQuery. Gather Datastream public IP addresses of the Google Cloud region that will be used to set up the stream. Add those IP addresses to the firewall allowlist of your on-premises data center. Use IP Allowlisting as the connectivity method and Server-only as the encryption type when setting up the connection profile in Datastream.