@@ -118,7 +118,7 @@ cat << EOT > redpanda-agent.role
118118 "compute.subnetworks.get",
119119 "resourcemanager.projects.get",
120120 "compute.networks.getRegionEffectiveFirewalls",
121- "compute.networks.getEffectiveFirewalls",
121+ "compute.networks.getEffectiveFirewalls"
122122 ]
123123}
124124EOT
@@ -286,7 +286,7 @@ cat << EOT > redpanda-cluster.role
286286{
287287 "name": "redpanda_cluster_role",
288288 "title": "Redpanda Cluster Role",
289- "description": "Redpanda Cluster Role ",
289+ "description": "Redpanda Cluster role ",
290290 "includedPermissions": [
291291 "resourcemanager.projects.get",
292292 "secretmanager.secrets.get",
@@ -323,7 +323,7 @@ cat << EOT > redpanda-operator.role
323323{
324324 "name": "redpanda_operator_role",
325325 "title": "Redpanda Operator Role",
326- "description": "Redpanda Operator Role ",
326+ "description": "Redpanda Operator role ",
327327 "includedPermissions": [
328328 "resourcemanager.projects.get",
329329 "secretmanager.secrets.get",
@@ -348,14 +348,14 @@ gcloud projects add-iam-policy-binding <service-project-id> \
348348```bash
349349# Account used to check for and read secrets, which are required to create Redpanda Connect pipelines.
350350
351- gcloud iam service-accounts create redpanda-connect-api \
352- --display-name="Redpanda Connect API Service Account"
351+ gcloud iam service-accounts create redpanda-connect-api \
352+ --display-name="Redpanda Connect API Service Account"
353353
354354cat << EOT > redpanda-connect-api.role
355355{
356356 "name": "redpanda_connect_api_role",
357357 "title": "Redpanda Connect API Role",
358- "description": "Redpanda Connect API Role ",
358+ "description": "Redpanda Connect API role ",
359359 "includedPermissions": [
360360 "resourcemanager.projects.get",
361361 "secretmanager.secrets.get",
@@ -380,7 +380,7 @@ cat << EOT > redpanda-connect.role
380380{
381381 "name": "redpanda_connect_role",
382382 "title": "Redpanda Connect Role",
383- "description": "Redpanda Connect Role ",
383+ "description": "Redpanda Connect role ",
384384 "includedPermissions": [
385385 "resourcemanager.projects.get",
386386 "secretmanager.versions.access"
@@ -396,20 +396,20 @@ gcloud projects add-iam-policy-binding <service-project-id> \
396396```
397397====
398398
399- * Redpanda Console service account
399+ * Redpanda Cloud secret manager
400400+
401401.Show commands
402402[%collapsible]
403403====
404404```bash
405405gcloud iam service-accounts create redpanda-console \
406- --display-name="Redpanda Console Service Account "
406+ --display-name="Redpanda Cloud Secret Manager "
407407
408408cat << EOT > redpanda-console.role
409409{
410410 "name": "redpanda_console_secret_manager_role",
411- "title": "Redpanda Console Secret Manager Writer",
412- "description": "Redpanda Console Secret Manager Writer",
411+ "title": "Redpanda Cloud Secret Manager Writer",
412+ "description": "Redpanda Cloud Secret Manager Writer",
413413 "includedPermissions": [
414414 "secretmanager.secrets.get",
415415 "secretmanager.secrets.create",
@@ -434,20 +434,20 @@ gcloud projects add-iam-policy-binding <service-project-id> \
434434```
435435====
436436
437- * Kafka Connect connectors service account
437+ * Kafka Connect service account
438438+
439439.Show commands
440440[%collapsible]
441441====
442442```bash
443443gcloud iam service-accounts create redpanda-connectors \
444- --display-name="Redpanda Connectors Service Account"
444+ --display-name="Kafka Connect Service Account"
445445
446446cat << EOT > redpanda-connectors.role
447447{
448448 "name": "redpanda_connectors_role",
449- "title": "Redpanda Connectors Custom Role",
450- "description": "Redpanda Connectors Custom Role ",
449+ "title": "Kafka Connect Custom Role",
450+ "description": "Kafka Connect custom role ",
451451 "includedPermissions": [
452452 "resourcemanager.projects.get",
453453 "secretmanager.versions.access"
@@ -593,9 +593,9 @@ gcloud iam service-accounts add-iam-policy-binding <redpanda-cluster-gcp-sa-acco
593593[%collapsible]
594594====
595595```bash
596- gcloud iam service-accounts add-iam-policy-binding <redpanda_operator -gcp-sa-account-id>@<service-project-id>.iam.gserviceaccount.com \
596+ gcloud iam service-accounts add-iam-policy-binding <redpanda-operator -gcp-sa-account-id>@<service-project-id>.iam.gserviceaccount.com \
597597 --role roles/iam.workloadIdentityUser \
598- --member "serviceAccount:<service-project-id>.svc.id.goog[redpanda-system/<redpanda_operator -gcp-sa-account-id>]"
598+ --member "serviceAccount:<service-project-id>.svc.id.goog[redpanda-system/<redpanda-operator -gcp-sa-account-id>]"
599599```
600600====
601601
@@ -628,7 +628,7 @@ gcloud iam service-accounts add-iam-policy-binding <redpanda_connect-gcp-sa-acco
628628```
629629====
630630
631- * Kafka Connect connectors service account
631+ * Kafka Connect service account
632632+
633633.Show command
634634[%collapsible]
0 commit comments