Skip to content

Commit fbe70d7

Browse files
authored
Merge pull request #82603 from mletalie/OSDOCS-11916
[OSDOCS-11916] Update required APIs and roles/permissions required for Private Service Connect
2 parents 86877e2 + 2db6e2a commit fbe70d7

3 files changed

+77
-4
lines changed

modules/ccs-aws-customer-requirements.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -69,4 +69,4 @@ This policy only provides Red Hat with permissions and capabilities to change re
6969

7070
* Red Hat must have ingress access to EC2 hosts and the API server through white-listed Red Hat machines.
7171

72-
* Red Hat must have egress allowed to forward system and audit logs to a Red Hat managed central logging stack.
72+
* Red Hat must have egress allowed to forward system and audit logs to a Red Hat managed central logging stack.

modules/ccs-gcp-customer-procedure.adoc

Lines changed: 75 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,8 +5,6 @@
55
[id="ccs-gcp-customer-procedure_{context}"]
66

77
= Required customer procedure
8-
// TODO: Same as other module - Better procedure heading that tells you what this is doing
9-
108

119
The Customer Cloud Subscription (CCS) model allows Red Hat to deploy and manage {product-title} into a customer's Google Cloud Platform (GCP) project. Red Hat requires several prerequisites to provide these services.
1210
[NOTE]
@@ -76,4 +74,79 @@ To use {product-title} in your GCP project, the following GCP organizational pol
7674
|link:https://console.cloud.google.com/apis/library/orgpolicy.googleapis.com?project=openshift-gce-devel&folder=&organizationId=[Organization Policy API]
7775
|`orgpolicy.googleapis.com`
7876

77+
|link:https://console.cloud.google.com/marketplace/product/google/iap.googleapis.com?q=search&referrer=search&hl=en&project=openshift-gce-devel[Cloud Identity-Aware Proxy API]
78+
|`iap.googleapis.com` ^[*]^
79+
7980
|===
81+
82+
+
83+
[.small]
84+
--
85+
*Required for clusters deployed with Private Service Connect.
86+
--
87+
88+
89+
. To ensure that Red Hat can perform necessary actions, you must create an `osd-ccs-admin` IAM link:https://cloud.google.com/iam/docs/creating-managing-service-accounts#creating_a_service_account[service account] user within the GCP project.
90+
91+
+
92+
93+
The following roles must be link:https://cloud.google.com/iam/docs/granting-roles-to-service-accounts#granting_access_to_a_service_account_for_a_resource[granted to the service account]:
94+
+
95+
.Required roles
96+
[cols="2a,3a",options="header"]
97+
98+
|===
99+
100+
|Role|Console role name
101+
102+
|Compute Admin
103+
|`roles/compute.admin`
104+
105+
|DNS Administrator
106+
|`roles/dns.admin`
107+
108+
|Organization Policy Viewer
109+
|`roles/orgpolicy.policyViewer`
110+
111+
|Service Management Administrator
112+
|`roles/servicemanagement.admin`
113+
114+
|Service Usage Admin
115+
|`roles/serviceusage.serviceUsageAdmin`
116+
117+
|Storage Admin
118+
|`roles/storage.admin`
119+
120+
|Compute Load Balancer Admin
121+
|`roles/compute.loadBalancerAdmin`
122+
123+
|Role Viewer
124+
|`roles/viewer`
125+
126+
|Role Administrator
127+
|`roles/iam.roleAdmin`
128+
129+
|Security Admin
130+
|`roles/iam.securityAdmin`
131+
132+
|Service Account Key Admin
133+
|`roles/iam.serviceAccountKeyAdmin`
134+
135+
|Service Account Admin
136+
|`roles/iam.serviceAccountAdmin`
137+
138+
|Service Account User
139+
|`roles/iam.serviceAccountUser`
140+
141+
|IAP-Secured Tunnel User
142+
|`roles/iap.tunnelResourceAccessor`^[*]^
143+
144+
|===
145+
146+
+
147+
[.small]
148+
--
149+
*Required for clusters deployed with Private Service Connect.
150+
--
151+
152+
. link:https://cloud.google.com/iam/docs/creating-managing-service-account-keys#creating_service_account_keys[Create the service account key] for the `osd-ccs-admin` IAM service account. Export the key to a file named `osServiceAccount.json`; this JSON file will be uploaded in {cluster-manager-first} when you create your cluster.

modules/policy-identity-access-management.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -170,4 +170,4 @@ Customer access is limited to namespaces created by the customer and permissions
170170

171171
[id="access-approval_{context}"]
172172
== Access approval and review
173-
New SRE user access requires management approval. Separated or transferred SRE accounts are removed as authorized users through an automated process. Additionally, SRE performs periodic access review including management sign-off of authorized user lists.
173+
New SRE user access requires management approval. Separated or transferred SRE accounts are removed as authorized users through an automated process. Additionally, SRE performs periodic access review including management sign-off of authorized user lists.

0 commit comments

Comments
 (0)