Guide to generating temporary security credentials and configuring the Cloud Builder role for AWS, GCP, and Azure.
aws
, gcloud
, and az
CLIs are installed and authenticated with sufficient permissions.aws sts
commands for credential generation to simplify the process and reduce manual key management.IAMFullAccess
, EC2FullAccess
).gcloud
CLI installed and authenticated for GCP operations.az
CLI installed and authenticated for Azure operations.your-aws-account-id
.your-project-name
(Project Number: your-project-number
).your-azure-subscription-id
.your-iam-role
.your-iam-role
) that can be assumed by an authenticated user or role.
assume-role-trust-policy.json
:cloud-builder-trust-policy.json
:cloud-builder-policy.json
:your-steampipe-svc@your-project-name.iam.gserviceaccount.com
at the desired scope.cloud-builder-role.json
:your-steampipe-svc@your-tenant.onmicrosoft.com
at the desired scope.aws sts assume-role
to generate temporary credentials by assuming the IAM role.
your-iam-role
:
AccessKeyId
, SecretAccessKey
, and SessionToken
for use as YOUR_ACCESS_KEY_ID
, YOUR_SECRET_ACCESS_KEY
, and YOUR_SESSION_TOKEN
.your-iam-role
CloudBuilder
ASIAEXAMPLE
, wJalrXUtnFEMI/K7MDENG/bPxRfiCYEXAMPLEKEY
, IQoJb3JpZ2luX2...
your-region
.