Thank you so much for this video. While my situation is fairly different, this was still super helpful. I'm actually working with trying to find a way to connect Bitbucket Pipelines with GCP, however, the missing component for me ended up ultimately being this command: *gcloud iam workload-identity-pools create-cred-config* . That was the missing piece for me since I couldn't quite figure out how the application was going to authenticate with GCP if it didn't have a key file (y'know, via the typical "gcloud auth activate-service-account..." command). The extra step here was to use that command to instead generate a credential *configuration* file that you can point to instead for logging in (usually via the GOOGLE_APPLICATION_CREDENTIALS environment variable instead), which you can do once already have an OIDC token (which Pipelines will give you once all the other stuff is setup). 🎉
Amazing video 🙌 Do we have to grant the WorkloadIdentityUser role to the principalset over the service account, and then give that service account permission to the bucket? Why don't we just give the principalset permission over the bucket directly?
Keep uploading more videos on gcp IAM , database , monitoring and logging please
Thank you so much for this video. While my situation is fairly different, this was still super helpful. I'm actually working with trying to find a way to connect Bitbucket Pipelines with GCP, however, the missing component for me ended up ultimately being this command: *gcloud iam workload-identity-pools create-cred-config* . That was the missing piece for me since I couldn't quite figure out how the application was going to authenticate with GCP if it didn't have a key file (y'know, via the typical "gcloud auth activate-service-account..." command). The extra step here was to use that command to instead generate a credential *configuration* file that you can point to instead for logging in (usually via the GOOGLE_APPLICATION_CREDENTIALS environment variable instead), which you can do once already have an OIDC token (which Pipelines will give you once all the other stuff is setup). 🎉
Amazing Tutorial !! Thanks.
Amazing video 🙌
Do we have to grant the WorkloadIdentityUser role to the principalset over the service account, and then give that service account permission to the bucket? Why don't we just give the principalset permission over the bucket directly?
Great work!. Kindly upload more concepts
Brilliant 👏.. thank you very much
THanks for video .. can you please make video on workload identity federation access GCS bucket from GITHUB repo
Can we get the lambda code for this tutorial !! Thanks for the tutorial.
Great! Can you share the Git link for the py code?
how can we achieve the same for workload running in EKS, I need to access GCS bucket from EKS pods
thank you
Well explained!!,
Where we can find the used commands?
Great!!