Skip to main content

Documentation Index

Fetch the complete documentation index at: https://conductorone-docs-google-workspace-action-examples.mintlify.app/llms.txt

Use this file to discover all available pages before exploring further.

This connector is in beta. This means it’s undergoing ongoing testing and development while we gather feedback, validate functionality, and improve stability. Beta connectors are generally stable, but they may have limited feature support, incomplete error handling, or occasional issues.We recommend closely monitoring workflows that use this connector and contacting our Support team with any issues or feedback.

Capabilities

ResourceSyncProvision
Accounts
Groups
Service Accounts
ResourceSyncProvision
Cluster Roles
GCP IAM Role Bindings
Roles
This connector pulls account, group, and service account information from a GCP connector. The GCP connector must be configured for the same GCP project where the GKE cluster is located — using a GCP connector from a different project will cause identity resolution to fail during provisioning. You’ll configure this relationship when setting up the connector. Notes:
  • Cluster Roles and Roles are Kubernetes RBAC resources scoped to the connected cluster.
  • GCP IAM Role Bindings are the IAM bindings from the GCP project where the cluster is located — only those assigned on that specific project, not all IAM roles across your organization.

Before you begin

This connector requires a working GCP connector to source user and group identities. If you have not already done so, set up the GCP connector before you proceed.

Gather GKE credentials

To configure the GKE connector, you need a GCP service account. Follow the steps below to create one and obtain the required credentials.
The service account must have the following permissions at the project level where the cluster is located:
  • container.clusterRoleBindings.get
  • container.clusterRoleBindings.list
  • container.clusterRoles.get
  • container.clusterRoles.list
  • container.clusters.get
  • container.namespaces.get
  • container.namespaces.list
  • container.roleBindings.get
  • container.roleBindings.list
  • container.roles.get
  • container.roles.list
  • container.serviceAccounts.get
  • container.serviceAccounts.list
  • resourcemanager.projects.getIamPolicy
1
In the Google Cloud console, open the navigation menu and go to API & Services > Credentials.
2
Click + Create credentials > Service account.
3
Enter a name and description for the service account, then click Done.
4
You are redirected to the credentials page. Find your new service account in the list. Copy its email address (you will need it later), then click on the service account to open it.
5
In the service account page, click the Keys tab.
6
Click Add Key > Create new key.
7
Select JSON as the key type and click Create. A JSON credentials file is downloaded to your computer. This is the file you provide to the connector.
8
Grant the service account the required permissions by creating a custom IAM role with all the permissions listed above and assigning it to the service account at the project level.
9
In the Kubernetes Engine section of the Google Cloud console, locate your cluster in the list. Note the name and location (region or zone) — you will need both when configuring the connector.

Configure the GKE connector

Follow these instructions to use a built-in, no-code connector hosted by C1.Cloud-hosted connector not currently available.