You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: charts/ggscout/examples/gcpsecretmanager-workload/README.md
+69-13Lines changed: 69 additions & 13 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,6 +2,8 @@
2
2
3
3
This example demonstrates how to configure ggscout to authenticate with Google Cloud Secret Manager using Workload Identity Federation for Kubernetes. This approach eliminates the need for service account keys by allowing Kubernetes ServiceAccounts to directly authenticate to Google Cloud APIs.
4
4
5
+
Note that the configuration has been made even simpler if ggscout is deployed in a Google Kubernetes Engine (GKE) cluster.
6
+
5
7
## Prerequisites
6
8
7
9
### Required Tools
@@ -25,6 +27,7 @@ Your Kubernetes cluster must support:
25
27
For managed Kubernetes services:
26
28
-**EKS**: No additional configuration needed
27
29
-**AKS**: Enable the OIDC issuer feature
30
+
-**GKE**: Make sure you cluster (and node pools) have [Worload Identity Federation enabled](https://cloud.google.com/kubernetes-engine/docs/how-to/workload-identity#enable_on_clusters_and_node_pools).
28
31
-**Self-hosted**: Configure `kube-apiserver` to support ServiceAccount token volume projections
0 commit comments