Skip to main content
Google Cloud NetApp Volumes

Set up Google Cloud NetApp Volumes

Contributors netapp-sineadd

The NetApp Console needs the right permissions through a Google Cloud service account.

Complete the following tasks so that the NetApp Console can access your Google Cloud project.

  • If you do not already have an existing service account, create a new one.

  • Grant access for impersonation.

  • Grant the IAM role in the shared project.

Set up a service account

  1. In the Google Cloud console, go to the Service accounts page.

  2. Click Select a project, choose your project, and click Open.

  3. To create a service account, do the following:

    1. Click Create service account.

    2. Enter the service account name (friendly display name) and description.

      The Google Cloud Console generates a service account ID based on this name. Edit the ID if necessary - you cannot change the ID later.

    3. Click Create and continue.

    4. From the Role list, select the Google Cloud NetApp Volumes admin or Google Cloud NetApp viewer role.

    5. Select Continue.

    6. Grant impersonation access to this service account: credentials-sa@wf-production-netapp.iam.gserviceaccount.com. For details, see Create a self-signed JSON Web Token (JWT).

    7. Click DONE at the bottom of the page, and continue to the next step.

Shared VPC

In each additional GCP project that will use the service account, do the following:

  1. In the IAM page, select the Shared VPC host project from the project dropdown menu.

  2. Click Add Principal.

  3. In the New principals field, enter the email address of your service account.

  4. From the Select a role dropdown, choose the Google Cloud NetApp Volumes admin role.

  5. Click Save.

For detailed steps, refer to Google Cloud documentation:

Troubleshooting

If you encounter an error, the iam.disableCrossProjectServiceAccountUsage policy might be enforced. To fix this, do the following:

  1. In the Google Cloud console, go to the Organization policies page.

  2. Find the Disable cross-project service account usage policy and disable it.