/
Permissions required in GCP

Permissions required in GCP

  • The following permissions are required in GCP for discovery and inbound cloud forwarding:

    • Folder Viewer (Role)

    • Compute Viewer (Role)

    • DNS Reader (Role)

  • The following permissions are required in GCP for Inbound Discovery:

    • dns.projects.get

    • compute.networks.get

    • compute.networks.list

    • dns.policies.get

    • dns.policies.list

  • The following permissions are required in GCP for Outbound Discovery:

    • dns.projects.get

    • compute.networks.get

    • compute.networks.list

    • dns.managedZones.get

    • dns.managedZones.list

    • dns.resourceRecordSets.get

    • dns.resourceRecordSets.list

  • The following permissions are required in GCP for Inbound Cloud Forwarding:

    • dns.projects.get

    • compute.networks.get

    • compute.networks.list

    • compute.addresses.list

    • dns.networks.bindPrivateDNSPolicy

    • dns.policies.get

    • dns.policies.list

    • dns.policies.create

    • dns.policies.update

    • dns.policies.delete

  • The following permissions are required in GCP for Outbound Cloud Forwarding:

    • dns.projects.get

    • compute.networks.get

    • compute.networks.list

    • dns.managedZones.get

    • dns.managedZones.list

    • dns.networks.bindPrivateDNSZone

    • dns.managedZones.create

    • dns.managedZones.update

    • dns.managedZones.delete

    • dns.resourceRecordSets.get

    • dns.resourceRecordSets.list

    • dns.resourceRecordSets.create

    • dns.resourceRecordSets.update

    • dns.resourceRecordSets.delete

The following permissions are required in GCP for syncing Storage Tables. Create a Custom Role and add the following two permissions:

  • storage.buckets.list

  • storage.buckets.getIamPolicy

The two entries must be added to the default permissions.

The following permissions are required in GCP to sync Kubernetes cluster. Add the following role:

  • Kubernetes Engine Cluster Viewer

  • Kubernetes Engine API

  • Compute Engine API

  • Cloud Resource Manager API

The Role and Permission mentioned in parentheses () are for information only and not part of the role or permission name.

The following permissions are required in GCP to sync internal ranges. Create a Custom Role and add the following permissions:

  • networkconnectivity.internalRanges.create

  • networkconnectivity.internalRanges.delete

  • networkconnectivity.internalRanges.get

  • networkconnectivity.internalRanges.getIamPolicy

  • networkconnectivity.internalRanges.list

  • networkconnectivity.internalRanges.setIamPolicy

  • networkconnectivity.internalRanges.update

  • networkconnectivity.locations.get

  • networkconnectivity.locations.list

  • networkconnectivity.operations.cancel

  • networkconnectivity.operations.delete

  • networkconnectivity.operations.get

  • networkconnectivity.operations.list

When setting up the provider, ensure that tables related to Internal Ranges or Kubernetes Cluster permissions are excluded if not granted.

The following permissions are required in GCP to sync GCP metrics.

  • monitoring.viewer