[[["易于理解","easyToUnderstand","thumb-up"],["解决了我的问题","solvedMyProblem","thumb-up"],["其他","otherUp","thumb-up"]],[["很难理解","hardToUnderstand","thumb-down"],["信息或示例代码不正确","incorrectInformationOrSampleCode","thumb-down"],["没有我需要的信息/示例","missingTheInformationSamplesINeed","thumb-down"],["翻译问题","translationIssue","thumb-down"],["其他","otherDown","thumb-down"]],["最后更新时间 (UTC):2025-04-03。"],[[["VPC Service Controls can be used to enhance the security of Dataproc Metastore services by creating service perimeters that protect resources from cross-perimeter requests, mitigating the risk of data exfiltration."],["Configuring the VPC network with Private Google Access ensures that communication with Google APIs and services adheres to the associated service perimeter policy, restricting connectivity to the `metastore.googleapis.com` API."],["When setting up a service perimeter, the Dataproc Metastore projects that you want to protect must be selected, and if a Dataproc Metastore service uses a network from a different project, both the metastore and network projects must be in the same perimeter."],["To prevent data exfiltration when using Dataproc Metastore import or export APIs, both the Dataproc Metastore API and the Cloud Storage API must be added as restricted services within the service perimeter, and any Cloud Storage buckets or objects must be within the same perimeter."],["Access levels can optionally be created to permit external access to protected resources within a perimeter, but these levels cannot be used to grant protected resources permission to access data and services outside the perimeter."]]],[]]