|
5 | 5 | [id="ccs-gcp-customer-procedure_{context}"]
|
6 | 6 |
|
7 | 7 | = Required customer procedure
|
8 |
| -// TODO: Same as other module - Better procedure heading that tells you what this is doing |
9 |
| - |
10 | 8 |
|
11 | 9 | The Customer Cloud Subscription (CCS) model allows Red Hat to deploy and manage {product-title} into a customer's Google Cloud Platform (GCP) project. Red Hat requires several prerequisites to provide these services.
|
12 | 10 | [NOTE]
|
@@ -76,4 +74,79 @@ To use {product-title} in your GCP project, the following GCP organizational pol
|
76 | 74 | |link:https://console.cloud.google.com/apis/library/orgpolicy.googleapis.com?project=openshift-gce-devel&folder=&organizationId=[Organization Policy API]
|
77 | 75 | |`orgpolicy.googleapis.com`
|
78 | 76 |
|
| 77 | +|link:https://console.cloud.google.com/marketplace/product/google/iap.googleapis.com?q=search&referrer=search&hl=en&project=openshift-gce-devel[Cloud Identity-Aware Proxy API] |
| 78 | +|`iap.googleapis.com` ^[*]^ |
| 79 | + |
79 | 80 | |===
|
| 81 | + |
| 82 | ++ |
| 83 | +[.small] |
| 84 | +-- |
| 85 | +*Required for clusters deployed with Private Service Connect. |
| 86 | +-- |
| 87 | + |
| 88 | + |
| 89 | +. To ensure that Red Hat can perform necessary actions, you must create an `osd-ccs-admin` IAM link:https://cloud.google.com/iam/docs/creating-managing-service-accounts#creating_a_service_account[service account] user within the GCP project. |
| 90 | + |
| 91 | ++ |
| 92 | + |
| 93 | +The following roles must be link:https://cloud.google.com/iam/docs/granting-roles-to-service-accounts#granting_access_to_a_service_account_for_a_resource[granted to the service account]: |
| 94 | ++ |
| 95 | +.Required roles |
| 96 | +[cols="2a,3a",options="header"] |
| 97 | + |
| 98 | +|=== |
| 99 | + |
| 100 | +|Role|Console role name |
| 101 | + |
| 102 | +|Compute Admin |
| 103 | +|`roles/compute.admin` |
| 104 | + |
| 105 | +|DNS Administrator |
| 106 | +|`roles/dns.admin` |
| 107 | + |
| 108 | +|Organization Policy Viewer |
| 109 | +|`roles/orgpolicy.policyViewer` |
| 110 | + |
| 111 | +|Service Management Administrator |
| 112 | +|`roles/servicemanagement.admin` |
| 113 | + |
| 114 | +|Service Usage Admin |
| 115 | +|`roles/serviceusage.serviceUsageAdmin` |
| 116 | + |
| 117 | +|Storage Admin |
| 118 | +|`roles/storage.admin` |
| 119 | + |
| 120 | +|Compute Load Balancer Admin |
| 121 | +|`roles/compute.loadBalancerAdmin` |
| 122 | + |
| 123 | +|Role Viewer |
| 124 | +|`roles/viewer` |
| 125 | + |
| 126 | +|Role Administrator |
| 127 | +|`roles/iam.roleAdmin` |
| 128 | + |
| 129 | +|Security Admin |
| 130 | +|`roles/iam.securityAdmin` |
| 131 | + |
| 132 | +|Service Account Key Admin |
| 133 | +|`roles/iam.serviceAccountKeyAdmin` |
| 134 | + |
| 135 | +|Service Account Admin |
| 136 | +|`roles/iam.serviceAccountAdmin` |
| 137 | + |
| 138 | +|Service Account User |
| 139 | +|`roles/iam.serviceAccountUser` |
| 140 | + |
| 141 | +|IAP-Secured Tunnel User |
| 142 | +|`roles/iap.tunnelResourceAccessor`^[*]^ |
| 143 | + |
| 144 | +|=== |
| 145 | + |
| 146 | ++ |
| 147 | +[.small] |
| 148 | +-- |
| 149 | +*Required for clusters deployed with Private Service Connect. |
| 150 | +-- |
| 151 | + |
| 152 | +. link:https://cloud.google.com/iam/docs/creating-managing-service-account-keys#creating_service_account_keys[Create the service account key] for the `osd-ccs-admin` IAM service account. Export the key to a file named `osServiceAccount.json`; this JSON file will be uploaded in {cluster-manager-first} when you create your cluster. |
0 commit comments