Credentials
The credential resource is the way Cloud Plans connect to your Clouds:
To AWS accounts CS connects using a remote role you shuld create in your AWS Account IAM
To Azure Subscriptions CS connects using Service Principal
To Google Cloud projects CS connects using a your project ID
AWS
We use remote roles to connect to Accounts and manage the desired resources (best Security Practice). All you have to do is:
Create a role trusting the external account 605134468875 with the following permissions:
This can be enhaced in Security with the following recommendation:
Tag your desired instances with something like "cloudsscheduler"
Edit the policy with the following:
Azure
Cloud Plans needs Service Principals with the access key. It is recommended to have one SP per Subscription. The recommended policy can be as follows:
GCP
In Google Cloud is similar to AWS. We will connect from other GCP Projectand you have to bind our Service Account to the desired role in your Projects IAM. An example Policy may contain:
compute.autoscalers.get
compute.autoscalers.list
compute.autoscalers.update
compute.healthChecks.get
compute.healthChecks.list
compute.instanceGroups.get
compute.instanceGroups.list
compute.instanceGroups.update
compute.instances.get
compute.instances.list
compute.instances.reset
compute.instances.start
compute.instances.stop
compute.instances.suspend
compute.nodeGroups.get
compute.nodeGroups.list
compute.nodeGroups.update
Last updated