(Google Cloud) Service Account Policy Management
Details of API Security policy to use SpaceONE plugin
Service Account Policy
SpaceONE highly recommends to set appropriate permissions to Service Account for each purpose.
General Collector (Retrieve Google Cloud Resources into SpaceONE Inventory)
Google Compute VM Collector - google-cloud compute
Google Cloud Service Collector - google-cloud-services
Google power state Collector - google-cloud-power-state
Power-scheduler (Post Action to Google Cloud resources to turn on/off for following resources Compute VMs, Instance group, Cloud SQL) with register schedule
Google Cloud power Controller
STEP 1. Please, Set service account to Create API for each use case:
STEP 2. Register Your Service Account into SpaceONE
General Collector
Collector requires appropriate authorities to collect cloud resources. We strongly recommend to limit collector's service account its permission to read only access.
Otherwise, you can add more restrictions per resources or actions. One of the useful example is to restrict its rights within region.
STEP 1. Log in Google Cloud Console > IAM
Go to IAM > Service Account and Click + CREATE SERVICE ACCOUNT

STEP 2. Set Service account details
Enter Service account name, and Service account description

STEP 3: Grant Service account to project
Set Permission to Viewer(Role): Read All Access and Click CONTINUE

STEP 4: Grant Users access to this service Account (optional)
You can skip this process and move to next. Set Service account users role and Service account admin role.

Click DONE
if everything is finished.
STEP 5: CREATE KEY

Find a Service account that you created right before in previous step. Click Action button and SelectCreate Key

Select Key Type and Click CREATE
button. We suggest JSON Type as recommended above.
STEP 6: Review
You will see Key ID on the list and its service account JSON on your local.


Special Roles
SpaceONE's General Collector requires permission to access for following services:
Cloud Storage
Object
list
get
getIamPolicy
Bucket
list
get
getIamPolicy
Big Query
Resource Viewer
Data Viewer
Step 1. Create Role
Go to IAM > Role > + Create Role

Step 2. Add Permissions to Role
Please, find appropriate permission within cloud services

storage.buckets.get
storage.buckets.getIamPolicy
storage.buckets.list
storage.objects.get
storage.objects.getIamPolicy
storage.objects.list
Click ADD
button
STEP 3: Review Permission
Review permissions in created role.

STEP 4: Set Created Role into Service Account
Drive to Menu IAM > IAM

Click pencil icon to edit and Add New Role that created in previous step

STEP 5: Set BigQuery Permission into Service Account

Click Save
button.
Power Controller
SpaceONE's Power Scheduler requires edit permission to update following Cloud Services:
VM Instance
Instance Group
Cloud SQL
Step 1. Create Role
Go to IAM > Role > + Create Role

Step 2. Add Permissions to Role
Please, find appropriate permission within cloud services
VM Instance
Start
Stop
Reset
Instance Group (Manager)
Resize
Autoscaler
Update
Cloud SQL
Update

Click ADD
button
STEP 3: Review Permission
Review permissions in created role.

STEP 4: Set Created Role into Service Account
Drive to Menu IAM > IAM

Click pencil icon to edit and Add New Role that created in previous step.


Click Save
button.
Register Your Service Account into SpaceONE
Step 1: Please, Sign In into SpaceONE portal

Step 2: Drive to menu Service Account : Identity
> Service Account
from Top Menu bar

Step 3: Select Provider Google > Click + Add
Button

Step 4: Please, fill out all required fields as below with your Service Account JSON that you issued at General Collector Step.

Step 5: Fill out Credentials Info or simply copy and paste JSON and Select Project that you want to map service account.

Step 6: Click Save
Button and Check if Service Account has register on the list.

Last updated
Was this helpful?