extension-gcp

command module
v1.0.24 Latest Latest
Warning

This package is not in the latest version of its module.

Go to latest
Published: Apr 20, 2026 License: MIT Imports: 14 Imported by: 0

README

Google Cloud logo

Steadybit extension-gcp

A Steadybit discovery and attack implementation to inject faults into various Google Cloud / GCP services.

Learn about the capabilities of this extension in our Reliability Hub.

Configuration

Environment Variable Helm value Meaning Required Default
STEADYBIT_EXTENSION_CREDENTIALS_KEYFILE_PATH gcp.credentialsKeyfilePath To authorize using a JSON key file via location path (https://cloud.google.com/iam/docs/managing-service-account-keys) false Tries to get a client with default google apis
STEADYBIT_EXTENSION_PROJECT_ID gcp.projectID Legacy single-project configuration. Kept for backward compatibility. Mutually exclusive with STEADYBIT_EXTENSION_PROJECT_IDS and STEADYBIT_EXTENSION_PROJECTS_ADVANCED. false
STEADYBIT_EXTENSION_PROJECT_IDS gcp.projectIDs Comma-separated list of GCP project IDs to discover. All projects are accessed with the same credentials (ADC or CREDENTIALS_KEYFILE_PATH). false
STEADYBIT_EXTENSION_PROJECTS_ADVANCED gcp.projectsAdvanced JSON array configuring per-project service-account impersonation, e.g. [{"projectId":"proj-a","impersonateServiceAccount":"sa@proj-a.iam.gserviceaccount.com"}]. false
STEADYBIT_EXTENSION_WORKER_THREADS gcp.workerThreads Number of goroutines used to fan discovery across configured projects. false 1
STEADYBIT_EXTENSION_DISCOVERY_ATTRIBUTES_EXCLUDES_VM discovery.attributes.excludes.vm List of Target Attributes which will be excluded during discovery. Checked by key equality and supporting trailing "*" false

Exactly one of STEADYBIT_EXTENSION_PROJECT_ID, STEADYBIT_EXTENSION_PROJECT_IDS, or STEADYBIT_EXTENSION_PROJECTS_ADVANCED must be set; setting more than one fails startup.

The extension supports all environment variables provided by steadybit/extension-kit.

When installed as linux package this configuration is in/etc/steadybit/extension-gcp.

Authorization configuration

Provide the credentials to authorize the extension to access the Google Cloud API. The extension supports two ways to provide the credentials: Provide a JSON key file via the environment variable STEADYBIT_EXTENSION_CREDENTIALS_KEYFILE_PATH and mount it to the extension. Or create a secret with the key credentialsKeyfileJson and provide the json there.

Multi-project configuration

The extension can discover resources across multiple GCP projects. Two modes are supported:

Shared credentials (simple)

List the projects in STEADYBIT_EXTENSION_PROJECT_IDS / gcp.projectIDs. The same identity (ADC or keyfile) is used to call every project, so that identity must hold the required permissions in each project.

--set gcp.projectIDs="proj-a,proj-b,proj-c"
Per-project service-account impersonation (advanced)

Use STEADYBIT_EXTENSION_PROJECTS_ADVANCED / gcp.projectsAdvanced to define a dedicated service account per project. At runtime the extension's base identity exchanges tokens via the IAM Credentials API (iam.serviceAccounts.getAccessToken) to act as each target service account. This is the recommended pattern for environments that isolate permissions per project.

gcp:
  projectsAdvanced: |
    [
      {"projectId":"proj-a","impersonateServiceAccount":"extension@proj-a.iam.gserviceaccount.com"},
      {"projectId":"proj-b","impersonateServiceAccount":"extension@proj-b.iam.gserviceaccount.com"}
    ]

Prerequisites for impersonation:

  1. Each target project has a dedicated service account (e.g. extension@proj-a.iam.gserviceaccount.com) with the IAM roles it needs to perform the configured attacks.
  2. The identity the extension runs as (its base ADC or keyfile service account) has the roles/iam.serviceAccountTokenCreator role on every target service account. See Service account impersonation.

Installation

Kubernetes

Detailed information about agent and extension installation in kubernetes can also be found in our documentation.

All extensions provide a helm chart that is also integrated in the helm-chart of the agent.

You must provide additional values to activate this extension.

--set extension-gcp.enabled=true \
--set extension-gcp.gcp.projectID=YOUR_GCP_PROJECT_ID \
--set extension-gcp.gcp.credentialsKeyfilePath=PATH_TO_JSON_FILE \

Additional configuration options can be found in the helm-chart of the extension.

Alternative (via own helm chart)

If you need more control, you can install the extension via its dedicated helm-chart.

helm repo add steadybit-extension-gcp https://steadybit.github.io/extension-gcp
helm repo update
helm upgrade steadybit-extension-gcp \
    --install \
    --wait \
    --timeout 5m0s \
    --create-namespace \
    --namespace steadybit-agent \
    --set gcp.projectID=YOUR_GCP_PROJECT_ID \
    --set gcp.credentialsKeyfilePath=PATH_TO_JSON_FILE \
    steadybit-extension-gcp/steadybit-extension-gcp
Linux Package

Please use our agent-linux.sh script to install the extension on your Linux machine. The script will download the latest version of the extension and install it using the package manager.

After installing, configure the extension by editing /etc/steadybit/extension-gcp and then restart the service.

Extension registration

Make sure that the extension is registered with the agent. In most cases this is done automatically. Please refer to the documentation for more information about extension registration and how to verify.

IAM Permissions

Discovery

To discover vm instances, the extension needs the following IAM permissions:

  • compute.instances.list
Attack

To attack vm instances, the extension needs the following IAM permissions:

  • compute.instances.reset
  • compute.instances.stop
  • compute.instances.suspend
  • compute.instances.delete
Create Role and ServiceAccount
  1. Create a service role "steadybit-extension-gcp" with the following permissions:
  • compute.instances.list
  • compute.instances.reset
  • compute.instances.stop
  • compute.instances.suspend
  • compute.instances.delete
  1. Create a service account using the role "steadybit-extension-gcp".
  2. Create an access key for that service account and download the JSON key to key.json
  3. Create a kubernetes secret with the key.json file:
kubectl create secret generic extension-gcp -n steadybit-agent \
    --from-file=credentialsKeyfileJson=./key.json
  1. Apply the helm chart while refenrencing the created secret

Version and Revision

The version and revision of the extension:

  • are printed during the startup of the extension
  • are added as a Docker label to the image
  • are available via the version.txt/revision.txt files in the root of the image

Documentation

The Go Gopher

There is no documentation for this package.

Directories

Path Synopsis

Jump to

Keyboard shortcuts

? : This menu
/ : Search site
f or F : Jump to
y or Y : Canonical URL