When deploying a snapblocs stack, snapblocs provisions the stack within the customer’s GCP account. The stack is integrated with Google GCP for Kubernetes clusters using Google Compute Engine instances and other GCP resources. snapblocs manages the lifecycle of the nodes on Compute Engine and other GCP services such as GKE, storage, and network to create a fully production-ready Kubernetes cluster that can auto-scale based on workload requirements.
snapblocs requires that Google Account Keys credentials(privateKeyData) be specified so that snapblocs can access the customer’s GCP environment to provision the stacks on the Google account. See Creating GCP service account keys for details. Service Account Keys are encrypted and stored on the secured AWS Systems Manager Parameter Store (not on the snapblocs system) to protect the customer's access keys from any unauthorized access. They are not stored within the snapblocs SaaS application or infrastructure.
Click here to create a GCP Service Account Keys.
GCP Service Account Keys need to be added as a provider access key.
An authorized user can add GCP Service Account Keys as a project access key that can be shared among project members for managing stacks such as creating, deploying, etc.
Provider access keys created at the account level are available for use by all projects and their stacks. In essence, they have shared credentials for all projects. Access keys created at the project level can only be used by stacks within that project.
To add GCP Service Account Keys to a snapblocs Account.
From the left nav, go to “Settings,” then select the “Provider Access” tab.
Click "+Add new".
Select "GCP" for the cloud provider, then select “Next.”
For “Name,” enter a unique access name.
(Optionally) Click "Test credentials with provider" to validate the GCP Service Account Keys.
Click "Save."
To add GCP Service Account Keys to a project
From the left nav, go to “Projects."
Select the project.
Click "Provider Access"
Click "+Add new".
Select "GCP" for the cloud provider, then select “Next.”
For “Name,” enter a unique access name.
Enter the GCP Credentials.
(Optionally) Click "Test credentials with provider" to validate the GCP Service Account Keys.
Click "Save."