(Google Cloud) Service Account Policy Management
Details of API Security policy to use SpaceONE plugin
Last updated
Was this helpful?
Details of API Security policy to use SpaceONE plugin
Last updated
Was this helpful?
SpaceONE highly recommends to set appropriate permissions to Service Account for each purpose.
General Collector (Retrieve Google Cloud Resources into SpaceONE Inventory)
Google Compute VM Collector - google-cloud compute
Google Cloud Service Collector - google-cloud-services
Google power state Collector - google-cloud-power-state
Power-scheduler (Post Action to Google Cloud resources to turn on/off for following resources Compute VMs, Instance group, Cloud SQL) with
Google Cloud power Controller
STEP 1. Please, Set service account to Create API for each use case:
STEP 2. Register Your Service Account into SpaceONE
Collector requires appropriate authorities to collect cloud resources. We strongly recommend to limit collector's service account its permission to read only access.
Otherwise, you can add more restrictions per resources or actions. One of the useful example is to restrict its rights within region.
STEP 1. Log in Google Cloud Console > IAM
Go to IAM > Service Account and Click + CREATE SERVICE ACCOUNT
STEP 2. Set Service account details
Enter Service account name, and Service account description
STEP 3: Grant Service account to project
Set Permission to Viewer(Role): Read All Access and Click CONTINUE
STEP 4: Grant Users access to this service Account (optional)
You can skip this process and move to next. Set Service account users role and Service account admin role.
Click DONE
if everything is finished.
STEP 5: CREATE KEY
Find a Service account that you created right before in previous step. Click Action button and SelectCreate Key
Select Key Type and Click CREATE
button. We suggest JSON Type as recommended above.
STEP 6: Review
You will see Key ID on the list and its service account JSON on your local.
SpaceONE's General Collector requires permission to access for following services:
Cloud Storage
Object
list
get
getIamPolicy
Bucket
list
get
getIamPolicy
Big Query
Resource Viewer
Data Viewer
Step 1. Create Role
Go to IAM > Role > + Create Role
Step 2. Add Permissions to Role
Please, find appropriate permission within cloud services
storage.buckets.get
storage.buckets.getIamPolicy
storage.buckets.list
storage.objects.get
storage.objects.getIamPolicy
storage.objects.list
Click ADD
button
STEP 3: Review Permission
Review permissions in created role.
STEP 4: Set Created Role into Service Account
Drive to Menu IAM > IAM
Click pencil icon to edit and Add New Role that created in previous step
STEP 5: Set BigQuery Permission into Service Account
Click Save
button.
SpaceONE's Power Scheduler requires edit permission to update following Cloud Services:
VM Instance
Instance Group
Cloud SQL
Step 1. Create Role
Go to IAM > Role > + Create Role
Step 2. Add Permissions to Role
Please, find appropriate permission within cloud services
VM Instance
Start
Stop
Reset
Instance Group (Manager)
Resize
Autoscaler
Update
Cloud SQL
Update
Click ADD
button
STEP 3: Review Permission
Review permissions in created role.
STEP 4: Set Created Role into Service Account
Drive to Menu IAM > IAM
Click pencil icon to edit and Add New Role that created in previous step.
Click Save
button.
Step 1: Please, Sign In into SpaceONE portal
Step 2: Drive to menu Service Account : Identity
> Service Account
from Top Menu bar
Step 3: Select Provider Google > Click + Add
Button
Step 5: Fill out Credentials Info or simply copy and paste JSON and Select Project that you want to map service account.
Step 6: Click Save
Button and Check if Service Account has register on the list.
Step 4: Please, fill out all required fields as below with your Service Account JSON that you issued at .