@@ -270,31 +270,24 @@ To read more about shared credentials refer to:
270270
271271### GCE - Google Compute Engine
272272
273- This Ansible role also supports the GCE on Terraform. Below is an example
274- terraform.tfvars you may end up with :
273+ kdevops can provision Google Compute Engine resources. If you are
274+ new to GCE, review this article :
275275
276- ```
277- project = "demo-kdevops"
276+ https://cloud.google.com/docs/overview
278277
279- ssh_config_pubkey_file = "~/.ssh/my-gce.pub"
280- ssh_config_user = "mcgrof"
281- ssh_config = "~/.ssh/config"
282- ssh_config_update = "true"
283- ssh_config_use_strict_settings = "true"
284- ssh_config_backup = "true"
285- ```
278+ to understand the concepts and requirements for setting up and
279+ using GCE resources.
286280
287- To ramp up, you'll need to get the JSON for your service account through
288- the Identity and Access Management (IAM) interface. This is documented below.
289- The default name for the JSON credentials file is account.json, you can
290- override this and its path with :
281+ Once your project is created, the administrator must create a
282+ service account key and provide it to you in a file. The
283+ pathname to that file is specified in the "Identity & Access"
284+ submenu. See :
291285
292- ```
293- credentials = /home/foo/path/to/some.json
294- ```
286+ https://cloud.google.com/iam/docs/creating-managing-service-account-keys
287+
288+ Further, the service account must be granted access to allow
289+ it to create instances and other resources. See:
295290
296- https://www.terraform.io/docs/providers/google/getting_started.html
297- https://registry.terraform.io/providers/hashicorp/google/latest/docs/guides/provider_reference
298291https://cloud.google.com/iam/docs/granting-roles-to-service-accounts#granting_access_to_a_service_account_for_a_resource
299292
300293### OCI - Oracle Cloud Infrastructure
0 commit comments