0
0

Delete article

Deleted articles cannot be recovered.

Draft of this article would be also deleted.

Are you sure you want to delete this article?

【データ基盤】GCPのdataprocの技術を使用した所管どころ

Last updated at Posted at 2025-07-23

GCPでもETLツールとしてDataprocが存在する。AWSのGlueやAzureのADFのようにクラウドのETLツールである。

クラスターの作成
image.png

クラスター設定
image.png

image.png

パーミッションのエラーがえぐい

Permissions are missing for the default service account '984478690832-compute@developer.gserviceaccount.com', missing permissions: [storage.buckets.get, storage.objects.create, storage.objects.delete, storage.objects.get, storage.objects.list, storage.objects.update] on the project 'projects/gihyo-306807'. This usually happens when a custom resource (ex: custom staging bucket) or a user-managed VM Service account has been provided and the default/user-managed service account hasn't been granted enough permissions on the resource. See https://cloud.google.com/dataproc/docs/concepts/configuring-clusters/service-accounts#VM_service_account.

リクエスト ID: 8335348273477453190

bash.sh
 gcloud projects add-iam-policy-binding gihyo-306807 \
  --member="serviceAccount:984478690832-compute@developer.gserviceaccount.com" \
  --role="roles/storage.admin"

✅ これはどういう状態か?
Dataproc クラスター作成時に、GCP は通常 自動で一時的な Cloud Storage バケット(staging/temp) を作成します:

❗ 最も重要な推測:
Dataproc が staging/temp バケットを作成しようとしたが、サービスアカウントにその「作成権限」がなかった

missing permissions: [storage.buckets.get, storage.objects.create, ...]
✅ 今すぐやるべき対応
🔹 対応①:プロジェクトに明示的に Cloud Storage 権限を与える
プロジェクト gihyo-306807 にて、サービスアカウントに以下のロールを追加:

gcloud projects add-iam-policy-binding gihyo-306807
--member="serviceAccount:984478690832-compute@developer.gserviceaccount.com"
--role="roles/storage.admin"
これで:

