- 11 Jul 2024
- 2 Minutes to read
- PDF
Setup guide
- Updated on 11 Jul 2024
- 2 Minutes to read
- PDF
This article will describe the steps for a Provider to configure Bobsled access to a Google Cloud Storage bucket to be used as a source in Bobsled.
Prerequisites
To configure Bobsled access to the bucket, your account must have the sufficient permissions to create policies and assign roles in Google Cloud Storage.
If your GCP restricts domains that can access resources, you must allow the Bobsled domain.
To add the Bobsled domain to your organization policy, you will need the
Directory Customer ID
from the Bobsled App, visit theEnvironment
page and scroll toGoogle Cloud Storage setting details
.Please visit Add domain to organization in GCP ↗ and follow the steps to allow the Bobsled domain.
Setup instructions
Step 1: Create a Custom Role
Log in to the Google Cloud Platform Console as a project editor
From the Home dashboard, select IAM and admin > Roles
Click Create Role
Enter a role name and a description for the custom role(e.g. Bobsled GCS Access Role, Custom role for Bobsled to access the required data in GCS buckets)
Click Add permissions button, and add the following permissions:
storage.buckets.get
storage.objects.get
storage.objects.list
Click Create

Step 2: Assign Custom Role to Bobsled Service Account in the Bucket
Before you start this step, you’ll need the Bobsled Service Account Email
. This can be found in:
From the sidebar, click on Environment and scroll down to Google Cloud Storage setting details or,
From the sidebar, click Sources > Add Source button > Follow the wizard by selecting Google Cloud Storage and your preferred region and click Continue.
If you’ve already created a source, simply click edit on the menu (ellipsis) from the same page.

Log in to the Google Cloud Platform Console as a project editor
From the Home dashboard, select Cloud Storage > Buckets
Find the bucket you want to grant Bobsled Access to and click on the ellipses to the right of the bucket's row. Select Edit Access
Click the Add Principal button.
In the New principals field, paste in the Bobsled
Service Account Email
address and select it from the returned options.Select the Role drop down. Under the Custom tab, choose the Bobsled custom role you created in the pervious section. (e.g. Bobsled GCS Access Role)
Click Save. You should see the role added under the Storage Object Viewer role dropdown.
Step 3: For KMS encrypted buckets only: Grant Bobsled Service Account permission on Cryptographic Keys
Log in to the Google Cloud Platform Console as a project editor
From the Home dashboard, select Security > Key Management
Select the key ring that is assigned to your GCS bucket.
Click Show Info Panel in the upper-right corner and click add principal button.
In the New principals field, search for the Bobsled service account
From the Select a role dropdown, select the
Cloud KMS CrytoKey Encryptor/Decryptor
role.Click the Save button.
Step 4: Finish source configuration in Bobsled
In the Source page, add a new Google Cloud Storage by clicking the Add source button,
Enter a human readable name to describe the source.
Select Google Cloud Storage and the region of your source bucket. Click Continue to move to the next step.
If your source bucket is multi-region, you may select any region for your source location.
Enter the name of the bucket you’ve just granted access. (Optionally) You may also include the path to the root of your source.
Click Save

Once you’ve successfully configured your Source, you can add it to a Share, choose a Destination, and a create a transfer to start sharing your data.