Juju Support for Google Cloud Platform
Udi Nachmany
on 3 June 2015
For public cloud users of Ubuntu, we are particularly excited to let you know that this version includes support for Google Compute Engine (GCE). If you’re a Google Cloud Platform user, you can now spin up, scale, and modify production workloads easily and quickly, with our market-leading, open source universal modelling tool, Juju. If you are already a Juju user and thinking about using Google Cloud Platform, you can take your magic over to them and get going in no time.
Configuring for GCE: https://jujucharms.com/docs/stable/config-gce
Juju 1.23.2 release notes: https://jujucharms.com/docs/devel/reference-release-notes
This ties in very nicely to the upstream work (here and here) we’ve been doing in the past months, to make it easy to deploy Kubernetes servers using Juju, even on cloud environments that are not yet supported by the Kubernetes project.
On a related note, if you’re using Google Cloud Platform you’ve probably taken a look at the sleek Cloud Launcher Google have released recently. And if you looked closely, you also noticed that you can now spin up your Ubuntu VMs using this very friendly UI.
Ubuntu cloud
Ubuntu offers all the training, software infrastructure, tools, services and support you need for your public and private clouds.
Newsletter signup
Related posts
A comprehensive guide to NIS2 Compliance: Part 2 – Understanding NIS2 requirements
In my previous blog, we ran through what NIS2 is and who it applies to. In this second part of the series, I’ll break down the main requirements you’ll find...
A comprehensive guide to NIS2 Compliance: Part 1 – Understanding NIS2 and its scope
The EU NIS2 directive, which calls for strengthening cybersecurity across the European Union, is now active in all member states. Join me for this 3-part blog...
Rsync remote code execution and related vulnerability fixes available
Canonical’s security team has released updates of the rsync packages for all supported Ubuntu releases. The updates remediate CVE-2024-12084, CVE-2024-12085,...