Skip to content
This repository was archived by the owner on Sep 2, 2025. It is now read-only.

Commit b57f1d9

Browse files
Feedback
1 parent a86415a commit b57f1d9

File tree

1 file changed

+11
-7
lines changed

1 file changed

+11
-7
lines changed

gdi/get-data-in/connect/gcp/gcp-prereqs.rst

Lines changed: 11 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -19,21 +19,25 @@ You must be an administrator of your Splunk Observability Cloud organization to
1919
Authenticate your Google account
2020
============================================
2121

22-
Before you proceed read Google's official announcement on GCP permission policies at :new-page:`Introducing stronger default Org Policies for our customers <https://cloud.google.com/blog/products/identity-security/introducing-stronger-default-org-policies-for-our-customers/>`.
23-
24-
Authenticate using Workload Identity Federation
22+
Authenticate using Workload Identity Federation (recommended)
2523
--------------------------------------------------------------------------------------
2624

2725
Use Workload Identity Federation (WIF) to authenticate your GCP account in Splunk Observability Cloud. It's safer, and with WIF you won't have to export and rotate service account keys.
2826

29-
Go to :new-page:`GCP's Workload Identity Federation (WIF) <https://cloud.google.com/iam/docs/workload-identity-federation>` to access your Google Cloud resources and authenticate them.
27+
To set up Workload Identity Federation to authenticate Splunk Observability Cloud to access your GCP Cloud Monitoring data take these steps:
28+
29+
#. Follow the instructions in the :new-page:`Workload Identity Federation Setup Utils <https://github.com/signalfx/gcp_workload_identity_federation>` GitHub repo.
30+
31+
#. Run the :new-page:`Workload Identity Federation Setup Script <https://github.com/signalfx/gcp_workload_identity_federation/blob/main/cli/README.md>` or use the :new-page:`Terraform Setup Module <https://github.com/signalfx/gcp_workload_identity_federation/blob/main/terraform/README.md>`.
32+
33+
To learn more refer to GCP's :new-page:`Workload Identity Federation <https://cloud.google.com/iam/docs/workload-identity-federation>` documentation.
3034

3135
Authenticate using Service Account Keys
3236
--------------------------------------------------------------------------------------
3337

34-
Alternatively you can use your service account keys to integrate your GCP services with Splunk Observability Cloud.
38+
Alternatively you can use your service account keys to integrate your GCP services with Splunk Observability Cloud. Before you proceed read Google's official announcement on GCP permission policies at :new-page:`Introducing stronger default Org Policies for our customers <https://cloud.google.com/blog/products/identity-security/introducing-stronger-default-org-policies-for-our-customers/>`.
3539

36-
To do so, go to the GCP console and follow these steps:
40+
To authenticate using your service account keys go to the GCP console and follow these steps:
3741

3842
#. From the sidebar, select :menuselection:`IAM & admin`, then :menuselection:`Service Accounts`.
3943

@@ -45,7 +49,7 @@ To do so, go to the GCP console and follow these steps:
4549

4650
* **Service account description**. Enter the description for your service account.
4751

48-
#. (Optional) Select a role to grant this Service account access to the selected project, then select :guilabel:`CONTINUE`.
52+
#. Select a role to grant this Service account access to the selected project, then select :guilabel:`CONTINUE`.
4953

5054
#. Activate Key type :guilabel:`JSON`, and select :guilabel:`CREATE`. A new service account key JSON file is then downloaded to your computer. You will need this key to authenticate in the :guilabel:`Import Service Account Key` step in Splunk Observability Cloud.
5155

0 commit comments

Comments
 (0)