バケットの作成(staging/temp)オブジェクトのアップロード/ダウンロードなど、すべての必要な権限が付与されます。

生成AIのGPTに聞いて、Dataprocが一時的にGCSにバケットを作成する際に権限がなかったのが原因だったようだ。

何とかクラスターが起動した
image.png

VMインスタンスを確認すると確かにインスタンスができている
image.png

作成したDataprocのクラスター上にジョブを作成してみる。
image.png

ジョブを実行して「完了」になったことがわかる
image.png

さて、クラスターの削除しておく

image.png

VMインスタンスも削除されたことがわかる
image.png

#GCSやNFSの作成

GCSは簡単に作れる。AWSのS3のバケットを作成する感覚でオブジェクトストレージを作成可能である。

image.png

NFSであるFireStoreを作成中。(1ヶ月100ドル近いので必ずシャットダウンをしよう)
image.png

作成したNFSの設定画面を開くと、マウントする際のファイルシステムが表示される。
image.png

nfs.sh
nishi2408katn@nfs-client-dev20250723:~$ sudo apt-get -y update && sudo apt-get -y install nfs-common
Get:1 file:/etc/apt/mirrors/debian.list Mirrorlist [30 B]
Get:5 file:/etc/apt/mirrors/debian-security.list Mirrorlist [39 B]                      
Hit:7 https://packages.cloud.google.com/apt google-compute-engine-bookworm-stable InRelease
Hit:2 https://deb.debian.org/debian bookworm InRelease       
Hit:8 https://packages.cloud.google.com/apt cloud-sdk-bookworm InRelease
Hit:3 https://deb.debian.org/debian bookworm-updates InRelease
Hit:4 https://deb.debian.org/debian bookworm-backports InRelease
Hit:9 https://packages.cloud.google.com/apt google-cloud-ops-agent-bookworm-2 InRelease
Hit:6 https://deb.debian.org/debian-security bookworm-security InRelease
Reading package lists... Done
Reading package lists... Done
Building dependency tree... Done
Reading state information... Done
The following additional packages will be installed:
  keyutils libevent-core-2.1-7 libnfsidmap1 rpcbind
Suggested packages:
  open-iscsi watchdog
The following NEW packages will be installed:
  keyutils libevent-core-2.1-7 libnfsidmap1 nfs-common rpcbind
0 upgraded, 5 newly installed, 0 to remove and 4 not upgraded.
Need to get 548 kB of archives.
After this operation, 2056 kB of additional disk space will be used.
Get:1 file:/etc/apt/mirrors/debian.list Mirrorlist [30 B]
Get:2 https://deb.debian.org/debian bookworm/main amd64 libevent-core-2.1-7 amd64 2.1.12-stable-8 [131 kB]
Get:3 https://deb.debian.org/debian bookworm/main amd64 libnfsidmap1 amd64 1:2.6.2-4+deb12u1 [54.9 kB]
Get:4 https://deb.debian.org/debian bookworm/main amd64 rpcbind amd64 1.2.6-6+b1 [48.3 kB]
Get:5 https://deb.debian.org/debian bookworm/main amd64 keyutils amd64 1.6.3-2 [54.5 kB]
Get:6 https://deb.debian.org/debian bookworm/main amd64 nfs-common amd64 1:2.6.2-4+deb12u1 [260 kB]
Fetched 548 kB in 0s (3538 kB/s)     
Selecting previously unselected package libevent-core-2.1-7:amd64.
(Reading database ... 71791 files and directories currently installed.)
Preparing to unpack .../libevent-core-2.1-7_2.1.12-stable-8_amd64.deb ...
Unpacking libevent-core-2.1-7:amd64 (2.1.12-stable-8) ...
Selecting previously unselected package libnfsidmap1:amd64.
Preparing to unpack .../libnfsidmap1_1%3a2.6.2-4+deb12u1_amd64.deb ...
Unpacking libnfsidmap1:amd64 (1:2.6.2-4+deb12u1) ...
Selecting previously unselected package rpcbind.
Preparing to unpack .../rpcbind_1.2.6-6+b1_amd64.deb ...
Unpacking rpcbind (1.2.6-6+b1) ...
Selecting previously unselected package keyutils.
Preparing to unpack .../keyutils_1.6.3-2_amd64.deb ...
Unpacking keyutils (1.6.3-2) ...
Selecting previously unselected package nfs-common.
Preparing to unpack .../nfs-common_1%3a2.6.2-4+deb12u1_amd64.deb ...
Unpacking nfs-common (1:2.6.2-4+deb12u1) ...
Setting up libnfsidmap1:amd64 (1:2.6.2-4+deb12u1) ...
Setting up rpcbind (1.2.6-6+b1) ...
Created symlink /etc/systemd/system/multi-user.target.wants/rpcbind.service → /lib/systemd/system/rpcbind.service.
Created symlink /etc/systemd/system/sockets.target.wants/rpcbind.socket → /lib/systemd/system/rpcbind.socket.
Setting up libevent-core-2.1-7:amd64 (2.1.12-stable-8) ...
Setting up keyutils (1.6.3-2) ...
Setting up nfs-common (1:2.6.2-4+deb12u1) ...

