GCP GKE Resource Model Source
GCP GKE Resource Model Source
Available in PagerDuty Runbook Automation Commercial products.
The GCP GKE (Google Kubernetes Engine) Resource Model Source allows you to import your GKE clusters as nodes within Runbook Automation. This plugin provides node source functionality for managing and executing jobs on your Google Cloud Platform Kubernetes clusters directly from Runbook Automation.
Configuration
To configure the GCP GKE Resource Model Source:
- In your project, go to "Project Settings" > "Edit Nodes".
- Click "Add a new Node Source".
- Select "GCP Kubernetes Engine Clusters" from the list of available node sources.
- Configure the following settings:
- Project ID: The GCP Project ID to use for accessing the GKE clusters.
- Region or Zone: The GCP region or zone where your GKE clusters are located. You can use
*
to include all regions or zones. - Access Key Path: The Key Storage path for the GCP Access Key credentials.
- Use Pod Service Account for Node Steps: Choose whether to authenticate with the Pod Service Account for Job steps. Set to
True
if Runbook Automation or a Runner is executing within the targeted cluster.
Authentication
You can configure GCP credentials at three levels:
- Resource Model Configuration
- Plugin Group Properties
To set up credentials:
- Create a new Key Storage entry of type 'private key' and upload the gcp-key-file for your GCP credentials file.
- In the plugin configuration, provide:
- GCP Project ID
- Path to the GCP credentials in Key Storage
- Region/Zone specification
Node Attributes
Each GKE cluster will be represented as a node with the following attributes:
gcp-project-id
: The GCP project ID containing the clustergcp-location
: The GCP region/zone of the clusterkubernetes-cluster-endpoint
: The API server endpoint of the clusterkubernetes-use-pod-service-account
: Whether to use pod service account for authenticationkubernetes-cloud-provider
: Set to "gcp-gke"
Authentication Modes
The plugin supports two authentication modes:
- GCP API Authentication: Default mode when
Use Pod Service Account
is set tofalse
. Uses GCP credentials for authentication. - Pod Service Account: When set to
true
, uses the Kubernetes service account of the pod for authentication. Ideal when Runbook Automation is running within the same cluster.
Troubleshooting
If you encounter issues:
- Check the Runbook Automation logs for any error messages.
- Verify your GCP credentials and permissions:
- Ensure the service account has the necessary GKE permissions
- Verify the credentials file is properly stored in Key Storage
- Ensure your GKE cluster is running and accessible.
- Check network connectivity between Runbook Automation and your GCP resources.
- Verify the correct Project ID and Region/Zone settings.
Additional Resources
For more detailed information, refer to: