You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
This repository was archived by the owner on Sep 2, 2025. It is now read-only.
Copy file name to clipboardExpand all lines: gdi/get-data-in/connect/gcp/gcp-prereqs.rst
+11-7Lines changed: 11 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -19,21 +19,25 @@ You must be an administrator of your Splunk Observability Cloud organization to
19
19
Authenticate your Google account
20
20
============================================
21
21
22
-
Before you proceed read Google's official announcement on GCP permission policies at :new-page:`Introducing stronger default Org Policies for our customers <https://cloud.google.com/blog/products/identity-security/introducing-stronger-default-org-policies-for-our-customers/>`.
23
-
24
-
Authenticate using Workload Identity Federation
22
+
Authenticate using Workload Identity Federation (recommended)
Use Workload Identity Federation (WIF) to authenticate your GCP account in Splunk Observability Cloud. It's safer, and with WIF you won't have to export and rotate service account keys.
28
26
29
-
Go to :new-page:`GCP's Workload Identity Federation (WIF) <https://cloud.google.com/iam/docs/workload-identity-federation>` to access your Google Cloud resources and authenticate them.
27
+
To set up Workload Identity Federation to authenticate Splunk Observability Cloud to access your GCP Cloud Monitoring data take these steps:
28
+
29
+
#. Follow the instructions in the :new-page:`Workload Identity Federation Setup Utils <https://github.com/signalfx/gcp_workload_identity_federation>` GitHub repo.
30
+
31
+
#. Run the :new-page:`Workload Identity Federation Setup Script <https://github.com/signalfx/gcp_workload_identity_federation/blob/main/cli/README.md>` or use the :new-page:`Terraform Setup Module <https://github.com/signalfx/gcp_workload_identity_federation/blob/main/terraform/README.md>`.
32
+
33
+
To learn more refer to GCP's :new-page:`Workload Identity Federation <https://cloud.google.com/iam/docs/workload-identity-federation>` documentation.
Alternatively you can use your service account keys to integrate your GCP services with Splunk Observability Cloud.
38
+
Alternatively you can use your service account keys to integrate your GCP services with Splunk Observability Cloud. Before you proceed read Google's official announcement on GCP permission policies at :new-page:`Introducing stronger default Org Policies for our customers <https://cloud.google.com/blog/products/identity-security/introducing-stronger-default-org-policies-for-our-customers/>`.
35
39
36
-
To do so, go to the GCP console and follow these steps:
40
+
To authenticate using your service account keys go to the GCP console and follow these steps:
37
41
38
42
#. From the sidebar, select :menuselection:`IAM &admin`, then :menuselection:`Service Accounts`.
39
43
@@ -45,7 +49,7 @@ To do so, go to the GCP console and follow these steps:
45
49
46
50
* **Service account description**. Enter the description for your service account.
47
51
48
-
#. (Optional) Select a role to grant this Service account access to the selected project, then select :guilabel:`CONTINUE`.
52
+
#. Select a role to grant this Service account access to the selected project, then select :guilabel:`CONTINUE`.
49
53
50
54
#. Activate Key type :guilabel:`JSON`, and select :guilabel:`CREATE`. A new service account key JSON file is then downloaded to your computer. You will need this key to authenticate in the :guilabel:`Import Service Account Key` step in Splunk Observability Cloud.
0 commit comments