Creating config file /etc/idmapd.conf with new version

Creating config file /etc/nfs.conf with new version
Adding system user `statd' (UID 106) ...
Adding new user `statd' (UID 106) with group `nogroup' ...
Not creating home directory `/var/lib/nfs'.
Created symlink /etc/systemd/system/multi-user.target.wants/nfs-client.target → /lib/systemd/system/nfs-client.target.
Created symlink /etc/systemd/system/remote-fs.target.wants/nfs-client.target → /lib/systemd/system/nfs-client.target.
auth-rpcgss-module.service is a disabled or a static unit, not starting it.
nfs-idmapd.service is a disabled or a static unit, not starting it.
nfs-utils.service is a disabled or a static unit, not starting it.
proc-fs-nfsd.mount is a disabled or a static unit, not starting it.
rpc-gssd.service is a disabled or a static unit, not starting it.
rpc-statd-notify.service is a disabled or a static unit, not starting it.
rpc-statd.service is a disabled or a static unit, not starting it.
rpc-svcgssd.service is a disabled or a static unit, not starting it.
rpc_pipefs.target is a disabled or a static unit, not starting it.
var-lib-nfs-rpc_pipefs.mount is a disabled or a static unit, not starting it.
Processing triggers for man-db (2.11.2-2) ...
Processing triggers for libc-bin (2.36-9+deb12u10) ...
nishi2408katn@nfs-client-dev20250723:~$ 
nishi2408katn@nfs-client-dev20250723:~$ 
nishi2408katn@nfs-client-dev20250723:~$ sudo mkdir -p /mnt/test
nishi2408katn@nfs-client-dev20250723:~$ 
nishi2408katn@nfs-client-dev20250723:~$ 
nishi2408katn@nfs-client-dev20250723:~$ 
nishi2408katn@nfs-client-dev20250723:~$ 
nishi2408katn@nfs-client-dev20250723:~$ sudo mount 10.171.199.72:/vol1 /mnt/test
10.171.199.74^C
nishi2408katn@nfs-client-dev20250723:~$ 
nishi2408katn@nfs-client-dev20250723:~$ sudo mount 10.171.199.74:/vol1 /mnt/test
Created symlink /run/systemd/system/remote-fs.target.wants/rpc-statd.service → /lib/systemd/system/rpc-statd.service.
mount.nfs: access denied by server while mounting 10.171.199.74:/vol1
nishi2408katn@nfs-client-dev20250723:~$ 
nishi2408katn@nfs-client-dev20250723:~$ 
nishi2408katn@nfs-client-dev20250723:~$ 
nishi2408katn@nfs-client-dev20250723:~$ mount
sysfs on /sys type sysfs (rw,nosuid,nodev,noexec,relatime)
proc on /proc type proc (rw,nosuid,nodev,noexec,relatime)
udev on /dev type devtmpfs (rw,nosuid,relatime,size=1997692k,nr_inodes=499423,mode=755,inode64)
devpts on /dev/pts type devpts (rw,nosuid,noexec,relatime,gid=5,mode=620,ptmxmode=000)
tmpfs on /run type tmpfs (rw,nosuid,nodev,noexec,relatime,size=401892k,mode=755,inode64)
/dev/sda1 on / type ext4 (rw,relatime,discard,errors=remount-ro)
securityfs on /sys/kernel/security type securityfs (rw,nosuid,nodev,noexec,relatime)
