User Guide
English
English
  • Welcome aboard to SpaceONE
  • About SpaceONE
    • SpaceONE
    • Key Differentiators
  • Getting Started
  • Basic Setup
  • Power Scheduler Quick Start
  • ADVANCED TOPIC
    • Excel Export
    • Custom Table
  • Dashboard
    • Domain Dashboard
  • Project
    • Project Group Management
    • Project Management
  • Inventory
    • Server
    • CloudService
  • Identity
    • Service Account
      • (AWS) Service Account Policy Management
      • (Google Cloud) Service Account Policy Management
      • (Azure) Access Control (IAM) Policy Management
      • (Oracle Cloud Infrastructure) Identity and Access Management(IAM) Policy Management
      • (Alibaba Cloud) Service Account Policy Management
  • Monitoring
    • Alert Manager
      • Webhook Settings
        • AWS SNS
        • Grafana
  • Automation
    • Power Scheduler
  • ETC
    • Profile
  • Reference Link
  • Admin Guide
  • API Guide
  • FAQ
    • FAQs
Powered by GitBook
On this page
  • Service Account Policy
  • General Collector
  • Special Roles
  • Power Controller
  • Register Your Service Account into SpaceONE

Was this helpful?

  1. Identity
  2. Service Account

(Google Cloud) Service Account Policy Management

Details of API Security policy to use SpaceONE plugin

Previous(AWS) Service Account Policy ManagementNext(Azure) Access Control (IAM) Policy Management

Last updated 4 years ago

Was this helpful?

Service Account Policy

SpaceONE highly recommends to set appropriate permissions to Service Account for each purpose.

  • General Collector (Retrieve Google Cloud Resources into SpaceONE Inventory)

    • Google Compute VM Collector - google-cloud compute

    • Google Cloud Service Collector - google-cloud-services

    • Google power state Collector - google-cloud-power-state

  • Power-scheduler (Post Action to Google Cloud resources to turn on/off for following resources Compute VMs, Instance group, Cloud SQL) with

    • Google Cloud power Controller

STEP 1. Please, Set service account to Create API for each use case:

STEP 2. Register Your Service Account into SpaceONE

General Collector

Collector requires appropriate authorities to collect cloud resources. We strongly recommend to limit collector's service account its permission to read only access.

Otherwise, you can add more restrictions per resources or actions. One of the useful example is to restrict its rights within region.

STEP 1. Log in Google Cloud Console > IAM

Go to IAM > Service Account and Click + CREATE SERVICE ACCOUNT

STEP 2. Set Service account details

Enter Service account name, and Service account description

STEP 3: Grant Service account to project

Set Permission to Viewer(Role): Read All Access and Click CONTINUE

STEP 4: Grant Users access to this service Account (optional)

You can skip this process and move to next. Set Service account users role and Service account admin role.

Click DONE if everything is finished.

STEP 5: CREATE KEY

Find a Service account that you created right before in previous step. Click Action button and SelectCreate Key

Select Key Type and Click CREATE button. We suggest JSON Type as recommended above.

STEP 6: Review

You will see Key ID on the list and its service account JSON on your local.

Special Roles

SpaceONE's General Collector requires permission to access for following services:

Google Cloud APIs are categorized as its types, and therefore must set up a Special Role that Collect to other than general cloud services.

  • Cloud Storage

    • Object

      • list

      • get

      • getIamPolicy

    • Bucket

      • list

      • get

      • getIamPolicy

  • Big Query

    • Resource Viewer

    • Data Viewer

Step 1. Create Role

Go to IAM > Role > + Create Role

Step 2. Add Permissions to Role

Please, find appropriate permission within cloud services

  • storage.buckets.get

  • storage.buckets.getIamPolicy

  • storage.buckets.list

  • storage.objects.get

  • storage.objects.getIamPolicy

  • storage.objects.list

Click ADD button

STEP 3: Review Permission

Review permissions in created role.

STEP 4: Set Created Role into Service Account

Drive to Menu IAM > IAM

Click pencil icon to edit and Add New Role that created in previous step

STEP 5: Set BigQuery Permission into Service Account

Click Save button.

Power Controller

SpaceONE's Power Scheduler requires edit permission to update following Cloud Services:

  • VM Instance

  • Instance Group

  • Cloud SQL

Step 1. Create Role

Go to IAM > Role > + Create Role

Step 2. Add Permissions to Role

Please, find appropriate permission within cloud services

  • VM Instance

    • Start

    • Stop

    • Reset

  • Instance Group (Manager)

    • Resize

    • Autoscaler

      • Update

  • Cloud SQL

    • Update

Click ADD button

STEP 3: Review Permission

Review permissions in created role.

STEP 4: Set Created Role into Service Account

Drive to Menu IAM > IAM

Click pencil icon to edit and Add New Role that created in previous step.

Click Save button.

Register Your Service Account into SpaceONE

Step 1: Please, Sign In into SpaceONE portal

Step 2: Drive to menu Service Account : Identity > Service Account from Top Menu bar

Step 3: Select Provider Google > Click + Add Button

Step 5: Fill out Credentials Info or simply copy and paste JSON and Select Project that you want to map service account.

Step 6: Click Save Button and Check if Service Account has register on the list.

Step 4: Please, fill out all required fields as below with your Service Account JSON that you issued at .

register schedule
General Collector
Special Roles
Power Controller
Register Service Account into SpaceONE
General Collector Step