What can I do with the GCP (Google Cloud Platform) Sandbox?
About the GCP Sandbox
The GCP Sandbox provides you with an open environment to come up with and work through your own training scenarios. It is an unguided experience where you determine what services, tools, and resources you'd like more practice with! We allow a variety of tools and services within GCP, so you have as many choices as possible when working through your training.
Google SQL Instances
Google recently changed the default machine type and the new default does not comply with our Terms of Service. If you are using a Google SQL instance, please follow these steps when you are creating an instance so it complies with our terms:
- Select Databases - SQL - Create Instance
- Select Show Configuration Options
- Change Machine Type and Storage to db-n1-standard-1
NOTE: if you do not follow these instructions, your lab or playground will be shut down.
Unlike the Playground AWS Sandbox, we are able to offer all services within GCP except a few explicitly disallowed services. This list covers the services that are NOT available within the GCP Sandbox.
- Identity and Access Management (IAM)
- Google Cloud Support
- Identity Aware Proxy (IAP)
- Resource Manager
- Service Account Management
- Service Management
- Cloud Dataprep
All Other services are available in the Playground GCP Sandbox!
In addition to the services listed above, we also have an abuse detection setup for our labs. We do not divulge the specifics of how or what we look for with this process to prevent exploitation. The purpose of the abuse detection is to ensure compliance with our Terms of Service. Any detection of abusive use can result in immediate termination of the running lab, loss of access to labs or other resources, or more severe consequences up to and including permanent account closure.
A few examples of abuse are listed below. This list is NOT comprehensive. If you have questions on whether your activity may be detected as abuse, please contact our support team BEFORE starting the activity or action.
- 10 or more instances created at a time
- Building VMs with more than 8GB RAM
- Using an Accelerator (GPU)
- Attempting to use resources for Bitcoin Mining
- Excessive Network Traffic
- DDoS or Port Scanning External Hosts
For more information, take a look at these additional FAQ pages: