...
You need a valid Google Cloud Platform account. This account will be used to authenticate Terraform to interact with GCP resources.
The following permissions must be given to the logged-in user account:
Editor
Secret Manager Admin
Storage Object Admin
Cloud Functions Admin
Service Account Token Creator
Kubernetes Engine Developer
Kubernetes Engine Cluster Admin
Workload Identity User
Create a custom role and assign the below permission to the role.
storage.buckets.get
storage.buckets.update
storage.objects.update
compute.instanceGroupManagers.update
compute.instanceGroupManagers.get
For additional permissions, refer to the Prerequisites for deploying Kyvos in a GCP environment using Deployment Manager section from Step 2 to Step 27.
When using an existing VPC, the subnet must have a minimum mask range of /22
Subnets in which Kubernetes cluster is launched should have connectivity to the subnets in which Kyvos instances are launched.
When using an existing VPC, ensure that the subnet has two secondary IP ranges with valid mask ranges, as these will be used by the Kubernetes cluster.
Prerequisites to run Terraform form local machine
Anchor | ||||
---|---|---|---|---|
|
...