GCP PlayCloud Labs
-
GCP PlayCloud Labs
-
Guided Lab: How to Launch a GCP Compute Engine Linux Instance
-
Guided Lab: Creating a VM Using Instance Templates
-
Guided Lab: Creating and Managing Instance Groups in Compute Engine
-
Guided Lab: Creating a Spot VM Instance
-
Guided Lab: Configuring Shielded VM Options
-
Guided Lab: Exploring Instance Metadata in Google Cloud
-
Guided Lab: Vertically Scaling a VM Instance
-
Guided Lab: Setting up a Web Server on a VM Instance
-
Guided Lab: Using Startup Scripts in GCP VM Instances
-
Guided Lab: Creating a Custom Image from a VM Instance with Web Server in Google Cloud
-
Guided Lab: Creating VM Snapshots and Restoring a VM from a Snapshot
-
Guided Lab: Setting Up and Managing a Database on a VM Instance
-
Guided Lab: Installing WordPress on an Ubuntu VM Instance with LEMP Stack
-
Guided Lab: Deploying a LAMP Stack on a Compute Engine VM
-
Guided Lab: Reserving or Promoting a Static IP Address for a VM Instance
-
Guided Lab: SSH Access to GCP VM Instance from Local Machine using SSH Key Pair
-
Guided Lab: Guarding Your VM with Deletion Protection
-
Guided Lab: Setting Up a Linux Bastion Host on GCP
-
Guided Lab: Creating a Cloud Storage Bucket
-
Guided Lab: Uploading, Organizing, and Managing Objects in Cloud Storage
-
Guided Lab: Exploring Google Cloud Storage Classes
-
Guided Lab: Hosting a Static Website in Google Cloud Storage Bucket
-
Guided Lab: Protecting Data on Cloud Storage Bucket Against Accidental Delete and Overwrite Using Object Versioning
-
Guided Lab: Using Cloud Storage Lifecycle Rules to Automate Object Management
-
Guided Lab: Managing Cloud Storage Buckets via SSH Commands
-
Guided Lab: Creating a Cloud SQL Instance
-
Guided Lab: Running SQL Commands in Cloud SQL Studio
-
Guided Lab: Creating and Restoring Cloud SQL Backups
-
Guided Lab: Integrating Cloud SQL Database instance with a VM instance
-
Guided Lab: Connecting Cloud SQL Database with MySQL Workbench (Local)
-
Guided Lab: Guarding Your Cloud SQL Instances with Deletion Protection
-
Guided Lab: Creating a Cloud NAT Gateway
-
Guided Lab: Creating a Google Kubernetes Engine (GKE) Cluster
-
Guided Lab: Connecting to a Kubernetes Engine Cluster
-
Guided Lab: Deploying a Simple Web Application on GKE
-
Guided Lab: Creating a Custom Virtual Private Cloud (VPC)
-
Guided Lab: Establishing VPC Peering for Secure Cross‑Network Communication
-
Guided Lab: Configuring Firewall Rules to Secure and Access a VM
-
Guided Lab: Creating an Application Load Balancer
-
Guided Lab: Creating a Network Load Balancer
Guided Lab: Creating a Custom Virtual Private Cloud (VPC)
Description
A VPC can automatically build your network topology by assigning subnet ranges and policies, or you can customize them yourself. CIDR ranges can also be expanded without causing downtime.
In this lab, you will create a custom VPC in Google Cloud with subnets, firewall rules, and a VM instance to verify connectivity. By the end, you’ll have a working network environment suitable for hosting applications.
Prerequisites
To ensure the successful completion of this lab, you must have prior experience in creating VM instances and be familiar with their essential components. If you feel that your knowledge in this area is insufficient, we highly recommend taking this lab to gain the necessary understanding:
Objectives
In this lab, you will:
- Create a custom VPC with a defined IP range
- Add a subnet
- Configure firewall rules for SSH and ICMP during VPC creation
- Launch a VM instance in the VPC
- Verify connectivity
Lab Steps
Create the VPC
1. In the Google Cloud Console, navigate to VPC network → VPC networks
2. Click Create VPC network
-1-15JAN2026.png)
3. Enter:
- Name:
custom-vpc - Subnet creation mode: Custom
-2-15JAN2026.png)
4. Add a subnet:
- demo-subnet:
10.0.1.0/24(Region:us-central1)
-3-15JAN2026.png)
5. Under Firewall rules, select All IPv4 firewall rules. This automatically creates rules to allow SSH, RDP, and ICMP traffic.
-4-15JAN2026.png)
6. Leave other configurations at their default values.
7. Click Create
Launch a VM in the Subnet
1. Go to Compute Engine → VM instances → Create instance.
2. Configure the VM:
- Name:
test-vm - Machine type: Choose the e2-micro machine type.
- Region/Zone:
us-central1-a - Under Networking > Network interfaces
- Edit the Network interface from default to
custom-vpc
- Edit the Network interface from default to
- Subnet:
demo-subnet
-5-15JAN2026.png)
- Leave other configurations at their default values.
3. Click Create
Test Connectivity
From the Cloud Console SSH session:
- Run
ping google.com→ should succeed.
-6-15JAN2026.png)
- Run
curl ifconfig.me→ should return the VM’s public IP.
-7-15JAN2026.png)
Congratulations! You have successfully created a custom VPC, configured firewall rules during creation, launched a VM, and verified connectivity.