B is right here. VPN tunnels (option B) just aren't going to cut it for production when you want low latency and high bandwidth, since they're over the public internet. Pretty sure that's what makes B the least optimal, but open if someone sees it differently.
Don’t think it’s D, B is the better pick here. B actually drills down from instance to VNIC to the NSG with jq, so you really get to see all the config details that could be impacting connectivity. D is a bit of a trap since awk parsing can miss stuff if JSON changes. Anyone disagree?
Option C for sure. Instance Principals mean you don't have to mess with API keys or worry about storing creds in Cloud Shell, which is a big win for security and scaling scripts across regions. Pretty confident that's what Oracle wants here since it's their recommended way for automation. Disagree?
Man, Oracle always loves to push their own flavor of identity management. Option C is what they're looking for. Instance Principals with dynamic groups let Cloud Shell sessions authenticate without ever touching API keys, so you don't have to manage or rotate credentials manually. Pretty sure that's the most secure and scalable way for automation like this. Anyone think B with API keys is actually safer?
Not sure D really fits here, C is the one you want. Instance Principals let you skip managing API keys and just assign permissions through dynamic groups, which is more secure and scales well for automation in Cloud Shell. D would make sense if this were a full Infrastructure-as-Code scenario, but it's more complex than needed for shell scripting. I think option B trips people up but keeping API keys in storage brings risk.
Yeah, B is the right call. The peer ID lets the accepting tenancy know exactly which Remote Peering Connection to connect to in the other tenancy-it's basically the OCID pointer. It's not for auth or CIDR and definitely not about security rules. I've double-checked Oracle docs on this, so 99% sure here. Anyone see it used differently?
Had something like this show up on a practice test, went with D because I thought peering configuration meant setting security rules too. Pretty sure now it's more about identifying the RPC, but at the time D seemed plausible. Anyone else think D?
Not B. Even if the VPN endpoints are both in the US, you can't really control how public internet routes the packets. Only A gives an actual guarantee that your OCI-AWS traffic stays within US borders, which is what matters for compliance.