tmpfs on /dev/shm type tmpfs (rw,nosuid,nodev,inode64)
tmpfs on /run/lock type tmpfs (rw,nosuid,nodev,noexec,relatime,size=5120k,inode64)
cgroup2 on /sys/fs/cgroup type cgroup2 (rw,nosuid,nodev,noexec,relatime,nsdelegate,memory_recursiveprot)
pstore on /sys/fs/pstore type pstore (rw,nosuid,nodev,noexec,relatime)
efivarfs on /sys/firmware/efi/efivars type efivarfs (rw,nosuid,nodev,noexec,relatime)
bpf on /sys/fs/bpf type bpf (rw,nosuid,nodev,noexec,relatime,mode=700)
systemd-1 on /proc/sys/fs/binfmt_misc type autofs (rw,relatime,fd=30,pgrp=1,timeout=0,minproto=5,maxproto=5,direct,pipe_ino=1955)
hugetlbfs on /dev/hugepages type hugetlbfs (rw,relatime,pagesize=2M)
mqueue on /dev/mqueue type mqueue (rw,nosuid,nodev,noexec,relatime)
debugfs on /sys/kernel/debug type debugfs (rw,nosuid,nodev,noexec,relatime)
tracefs on /sys/kernel/tracing type tracefs (rw,nosuid,nodev,noexec,relatime)
fusectl on /sys/fs/fuse/connections type fusectl (rw,nosuid,nodev,noexec,relatime)
configfs on /sys/kernel/config type configfs (rw,nosuid,nodev,noexec,relatime)
ramfs on /run/credentials/systemd-sysctl.service type ramfs (ro,nosuid,nodev,noexec,relatime,mode=700)
ramfs on /run/credentials/systemd-sysusers.service type ramfs (ro,nosuid,nodev,noexec,relatime,mode=700)
ramfs on /run/credentials/systemd-tmpfiles-setup-dev.service type ramfs (ro,nosuid,nodev,noexec,relatime,mode=700)
/dev/sda15 on /boot/efi type vfat (rw,relatime,fmask=0022,dmask=0022,codepage=437,iocharset=ascii,shortname=mixed,utf8,errors=remount-ro)
ramfs on /run/credentials/systemd-tmpfiles-setup.service type ramfs (ro,nosuid,nodev,noexec,relatime,mode=700)
binfmt_misc on /proc/sys/fs/binfmt_misc type binfmt_misc (rw,nosuid,nodev,noexec,relatime)
tmpfs on /run/user/1000 type tmpfs (rw,nosuid,nodev,relatime,size=401888k,nr_inodes=100472,mode=700,uid=1000,gid=1001,inode64)
sunrpc on /run/rpc_pipefs type rpc_pipefs (rw,relatime)
nishi2408katn@nfs-client-dev20250723:~$ cd /mnt/test
nishi2408katn@nfs-client-dev20250723:/mnt/test$ 
nishi2408katn@nfs-client-dev20250723:/mnt/test$ 
nishi2408katn@nfs-client-dev20250723:/mnt/test$ ls
nishi2408katn@nfs-client-dev20250723:/mnt/test$ sudo mount 10.171.199.74:/vol1 /mnt/test
mount.nfs: access denied by server while mounting 10.171.199.74:/vol1
nishi2408katn@nfs-client-dev20250723:/mnt/test$ sudo mount 10.171.199.74:/vol1_dev /mnt/test
nishi2408katn@nfs-client-dev20250723:/mnt/test$ 
nishi2408katn@nfs-client-dev20250723:/mnt/test$ 
nishi2408katn@nfs-client-dev20250723:/mnt/test$ 
nishi2408katn@nfs-client-dev20250723:/mnt/test$ 
nishi2408katn@nfs-client-dev20250723:/mnt/test$ mount
sysfs on /sys type sysfs (rw,nosuid,nodev,noexec,relatime)
proc on /proc type proc (rw,nosuid,nodev,noexec,relatime)
