
Answer-first summary for fast verification
Answer: Enable the dry run mode on your perimeter. Add your new access level to the perimeter dry run configuration. Update the perimeter configuration after the access level has been vetted.
Option D is correct because it leverages VPC Service Controls' dry run mode, which allows testing perimeter changes without affecting production traffic. The dry run configuration specifically enables monitoring of potential violations before enforcing changes, minimizing disruption and avoiding service breakage. Option C is incorrect as it suggests adding the access level directly to the perimeter configuration rather than the dry run configuration, which could cause immediate enforcement and potential disruptions. Option A creates unnecessary overhead by duplicating the perimeter. Option B's approach of using a 'never matches' access level and gradual updates is inefficient and increases the risk of misconfiguration. The community discussion strongly supports D with high upvotes and references to Google documentation on dry run mode for safely testing perimeter changes.
Author: LeetQuiz Editorial Team
Ultimate access to all questions.
No comments yet.
You need to update an existing VPC Service Controls perimeter with a new access level while minimizing disruption to users and avoiding service breakage. What is the recommended approach?
A
Create an exact replica of your existing perimeter. Add your new access level to the replica. Update the original perimeter after the access level has been vetted.
B
Update your perimeter with a new access level that never matches. Update the new access level to match your desired state one condition at a time to avoid being overly permissive.
C
Enable the dry run mode on your perimeter. Add your new access level to the perimeter configuration. Update the perimeter configuration after the access level has been vetted.
D
Enable the dry run mode on your perimeter. Add your new access level to the perimeter dry run configuration. Update the perimeter configuration after the access level has been vetted.