Google Distributed Cloud (GDC) 经过网闸隔离的设备是一种集成式硬件和软件平台,专为数据中心之外的战术性边缘环境而设计。它创建了一个与互联网物理断开的隔离式“盒装主权云”。借助此设备,您可以在安全且完全隔离的环境中部署虚拟机 (VM)、基于容器的工作负载和 Vertex AI 等托管服务。
[[["易于理解","easyToUnderstand","thumb-up"],["解决了我的问题","solvedMyProblem","thumb-up"],["其他","otherUp","thumb-up"]],[["很难理解","hardToUnderstand","thumb-down"],["信息或示例代码不正确","incorrectInformationOrSampleCode","thumb-down"],["没有我需要的信息/示例","missingTheInformationSamplesINeed","thumb-down"],["翻译问题","translationIssue","thumb-down"],["其他","otherDown","thumb-down"]],["最后更新时间 (UTC):2025-09-04。"],[[["\u003cp\u003eGoogle Distributed Cloud air-gapped appliance is a portable, private cloud solution designed for use outside of traditional data centers, such as in the field or remote sites, enabling deployment of VM, container workloads, and Google-managed services.\u003c/p\u003e\n"],["\u003cp\u003eThe appliance is a human-portable device weighing around 100 lbs, designed for single tenancy, featuring a hyperconverged system with three nodes providing both compute and storage, and does not have a separate storage pool as in standard GDC air-gapped.\u003c/p\u003e\n"],["\u003cp\u003eUnlike data center installations, the appliance is typically plugged into an existing customer network that may change as the device moves, impacting both host systems and guest workloads.\u003c/p\u003e\n"],["\u003cp\u003eThe device offers software and services such as Kubernetes Cluster Service, virtual machine hosting, machine learning using deep learning containers, and data analytics, all with block and object storage.\u003c/p\u003e\n"],["\u003cp\u003eThe appliance's hierarchical architecture involves three tiers of users: Infrastructure Operators, Platform Administrators, and Application Operators, each managing different aspects of the system, from hardware and software installation to workload management.\u003c/p\u003e\n"]]],[],null,["# About Google Distributed Cloud air-gapped appliance\n\nGoogle Distributed Cloud (GDC) air-gapped appliance is an integrated hardware and software platform\ndesigned for tactical edge environments outside a data center. It creates an\nisolated \"sovereign cloud in a box\" that is physically disconnected from the\ninternet. This appliance lets you deploy virtual machines (VMs), container-based\nworkloads, and managed services like Vertex AI within a secure and\nair-gapped environment.\n\nThe appliance weighs about 100 lbs (\\~45.3 kg) and can be carried by two people. The appliance is\nnot operational while it is moved from one location to the next. It might be moved\non and off vehicles and might be subject to rougher treatment than in a data\ncenter. While the appliance is running, it might be in an uncontrolled environment\nsubject to more temperature variations and dust than a data center, such as a\ntent or a repurposed building.\n\nThe device can run disconnected on an air-gapped customer network with access to\nother resources, or a local network without an uplink. It can also run\nconnected to a network that is routable to a Distributed Cloud data\ncenter instance.\n\nGoogle Distributed Cloud air-gapped appliance offers the following features:\n\n**Advanced AI capabilities** : Enhance the performance of mission-critical\napplications by using built-in\n[AI solutions](/distributed-cloud/hosted/docs/latest/appliance/application/ao-user/vertex-ai-overview) like\ntranslation, speech, and optical character recognition (OCR). For example, use\nOCR and translation features to scan and translate documents written in\ndifferent languages, making them accessible and understandable in the field.\n\n**Rugged and portable design**: Built to withstand harsh environmental\nconditions, including extreme temperatures, shock, and vibration,\nGoogle Distributed Cloud air-gapped appliance has a rugged and portable design that meets stringent\naccreditation requirements like MIL-STD-810H, ensuring reliable operation even\nin challenging scenarios.\n\n**Full isolation**: Designed to operate without any connectivity to Google Cloud\nor the public internet. The appliance remains fully functional in disconnected\nenvironments, such as DDIL, preserving the security and isolation of the\ninfrastructure, services, and the APIs that it manages. This isolation makes the\nappliance ideal for processing sensitive data, while meeting strict regulatory,\ncompliance, and sovereignty requirements.\n\n**Integrated cloud services**: Infrastructure-as-a-services (IaaS) features like\ncompute, networking, and storage, and Google Cloud services like data transfer.\n\n**Data security**: Robust security features like encryption, data isolation,\nfirewalls, and secure boot to protect sensitive information.\n\n**Department of Defense (DoD) Impact Level 5 (IL5) accreditation**: The\nappliance achieved Impact Level 5 accreditation, the highest level of security\ncontrols and protection required for unclassified, but sensitive information.\n\nDifferences between GDC air-gapped appliance and GDC air-gapped\n---------------------------------------------------------------\n\nThere are several key differences between GDC air-gapped appliance and\nGDC air-gapped running in a data center.\n\n### Tenancy\n\nThe appliance is single tenant and only supports one GDC\nair-gapped organization.\n\n### Cluster model\n\nGoogle Distributed Cloud air-gapped appliance operates a single cluster that encompasses all\nthree of its bare metal nodes. A dedicated management API server, which runs as\npod workloads on the cluster, hosts management plane APIs. User workloads, which\ninclude both VMs and Kubernetes pods, can run on this cluster.\n\n### Networking\n\nGDC air-gapped appliance devices have a different integration pattern with\ncustomer networks than data center installations. Data center devices are\ntypically installed complete with a network configuration plan authored and\nimplemented by networking professionals. GDC air-gapped appliance devices are\ntypically brought to a location and plugged into an existing customer network.