udev on /dev type devtmpfs (rw,nosuid,relatime,size=1997692k,nr_inodes=499423,mode=755,inode64)
devpts on /dev/pts type devpts (rw,nosuid,noexec,relatime,gid=5,mode=620,ptmxmode=000)
tmpfs on /run type tmpfs (rw,nosuid,nodev,noexec,relatime,size=401892k,mode=755,inode64)
/dev/sda1 on / type ext4 (rw,relatime,discard,errors=remount-ro)
securityfs on /sys/kernel/security type securityfs (rw,nosuid,nodev,noexec,relatime)
tmpfs on /dev/shm type tmpfs (rw,nosuid,nodev,inode64)
tmpfs on /run/lock type tmpfs (rw,nosuid,nodev,noexec,relatime,size=5120k,inode64)
cgroup2 on /sys/fs/cgroup type cgroup2 (rw,nosuid,nodev,noexec,relatime,nsdelegate,memory_recursiveprot)
pstore on /sys/fs/pstore type pstore (rw,nosuid,nodev,noexec,relatime)
efivarfs on /sys/firmware/efi/efivars type efivarfs (rw,nosuid,nodev,noexec,relatime)
bpf on /sys/fs/bpf type bpf (rw,nosuid,nodev,noexec,relatime,mode=700)
systemd-1 on /proc/sys/fs/binfmt_misc type autofs (rw,relatime,fd=30,pgrp=1,timeout=0,minproto=5,maxproto=5,direct,pipe_ino=1955)
hugetlbfs on /dev/hugepages type hugetlbfs (rw,relatime,pagesize=2M)
mqueue on /dev/mqueue type mqueue (rw,nosuid,nodev,noexec,relatime)
debugfs on /sys/kernel/debug type debugfs (rw,nosuid,nodev,noexec,relatime)
tracefs on /sys/kernel/tracing type tracefs (rw,nosuid,nodev,noexec,relatime)
fusectl on /sys/fs/fuse/connections type fusectl (rw,nosuid,nodev,noexec,relatime)
configfs on /sys/kernel/config type configfs (rw,nosuid,nodev,noexec,relatime)
ramfs on /run/credentials/systemd-sysctl.service type ramfs (ro,nosuid,nodev,noexec,relatime,mode=700)
ramfs on /run/credentials/systemd-sysusers.service type ramfs (ro,nosuid,nodev,noexec,relatime,mode=700)
ramfs on /run/credentials/systemd-tmpfiles-setup-dev.service type ramfs (ro,nosuid,nodev,noexec,relatime,mode=700)
/dev/sda15 on /boot/efi type vfat (rw,relatime,fmask=0022,dmask=0022,codepage=437,iocharset=ascii,shortname=mixed,utf8,errors=remount-ro)
ramfs on /run/credentials/systemd-tmpfiles-setup.service type ramfs (ro,nosuid,nodev,noexec,relatime,mode=700)
binfmt_misc on /proc/sys/fs/binfmt_misc type binfmt_misc (rw,nosuid,nodev,noexec,relatime)
tmpfs on /run/user/1000 type tmpfs (rw,nosuid,nodev,relatime,size=401888k,nr_inodes=100472,mode=700,uid=1000,gid=1001,inode64)
sunrpc on /run/rpc_pipefs type rpc_pipefs (rw,relatime)
10.171.199.74:/vol1_dev on /mnt/test type nfs (rw,relatime,vers=3,rsize=1048576,wsize=1048576,namlen=255,hard,proto=tcp,timeo=600,retrans=2,sec=sys,mountaddr=10.171.199.74,mountvers=3,mountport=2050,mountproto=tcp,local_lock=none,addr=10.171.199.74)
nishi2408katn@nfs-client-dev20250723:/mnt/test$ 
nishi2408katn@nfs-client-dev20250723:/mnt/test$ 
nishi2408katn@nfs-client-dev20250723:/mnt/test$ 
