Skip to content

Commit 49d4166

Browse files
authored
Merge pull request #86325 from mletalie/OSDOCS-12933
[OSDOCS-12933]:Update OSD on GCP docs with Mobb Feedback
2 parents b2c7828 + f19cf87 commit 49d4166

File tree

2 files changed

+2
-74
lines changed

2 files changed

+2
-74
lines changed

modules/ccs-gcp-customer-procedure.adoc

Lines changed: 1 addition & 67 deletions
Original file line numberDiff line numberDiff line change
@@ -93,70 +93,4 @@ To use {product-title} in your GCP project, the following GCP organizational pol
9393

9494
This API is required for clusters deployed with Private Service Connect.
9595

96-
|===
97-
98-
99-
. To ensure that Red Hat can perform necessary actions, you must create an `osd-ccs-admin` IAM link:https://cloud.google.com/iam/docs/creating-managing-service-accounts#creating_a_service_account[service account] user within the GCP project.
100-
101-
+
102-
103-
The following roles must be link:https://cloud.google.com/iam/docs/granting-roles-to-service-accounts#granting_access_to_a_service_account_for_a_resource[granted to the service account]:
104-
+
105-
.Required roles
106-
[cols="2a,3a",options="header"]
107-
108-
|===
109-
110-
|Role|Console role name
111-
112-
|Compute Admin
113-
|`roles/compute.admin`
114-
115-
|DNS Administrator
116-
|`roles/dns.admin`
117-
118-
|Organization Policy Viewer
119-
|`roles/orgpolicy.policyViewer`
120-
121-
|Service Management Administrator
122-
|`roles/servicemanagement.admin`
123-
124-
|Service Usage Admin
125-
|`roles/serviceusage.serviceUsageAdmin`
126-
127-
|Storage Admin
128-
|`roles/storage.admin`
129-
130-
|Compute Load Balancer Admin
131-
|`roles/compute.loadBalancerAdmin`
132-
133-
|Role Viewer
134-
|`roles/viewer`
135-
136-
|Role Administrator
137-
|`roles/iam.roleAdmin`
138-
139-
|Security Admin
140-
|`roles/iam.securityAdmin`
141-
142-
|Service Account Key Admin
143-
|`roles/iam.serviceAccountKeyAdmin`
144-
145-
|Service Account Admin
146-
|`roles/iam.serviceAccountAdmin`
147-
148-
|Service Account User
149-
|`roles/iam.serviceAccountUser`
150-
151-
|IAP-Secured Tunnel User
152-
|`roles/iap.tunnelResourceAccessor`^[*]^
153-
154-
|===
155-
156-
+
157-
[.small]
158-
--
159-
*Required for clusters deployed with Private Service Connect.
160-
--
161-
162-
. link:https://cloud.google.com/iam/docs/creating-managing-service-account-keys#creating_service_account_keys[Create the service account key] for the `osd-ccs-admin` IAM service account. Export the key to a file named `osServiceAccount.json`; this JSON file will be uploaded in {cluster-manager-first} when you create your cluster.
96+
|===

modules/ccs-gcp-understand.adoc

Lines changed: 1 addition & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -11,10 +11,4 @@ Red Hat {product-title} provides a Customer Cloud Subscription (CCS) model that
1111

1212
Red Hat recommends the usage of GCP project, managed by the customer, to organize all of your GCP resources. A project consists of a set of users and APIs, as well as billing, authentication, and monitoring settings for those APIs.
1313

14-
It is recommended for the {product-title} cluster using a CCS model to be hosted in a GCP project within a GCP organization. The Organization resource is the root node of the GCP resource hierarchy and all resources that belong to an organization are grouped under the organization node. Customers have the choice of using service account keys or Workload Identity Federation when creating the roles and credentials necessary to access Google Cloud resources within a GCP project.
15-
// When you make calls to the API, you typically provide service account keys for authentication. Each service account is owned by a specific project, but service accounts can be provided roles to access resources for other projects.
16-
17-
[IMPORTANT]
18-
====
19-
Unless specified, the information provided in this topic is applicable to {product-title} on {GCP} clusters that use service account keys or Workload Identity Federation (WIF) to grant the required necessary credentials.
20-
====
14+
It is recommended for the {product-title} cluster using a CCS model to be hosted in a GCP project within a GCP organization. The Organization resource is the root node of the GCP resource hierarchy and all resources that belong to an organization are grouped under the organization node. Customers have the choice of using service account keys or Workload Identity Federation when creating the roles and credentials necessary to access Google Cloud resources within a GCP project.

0 commit comments

Comments
 (0)