Skip to main content

Connecting a GCP Account

To connect a GCP organization to OpsHelm, follow the steps below.

Start the onboarding process

  1. First, go to the Accounts page in the dashboard.
  2. On the Accounts page, click the Add Organization button, and select GCP under Cloud Provider.
Accounts Page Screenshot showing the Add Organization button
  1. In the onboarding modal, select the GCP logo, enter a Display Name and numeric GCP Organization ID.
GCP Onboarding modal screenshot showing the Organization Name and Organization ID fields

Your organization ID can be found by logging into the GCP Web Console, and clicking on the project picker in the top left corner

GCP console showing project picker

Then looking for your organization in the list (it will be the entry with an office building icon, and will have a numeric ID), in this example the Organization ID would be 123456789012.

GCP Onboarding modal screenshot showing the Organization Name and Organization ID fields

Alternatively you can use the gcloud command to find your Organization ID, by using the gcloud organizations list command.

Once you have entered the details, click continue to begin the onboarding process.

Authorize OpsHelm

Once the onboarding process is started, you will need to authorize OpsHelm to connect to your GCP account.

OpsHelm requires read-only access to the “Asset Inventory” in your environment via the predefined cloudasset.viewer role, and read-only permission to list projects within your organization via the predefined browser role.

To ease the process of onboarding we will generate a service account for this purpose and ask you to grant that account access to the appropriate roles. This will be displayed on the user interface. The easiest way to acheieve this is using the gcloud command:

gcloud organizations add-iam-policy-binding <YOUR_ORG_ID_HERE> --member=<OPSHELM_SERVICE_ACCOUNT_HERE> --role=roles/cloudasset.viewer --include-children
gcloud organizations add-iam-policy-binding <YOUR_ORG_ID_HERE> --member=<OPSHELM_SERVICE_ACCOUNT_HERE> --role=roles/browser --include-children

Both of these role are read-only roles and do not provide OpsHelm any write permissions to your environments.

The --include-children flag ensures that this is applied to all projects within your organization, to avoid the need to enable each environment individually, if you wish to add environments individually this flag can be omitted.

Configure Log Sink(s)

In order for OpsHelm to receive the appropriate logging information for your environment, you need to configure a log sink which forwards to our pub/sub queue, you can use the following gcloud command for this:

gcloud logging sinks create opshelm-log-sink pubsub.googleapis.com/projects/definitely-not-prod/topics/logsink-<CUSTOMER_ULID_HERE> --include-children --log-filter 'protoPayload.@type="type.googleapis.com/google.cloud.audit.AuditLog" AND SEVERITY>="NOTICE"' --organization=<YOUR_ORG_ID_HERE>

The filter applied to this command ensures that logs are restricted to GCP generated logs only, not logs that you generate from within your own applications, and that only those with a severity of NOTICE or above are collected.

The --include-children flag ensures that this is applied to all projects within your organization, to avoid the need to enable each environment individually, if you wish to add environments individually this flag can be omitted.

Audit Logs

If audit logs are not already enabled within your organization, you should enable them by visiting:

https://console.cloud.google.com/iam-admin/audit/allservices?organizationId=<YOUR_ORG_ID_HERE>

Without logging enabled, OpsHelm will not be able to receieve updates regarding your environment

All done!