nishi2408katn@nfs-client-dev20250723:/mnt/test$ echo " Test file" /mnt/test/test.file
 Test file /mnt/test/test.file
nishi2408katn@nfs-client-dev20250723:/mnt/test$ 
nishi2408katn@nfs-client-dev20250723:/mnt/test$ 
nishi2408katn@nfs-client-dev20250723:/mnt/test$ echo " Test file" > /mnt/test/test.file
-bash: /mnt/test/test.file: Permission denied
nishi2408katn@nfs-client-dev20250723:/mnt/test$ 
nishi2408katn@nfs-client-dev20250723:/mnt/test$ 
nishi2408katn@nfs-client-dev20250723:/mnt/test$ chmod 755 /mnt/test
chmod: changing permissions of '/mnt/test': Operation not permitted
nishi2408katn@nfs-client-dev20250723:/mnt/test$ 
nishi2408katn@nfs-client-dev20250723:/mnt/test$ 
nishi2408katn@nfs-client-dev20250723:/mnt/test$ sudo chmod 755 /mnt/test
nishi2408katn@nfs-client-dev20250723:/mnt/test$ 
nishi2408katn@nfs-client-dev20250723:/mnt/test$ 
nishi2408katn@nfs-client-dev20250723:/mnt/test$ echo " Test file" > /mnt/test/test.file
-bash: /mnt/test/test.file: Permission denied
nishi2408katn@nfs-client-dev20250723:/mnt/test$ 
nishi2408katn@nfs-client-dev20250723:/mnt/test$ sudo echo " Test file" > /mnt/test/test.file
-bash: /mnt/test/test.file: Permission denied
nishi2408katn@nfs-client-dev20250723:/mnt/test$ 
nishi2408katn@nfs-client-dev20250723:/mnt/test$ ls /mnt/test
lost+found
nishi2408katn@nfs-client-dev20250723:/mnt/test$ 
nishi2408katn@nfs-client-dev20250723:/mnt/test$ 
nishi2408katn@nfs-client-dev20250723:/mnt/test$ chmod 777 /m
media/ mnt/   
nishi2408katn@nfs-client-dev20250723:/mnt/test$ chmod 777 /mnt/test
chmod: changing permissions of '/mnt/test': Operation not permitted
nishi2408katn@nfs-client-dev20250723:/mnt/test$ 
nishi2408katn@nfs-client-dev20250723:/mnt/test$ chmod 777 /mnt/test/
chmod: changing permissions of '/mnt/test/': Operation not permitted
nishi2408katn@nfs-client-dev20250723:/mnt/test$ 
nishi2408katn@nfs-client-dev20250723:/mnt/test$ sudo chmod 777 /mnt/test/
nishi2408katn@nfs-client-dev20250723:/mnt/test$ 
nishi2408katn@nfs-client-dev20250723:/mnt/test$ 
nishi2408katn@nfs-client-dev20250723:/mnt/test$ echo " Test file" > /mnt/test/test.file
nishi2408katn@nfs-client-dev20250723:/mnt/test$ 
nishi2408katn@nfs-client-dev20250723:/mnt/test$ 
nishi2408katn@nfs-client-dev20250723:/mnt/test$ 
nishi2408katn@nfs-client-dev20250723:/mnt/test$ ls /mnt/test/test.file 
/mnt/test/test.file
nishi2408katn@nfs-client-dev20250723:/mnt/test$ cat /mnt/test/test.file 
 Test file
nishi2408katn@nfs-client-dev20250723:/mnt/test$ 
nishi2408katn@nfs-client-dev20250723:/mnt/test$ 
nishi2408katn@nfs-client-dev20250723:/mnt/test$ 
nishi2408katn@nfs-client-dev20250723:/mnt/test$ umount /mnt/test
umount.nfs: failed to prepare umount: Operation not permitted

