Guide to generating a Workload Identity Federation token in GCP, retrieving Compute Engine instances, and configuring the Cloud Builder role for GCP, AWS, and Azure.
gcloud
, aws
, and az
CLIs are installed and authenticated with sufficient permissions.gcloud auth
commands for token generation to simplify the process and reduce manual key management.gcloud
CLI installed and authenticated with a user or service account with sufficient permissions (e.g., roles/iam.admin
, roles/compute.viewer
).aws
CLI installed and authenticated for AWS operations.az
CLI installed and authenticated for Azure operations.your-project-name
(Project Number: your-project-number
).your-aws-account-id
.your-azure-subscription-id
.your-service-account@your-project-name.iam.gserviceaccount.com
.your-identity-pool
).
your-steampipe-svc@your-project-name.iam.gserviceaccount.com
at the desired scope (organization, folder, or project).cloud-builder-trust-policy.json
:cloud-builder-policy.json
:cloud-builder-role.json
:your-steampipe-svc@your-tenant.onmicrosoft.com
at the desired scope (subscription, management group, or resource group).your-service-account
) and grant it the necessary permissions.
gcloud auth
to authenticate and impersonate the service account to obtain an access token.
YOUR_ACCESS_TOKEN
.your-identity-pool
your-service-account@your-project-name.iam.gserviceaccount.com
ya29.c.Kp0B...
(example)your-zone
zone.