With infrastructure provisioned, you now need to configure access to the GKE cluster. This step covers:
After this step, you will have working kubectl access and can verify all infrastructure components are healthy.
GKE uses Google Cloud IAM for authentication. When you run kubectl, it:
This is why you need:
Terraform automatically grants you access because it creates the cluster using your credentials. The cluster creator is automatically an admin. Other team members need to be added separately (covered below).
Update your kubeconfig file with the GKE cluster credentials:
This command:
~/.kube/config filegke-gcloud-auth-plugin)Expected output:
“Could not connect to the endpoint URL” error?
This usually means:
Verify your configuration matches your Terraform outputs.
Test that you can communicate with the cluster:
Expected output:
You should see 2 system nodes plus your worker nodes (depending on confident_node_group_desired_size) in Ready status.
Timeout or connection refused?
This typically means the GKE API is not accessible from your network:
If confident_public_gke = false (default): The GKE API is only accessible from within the VPC (or authorized networks). You need VPN access or VPC peering to your corporate network. See “Private cluster access” below.
If confident_public_gke = true: The API should be publicly accessible. Check your authorized networks and connectivity.
Verify core Kubernetes components are running:
You should see pods for:
All pods should be Running with all containers ready.
Terraform deployed several Kubernetes resources. Let’s verify they’re working correctly.
Check that all Helm charts installed successfully:
Helm release shows “failed” or “pending-install”?
This sometimes happens when GKE wasn’t fully ready. Usually fixable by re-running:
Terraform will retry the failed Helm installations.
Verify the namespace exists:
Check that the required service accounts are created:
Expected service accounts:
Why service accounts? Service accounts enable GCP Workload Identity,
which gives pods fine-grained GCP permissions. Instead of giving the whole
cluster access to GCS, only pods using confident-storage-sa can access
the buckets. This follows the principle of least privilege.
External Secrets Operator syncs credentials from Google Secret Manager into Kubernetes secrets. Verify it’s working:
Expected:
Check the ExternalSecret:
Expected status: SecretSynced
ExternalSecret shows “SecretSyncedError”?
This means it couldn’t read from Secret Manager. Common causes:
external-secrets-sa GCP service account may not have Secret Manager Secret Accessor roleCheck the error details:
By default (confident_public_gke = false), the GKE API server is only accessible from within the VPC (or authorized networks). This is a security best practice—it prevents unauthorized access from the internet.
To access a private cluster, you need network connectivity to the VPC.
If your organization has VPN connectivity to GCP (via Cloud Interconnect, Cloud VPN, or Network Connectivity Center):
This is the recommended approach for production because it uses your existing network security infrastructure.
VPN routing must include the GKE VPC. If you configured a custom address
space (e.g., 10.0.0.0/16) in Prerequisites, ensure your VPN routes include
it. Work with your network team to add the route if needed.
If you don’t have existing VPC connectivity, you can use a Compute Engine VM within the VPC as a jump box:
The Terraform code includes a commented-out bastion configuration in
bastion.tf that you can enable as a starting point.
If you’re just testing, you can enable public API access by setting confident_public_gke = true in your tfvars and re-running Terraform. This makes the GKE API accessible from the internet (subject to authorized networks).
Public GKE API is a security risk. While authenticated by Cloud IAM, a publicly accessible API endpoint increases your attack surface. Only use this for temporary testing, never for production.
The person who ran Terraform is automatically a GKE admin. To grant access to other team members:
Add Google Group emails to your tfvars:
Then re-run terraform apply. This grants cluster admin access to all members of that Google Group.
For individual users:
IAM bindings require the identity to exist in Cloud Identity. If you get errors, verify the user or group email is correct and exists in your organization.
ArgoCD is deployed for GitOps-based deployments. You can access it once your network has connectivity to the cluster:
ArgoCD runs inside the cluster behind an internal GCP Load Balancer, so it’s only accessible via the internal network. You’ll need VPN connectivity to access the dashboard.
Your GCP identity isn’t authorized to access the cluster:
gcloud auth listYou have no network path to the GKE API:
Nodes take a few minutes to fully initialize. Wait 2-3 minutes after the cluster is created. If they stay NotReady:
Look at the “Conditions” section for clues. Common causes:
With cluster access configured, proceed to Kubernetes Deployment to deploy the Confident AI application services.