nishi2408katn@nfs-client-dev20250723:/mnt/test$ 
nishi2408katn@nfs-client-dev20250723:/mnt/test$ 
nishi2408katn@nfs-client-dev20250723:/mnt/test$ sudo umount /mnt/test

nishi2408katn@nfs-client-dev20250723:/mnt/test$ 
nishi2408katn@nfs-client-dev20250723:/mnt/test$ 
nishi2408katn@nfs-client-dev20250723:/mnt/test$ ls /mnt/test/test.file 
ls: cannot access '/mnt/test/test.file': No such file or directory
nishi2408katn@nfs-client-dev20250723:/mnt/test$ 
nishi2408katn@nfs-client-dev20250723:/mnt/test$ 
nishi2408katn@nfs-client-dev20250723:/mnt/test$ sudo mount 10.171.199.74:/vol1_dev /mnt/test

作成した後は削除
image.png

Firestore側を削除するとサーバ側は固まる。。(当然だけど・・)

bash.sh
nishi2408katn@nfs-client-dev20250723:/mnt/test$ 
nishi2408katn@nfs-client-dev20250723:/mnt/test$ ls /mnt/test
^C
nishi2408katn@nfs-client-dev20250723:/mnt/test$ 
nishi2408katn@nfs-client-dev20250723:/mnt/test$ mount
sysfs on /sys type sysfs (rw,nosuid,nodev,noexec,relatime)
proc on /proc type proc (rw,nosuid,nodev,noexec,relatime)
udev on /dev type devtmpfs (rw,nosuid,relatime,size=1997692k,nr_inodes=499423,mode=755,inode64)
devpts on /dev/pts type devpts (rw,nosuid,noexec,relatime,gid=5,mode=620,ptmxmode=000)
tmpfs on /run type tmpfs (rw,nosuid,nodev,noexec,relatime,size=401892k,mode=755,inode64)
/dev/sda1 on / type ext4 (rw,relatime,discard,errors=remount-ro)
securityfs on /sys/kernel/security type securityfs (rw,nosuid,nodev,noexec,relatime)
tmpfs on /dev/shm type tmpfs (rw,nosuid,nodev,inode64)
tmpfs on /run/lock type tmpfs (rw,nosuid,nodev,noexec,relatime,size=5120k,inode64)
cgroup2 on /sys/fs/cgroup type cgroup2 (rw,nosuid,nodev,noexec,relatime,nsdelegate,memory_recursiveprot)
pstore on /sys/fs/pstore type pstore (rw,nosuid,nodev,noexec,relatime)
efivarfs on /sys/firmware/efi/efivars type efivarfs (rw,nosuid,nodev,noexec,relatime)
bpf on /sys/fs/bpf type bpf (rw,nosuid,nodev,noexec,relatime,mode=700)
systemd-1 on /proc/sys/fs/binfmt_misc type autofs (rw,relatime,fd=30,pgrp=1,timeout=0,minproto=5,maxproto=5,direct,pipe_ino=1955)
hugetlbfs on /dev/hugepages type hugetlbfs (rw,relatime,pagesize=2M)
mqueue on /dev/mqueue type mqueue (rw,nosuid,nodev,noexec,relatime)
debugfs on /sys/kernel/debug type debugfs (rw,nosuid,nodev,noexec,relatime)
tracefs on /sys/kernel/tracing type tracefs (rw,nosuid,nodev,noexec,relatime)
fusectl on /sys/fs/fuse/connections type fusectl (rw,nosuid,nodev,noexec,relatime)
configfs on /sys/kernel/config type configfs (rw,nosuid,nodev,noexec,relatime)
ramfs on /run/credentials/systemd-sysctl.service type ramfs (ro,nosuid,nodev,noexec,relatime,mode=700)
ramfs on /run/credentials/systemd-sysusers.service type ramfs (ro,nosuid,nodev,noexec,relatime,mode=700)
ramfs on /run/credentials/systemd-tmpfiles-setup-dev.service type ramfs (ro,nosuid,nodev,noexec,relatime,mode=700)
/dev/sda15 on /boot/efi type vfat (rw,relatime,fmask=0022,dmask=0022,codepage=437,iocharset=ascii,shortname=mixed,utf8,errors=remount-ro)
ramfs on /run/credentials/systemd-tmpfiles-setup.service type ramfs (ro,nosuid,nodev,noexec,relatime,mode=700)
binfmt_misc on /proc/sys/fs/binfmt_misc type binfmt_misc (rw,nosuid,nodev,noexec,relatime)
tmpfs on /run/user/1000 type tmpfs (rw,nosuid,nodev,relatime,size=401888k,nr_inodes=100472,mode=700,uid=1000,gid=1001,inode64)
sunrpc on /run/rpc_pipefs type rpc_pipefs (rw,relatime)
10.171.199.74:/vol1_dev on /mnt/test type nfs (rw,relatime,vers=3,rsize=1048576,wsize=1048576,namlen=255,hard,proto=tcp,timeo=600,retrans=2,sec=sys,mountaddr=10.171.199.74,mountvers=3,mountport=2050,mountproto=tcp,local_lock=none,addr=10.171.199.74)
nishi2408katn@nfs-client-dev20250723:/mnt/test$ umount /mnt/test

GCPは削除

image.png

Pub/Sub
トピックとサブスクリプションを作成して、メッセージを送ることが可能である。
サブスクリプション画面から、メッセージを入力するとメッセージが届いていることがわかる。
image.png

image.png

0
0
0

Register as a new user and use Qiita more conveniently

  1. You get articles that match your needs
  2. You can efficiently read back useful information
  3. You can use dark theme
What you can do with signing up
0
0

Delete article

Deleted articles cannot be recovered.

Draft of this article would be also deleted.

Are you sure you want to delete this article?