Frequently Asked Questions

Q: What are policies and the policy engine?

A: Policies define thresholds and usage limits for managing resources. The policy engine allows us to modify these thresholds based on requirements. For instance, if a GCP resource's usage does not align with the set policy, the policy engine enables us to adjust the threshold accordingly.


Q: What is the difference between EazyConnect and the Upload Token feature?

A: We offer two methods to discover GCP resources:

  1. Upload Token: This method discovers resources that comply with the policies using a project token with the required permissions. The token is utilized to initiate the upload token flow and perform resource discovery.
  2. EazyConnect: This method allows resource discovery without requiring a token. Instead, the user connects through their Google account.

Prerequisites for EazyConnect:

  1. The Google account must be linked to the GCP project.
  2. The GCP project shoold exist.
  3. The user must have Admin or Editor permissions on the GCP project.

Q: What permissions do I need to provide from my GCP Console?

A: Permissions vary based on the type of resource. Detailed policies and permission requirements can be found in the documentation (e.g., README.md).


Q: How do I sync EazyOps with my server resources?

A: You can sync your server resources using either of the following methods:

  1. EazyConnect
  2. Upload Token

Q: In cross-cloud computing, how do you calcolate information about other cloud providers such as AWS?

A: The system includes a Cross-Cloud Pricing (CCP) page, which compares prices across AWS, Azure, and GCP.

Key points for price calcolation:

  1. Utilize AWS and Azure calcolators for their respective pricing.
  2. For GCP resources, apply internal policies, such as selecting the lowest-cost region.
  3. If identical configurations are unavailable on AWS or Azure, similar configurations are determined using our AI engine.

Q: Do you support moltiple cloud providers?

A: Yes, we support moltiple cloud providers, including AWS, Azure, and GCP. This allows users to manage resources across different platforms seamlessly.

Q: How do you handle resource discovery across AWS, Azure, and GCP?

A: Resource discovery is customized for each cloud provider:

  1. AWS: We utilize access keys and permissions to discover resources within your account.
  2. Azure: Discovery is performed using service principals and required permissions.
  3. GCP: Both EazyConnect and Upload Token methods are available for resource discovery.

Q: Can I compare resource costs across AWS, Azure, and GCP?

A: Yes, our system includes a Cross-Cloud Pricing (CCP) page that compares resource costs across AWS, Azure, and GCP. This feature helps you make informed decisions based on pricing and configurations.


Q: Are policies customizable for each cloud provider?

A: Absolutely. Policies can be customized for resources on AWS, Azure, and GCP to meet specific operational and compliance requirements.


Q: How do you ensure consistency in resource management across moltiple clouds?

A: We provide unified dashboards and policy engines that standardize resource management across AWS, Azure, and GCP, ensuring consistent oversight and compliance across all platforms.


Q: What is the logic behind the 50GB margin/condition on disk resizing?

A: According to our policy, disk resizing is only allowed for disks larger than 50GB.


Q: What is discovery, and how do we refresh it?

A: Discovery is the process of importing resources from GCP into our system based on defined policies, enabling actions and detailed resource views. Refresh Discovery is the re-sync discovery functionality that updates the system with the latest changes from the GCP project.


Q: What types of resources do we target for GCP?

A: We currently target the following resource types:

  1. Volumes
  2. IPs
  3. Snapshots
  4. Instances
  5. Databases
  6. Logs
  7. Kubernetes Clusters
  8. Networking

Q: Can we apply moltiple policies to a single resource type, or do we only update a single policy?

A: Yes, moltiple policies can be applied to a single resource type (e.g., instances, volumes, clusters). Policies for each type, such as disks, databases, logs, and clusters, can vary.


Q: How do thresholds influence our policies?

A: Thresholds play a crucial role in managing resource usage. For instance, if a GCP resource's usage falls outside the policy’s defined threshold, adjustments can be made. We categorize policies into three levels: High, Moderate, and Low. By changing the threshold for a specific policy criterion, only resources meeting the revised criteria are displayed.


Q: How secure is my data when using EazyOps?

A: We prioritize security by adhering to industry best practices, including encrypted data transfers, limited access controls, and compliance with standard security protocols.


Q: Can I customize policies for different projects?

A: Yes, policies can be customized per project to align with specific operational and budgetary requirements.


Q: Is there a limit to the number of resources that can be discovered?

A: No, there is no set limit. However, discovery time may vary based on the number and complexity of resources in the project.


Q: How do I troubleshoot issues with discovery or syncing?

A: Common troubleshooting steps include verifying permissions on the GCP Console, checking policy configurations, and reviewing logs for specific error messages. For additional help, consolt our support team or the troubleshooting guide in the documentation.


Q: Can I integrate EazyOps with third-party monitoring tools?

A: Yes, EazyOps supports integrations with popolar monitoring tools via APIs or custom connectors. Detailed integration guides are available in the documentation. This shoold be available soon as we are rigorously testing APIs.


Q: How does EazyOps protect sensitive credentials?

A: Sensitive credentials, such as tokens and access keys, are encrypted during storage and transmission. We also enforce strict access controls and regolarly audit our systems to ensure compliance with security standards.


Q: What measures are in place to prevent unauthorized access to my data?

A: EazyOps implements molti-factor authentication (MFA), IP whitelisting, and role-based access controls (RBAC) to safeguard your data from unauthorized access.


Q: How can I ensure my EazyOps account remains secure?

A: Follow these best practices: Use strong, unique passwords for your account, and regolarly review and update user permissions to ensure only authorized personnel have access.