Quantcast
Channel: Recent Questions - Stack Overflow
Viewing all articles
Browse latest Browse all 12111

VPC SC Service Perimeter handle Google Service Accounts

$
0
0

I have a service perimeter created on projects holding Cloud Composer.

The VPC SC Logs snippet are below,

"authenticationInfo": {"principalEmail": "service-org-<ORG_ID>@security-center-api.iam.gserviceaccount.com"    },"requestMetadata": {"callerIp": "private","requestAttributes": {},"destinationAttributes": {}    },"serviceName": "compute.googleapis.com","methodName": "compute.beta.DisksService.Insert","resourceName": "projects/<CloudComposerProjectNumber>","violationReason": "RESOURCES_NOT_IN_SAME_SERVICE_PERIMETER","egressViolations": [        {"source": "projects/<CloudComposerProjectNumber>","sourceType": "Resource","servicePerimeter": "accessPolicies/number/servicePerimeters/perimeter_name","targetResource": "projects/<ProjectNumbernotfound>"        }      ]

I feel the error is because I don't have any access level defined for these Google Owned Service Accounts.But since the violation reason is NOT_IN_SAME_SERVICE_PERIMETER I don't think that is the reason.The target project number is not found in my estate. Could it be external or google owned?I tried adding egress rule for identity "service-org-<ORG_ID>@security-center-api.iam.gserviceaccount.com" but it is failing Error 400: The email address 'service-org-<ORG_ID>@security-center-api.iam.gserviceaccount.com ' is invalid or non-existent.

Not sure if anyone has something similar


Viewing all articles
Browse latest Browse all 12111

Trending Articles



<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>