Skip to main content
The GCP provider lets you manage Google Cloud Platform resources declaratively. All resources use your own GCP service account credentials, supporting multi-tenant deployments where each user operates in their own GCP project.

Setup

Prerequisites

  1. A GCP project with billing enabled
  2. A service account with appropriate permissions
  3. Service account credentials JSON

Required Permissions

ResourceRequired Roles
gcp/secretroles/secretmanager.admin
gcp/cloudsql/*roles/cloudsql.admin
gcp/gkeroles/container.admin

Credential Setup

All GCP resources require a credentials field containing your service account JSON. Store credentials securely using a gcp/secret resource and reference them via FieldReferences.

Resources

ResourceTypeDescription
Secretgcp/secretSecret Manager secrets for storing API keys and credentials
Cloud SQLgcp/cloudsql/database_instance, gcp/cloudsql/database, gcp/cloudsql/userManaged PostgreSQL/MySQL databases
GKEgcp/gkeGoogle Kubernetes Engine clusters (Autopilot and Standard)

Architecture

GCP resources often form dependency chains:
Secret (credentials)
  └─▶ GKE Cluster
        └─▶ Kubernetes Deployments
  └─▶ Cloud SQL Instance
        ├─▶ Database
        └─▶ User