\nThe network that the device is connected to changes as the device is moved from\none location to another. Though the appliance uses different networking hardware\nthan the data center solution, you can connect the appliance to an external\nnetwork using the provided hardware.\n\n### System management\n\nGDC air-gapped appliance has a different lifecycle from the\nGDC air-gapped data center. For the appliance, Google\n(or our delegates) installs the system, and then hands it to the customer. The\ncustomer performs some Infrastructure Operator (IO) configuration tasks such as\nconfiguring identity and networking, and then can use the device. The customer\nis responsible for several IO tasks such as update or system monitoring.\n\nHardware\n--------\n\n| **Important:** To access the URLs on this page, you must connect to the internet. The URLs are provided for use when you have such access.\n\nGDC air-gapped appliance is a small form factor device that consists of a chassis\nthat holds three blades and a networking switch. The case has carry handles and\nwheels so that it can be transported and used in rugged environments.\n\nSoftware\n--------\n\nGDC air-gapped appliance offers the following software and services:\n\n### Services\n\nThe available services include the following:\n\n- Compute\n - [Virtual machine](/distributed-cloud/hosted/docs/latest/appliance/application/ao-user/vms/vm-introduction) hosting\n - [GKE on GDC](/distributed-cloud/hosted/docs/latest/appliance/platform/pa-user/clusters) for deploying [containers](/distributed-cloud/hosted/docs/latest/appliance/application/ao-user/containers/containers-intro)\n- AI/ML\n - [Vertex AI OCR](/distributed-cloud/hosted/docs/latest/appliance/application/ao-user/vertex-ai-ocr) API\n - [Vertex AI Speech-to-Text](/distributed-cloud/hosted/docs/latest/appliance/application/ao-user/vertex-ai-stt) API\n - [Vertex AI Translate](/distributed-cloud/hosted/docs/latest/appliance/application/ao-user/vertex-ai-translation) API\n - [Machine learning](/distributed-cloud/hosted/docs/latest/appliance/user/dl-container) using a Google-provided deep learning container\n- Security\n - [Identity and access management](/distributed-cloud/hosted/docs/latest/appliance/platform/pa-user/iam/connect-identity)\n - [Encryption at transit and at rest](/distributed-cloud/hosted/docs/latest/appliance/admin/encrypt-data)\n- Storage\n - [Block and object storage](/distributed-cloud/hosted/docs/latest/appliance/platform/pa-user/storage-overview)\n- Networking\n - Load balancing (internal and external)\n - Network security policies\n- [Logging and monitoring](/distributed-cloud/hosted/docs/latest/appliance/platform/pa-user/obs-overview)\n\n### Storage\n\nGDC air-gapped appliance provides block and object storage with software-defined storage. Block and object storage share the same underlying storage pool and capacity.\n\n\u003cbr /\u003e\n\n### NTP server\n\nGDC air-gapped appliance does not have a built-in NTP server, but customers can\nprovide their own NTP server. The network switch can act as an NTP relay when\nthere is an upstream NTP server. Customers can point the network NTP switch to a\nNTP server on the local network.\n\n### Data transfer and replication\n\nGDC air-gapped appliance can transfer data to and from\nGDC air-gapped private clouds. As the devices are used in the\nfield or remote locations, data might be required in the field while disconnected,\nand then transferred from the cloud to the device when connected.\n\n### User interface\n\nGDC air-gapped appliance uses a similar user interface as\nGDC air-gapped, without the features that are not included in\nGDC air-gapped appliance.\n\n### Logging and observability\n\nGDC air-gapped appliance keeps an audit log of system access events. This log\ndoes not require writing to special media such as write-once, read-many (WORM)\ncompliant storage. The audit log manually syncs to GDC air-gapped\nwhen a connection is available and is stored in a common location with\nGDC air-gapped logs.\n\nFor broader logging and observability, raw system logs are available for the\ndevice logs and are accessible to administrators. Application Operators can use\nKubernetes logging for their workloads.\n\n### Security and encryption\n\nGDC air-gapped appliance includes a set of Yubikeys for disk encryption, shipped\nseparately from the appliance. If the customer has a Hardware Security Module\n(HSM) available, the system supports storing keys in that HSM. This allows\ncustomer control of keys for encrypting data at rest.\n\n### Identity and access\n\nGDC air-gapped appliance devices are delivered with an embedded Keycloak identity\nprovider optionally installed with an administrator account. You can also\nconnect to your own external identity provider. Administrators can add users in\nKeycloak or their own identity provider and grant permissions in the\nGDC console.\n\n### HA and backup\n\nGDC air-gapped appliance has limited high availability and redundancy for\ndata storage.\n\nPersonas\n--------\n\nIn Google Distributed Cloud air-gapped appliance, there are four personas:\n\n- **Google Infrastructure Operators**(G_IO) install the system hardware and software and perform the initial configuration before delivering the device to customers. They also securely wipe the device when returned.\n- **Customer Infra Operators** (C_IO) manage the system including authentication, networking, and system configuration.\n- **Platform Administrators** (PA) grant permissions to AO users, manage projects, and troubleshoot VMs and clusters.\n- **Application Operators** (AO) manage workloads, applications, and projects.\n\nPersonas are not roles but are collections of user roles mapped to specific\npermissions, which are assigned to individual users."]]