Skip to main content
GCP secrets store Google Cloud service account credentials, enabling your workloads to authenticate with Google Cloud services or pull images from Google Artifact Registry.

Use Cases

  • Artifact Registry: Pull container images from Google Artifact Registry
  • Cloud Storage: Access files in Google Cloud Storage buckets
  • BigQuery: Query data from BigQuery datasets
  • Pub/Sub: Publish and subscribe to Pub/Sub topics
  • Any GCP Service: Authenticate with any Google Cloud API
For Google Artifact Registry, you can also use a Docker secret with base64-encoded service account credentials. The GCP secret type is recommended for direct GCP API access.

Configuration Options

The GCP secret stores a complete service account JSON key file:
FieldDescription
typeAlways service_account
project_idYour GCP project ID
private_key_idUnique identifier for the private key
private_keyRSA private key in PEM format
client_emailService account email address
client_idNumeric client ID
auth_uriOAuth2 authorization endpoint
token_uriOAuth2 token endpoint

Create a GCP Secret

1

Navigate to Secrets

In the Console, navigate to Secrets and click New, or use the Create dropdown in the top-right corner and select Secret.
2

Enter basic information

Enter a Name and optional Description.
3

Select secret type

Select GCP as the secret type.
4

Configure credentials

Click Data in the left pane. Drag and drop your service account JSON file, or click to import.
5

Create the secret

Click Create.

Best Practices

Create dedicated service accounts with only the IAM roles your workload needs. Avoid using default service accounts or overly permissive roles.
Set up a key rotation schedule. Delete old keys after deploying new ones to Control Plane.
For GKE deployments, consider using Workload Identity instead of service account keys.

Using for Artifact Registry

To use a GCP secret for pulling images from Artifact Registry, add it as a pull secret to your GVC:
1

Navigate to your GVC

Open your GVC in the Console.
2

Open Pull Secrets

Click Pull Secrets in the left pane.
3

Add the secret

Click Add and select your GCP secret.
4

Save changes

Click Save.
The service account must have the roles/artifactregistry.reader role on the Artifact Registry repository.

Next Steps