[[["易于理解","easyToUnderstand","thumb-up"],["解决了我的问题","solvedMyProblem","thumb-up"],["其他","otherUp","thumb-up"]],[["很难理解","hardToUnderstand","thumb-down"],["信息或示例代码不正确","incorrectInformationOrSampleCode","thumb-down"],["没有我需要的信息/示例","missingTheInformationSamplesINeed","thumb-down"],["翻译问题","translationIssue","thumb-down"],["其他","otherDown","thumb-down"]],["最后更新时间 (UTC):2025-08-18。"],[[["\u003cp\u003eVPC Service Controls enhances security by allowing you to configure perimeters around Google Cloud-managed services and manage data movement across these boundaries.\u003c/p\u003e\n"],["\u003cp\u003eWhen using Artifact Registry within a service perimeter, you can access container images inside the perimeter as well as Google Cloud-provided images, but cached Docker Hub images on \u003ccode\u003emirror.gcr.io\u003c/code\u003e require an added egress rule.\u003c/p\u003e\n"],["\u003cp\u003eTo enable \u003ccode\u003emirror.gcr.io\u003c/code\u003e access within a service perimeter, you need to add a specific egress rule that allows the \u003ccode\u003eartifactregistry.googleapis.com/DockerRead\u003c/code\u003e method to access the specified project.\u003c/p\u003e\n"],["\u003cp\u003eArtifact Registry can be accessed using default Google APIs and services domains' IP addresses, or special IPs like \u003ccode\u003e199.36.153.4/30\u003c/code\u003e (\u003ccode\u003erestricted.googleapis.com\u003c/code\u003e) and \u003ccode\u003e199.36.153.8/30\u003c/code\u003e (\u003ccode\u003eprivate.googleapis.com\u003c/code\u003e).\u003c/p\u003e\n"],["\u003cp\u003eEnsure that other Google Cloud services requiring access to Artifact Registry, such as Binary Authorization and Google Kubernetes Engine, are also within the service perimeter.\u003c/p\u003e\n"]]],[],null,[]]