Connect and authenticate to your cluster
This page explains how to connect and authenticate to GKE on Azure.
You have multiple options to authenticate to GKE clusters. All of the following options assume that the Connect gateway or the user is able to connect to your cluster's control plane:
Google identity: The default authentication option provided by GKE on Azure without additional configuration.
Open ID Connect (OIDC) : Supported by GKE Identity Service
Google identity authentication
By default, the GKE Multi-Cloud API grants the user who creates the cluster the Kubernetes role-based access control (RBAC) policies that lets the user authenticate with the cluster using their Google identity. The user who created the cluster can add other users as admin users with full administrative access to the cluster.
In addition to the RBAC permissions policy that grants the
clusterrole/cluster-admin
role to admin users, the GKE Multi-Cloud API configures an
impersonation policy
that authorizes the Connect agent
to send requests to the Kubernetes API server on behalf of an admin user.
You can authenticate to your cluster with your Google identity in the following ways:
Use kubectl with identity from the gcloud CLI
You can use the Google Cloud CLI to create a kubeconfig
that uses the
identity of the user authenticated with gcloud auth login
. You can then use
kubectl
to access the cluster.
For kubectl
access when using the Connect gateway, if an admin user isn't a
project owner, minimally, the user must be granted the following roles in the
project:
roles/gkehub.gatewayAdmin
: This role lets a user access the Connect gateway API to usekubectl
to manage the cluster.If a user only needs read-only access to connected clusters, you can grant
roles/gkehub.gatewayReader
instead.If a user needs read / write access to connected clusters, you can grant
roles/gkehub.gatewayEditor
.
roles/gkehub.viewer
: This role lets a user retrieve clusterkubeconfigs
.
For details about the permissions included in these roles, see GKE Hub roles in the IAM documentation.
You can find out more about granting IAM permissions and roles in Granting, changing, and revoking access to resources.
After an admin user has the required roles, follow the steps in Configure cluster access for kubectl.
Use Google Cloud console
Admin users who aren't project owners and want to interact with clusters using the console need the following roles at a minimum:
roles/container.viewer
. This role lets users view the GKE Clusters page and other container resources in the Google Cloud console. For details about the permissions included in this role, see Kubernetes Engine roles in the IAM documentation.roles/gkehub.viewer
. This role lets users view clusters outside Google Cloud in the Google Cloud console. Note that this is one of the roles required forkubectl
access. If you already granted this role to a user, you don't need to grant it again. For details about the permissions included in this role, see GKE Hub roles in the IAM documentation.
You can find out more about granting IAM permissions and roles in Granting, changing, and revoking access to resources.
For information on logging in to the cluster from the console, see Log in using your Google Cloud identity.
Use Google Groups
To connect to your cluster as a member of a Google group, see Connect Google groups to GKE on Azure.
Authenticate with OIDC
For information on authenticating to your cluster with OIDC, see Manage identity with GKE Identity Service.
Authenticate with external identities
For information on authenticating to your cluster with external identities, see Authenticate with external identities.
Connect to your cluster's control plane
All GKE on Azure are created in private subnets. All the underlying cluster infrastructure (for example, nodes and load balancer endpoints) is provisioned with private RFC 1918 IP addresses only.
To manage your cluster directly, you must be able to connect to the control plane load balancer of your cluster. If your cluster can't connect directly to your control plane but can make outbound connections, you can connect to the control plane through Connect gateway, a Google-hosted reverse proxy to your cluster. For more information, see Connecting to registered clusters with the Connect gateway.
You can also connect through Azure's ExpressRoute service.