Gcp Gke Workload Identity
Provides Google Cloud guidance and assistance for deploying and managing cloud infrastructure.
Install on your platform
We auto-selected Claude Code based on this skill’s supported platforms.
Run in terminal (recommended)
claude mcp add gcp-gke-workload-identity npx -- -y @trustedskills/gcp-gke-workload-identity
Or manually add to ~/.claude/settings.json
{
"mcpServers": {
"gcp-gke-workload-identity": {
"command": "npx",
"args": [
"-y",
"@trustedskills/gcp-gke-workload-identity"
]
}
}
}Requires Claude Code (claude CLI). Run claude --version to verify your install.
About This Skill
What it does
This skill enables Google Kubernetes Engine (GKE) workloads to securely access Google Cloud services without requiring long-lived service account keys. It leverages Workload Identity, a GKE feature that allows pods to assume the identity of a Google Service Account. This eliminates the need for managing and storing credentials within your cluster, enhancing security posture.
When to use it
- Automated deployments: Automate tasks like deploying applications or managing infrastructure where direct access to GCP resources is required from GKE pods.
- Serverless functions on GKE: Securely invoke serverless functions running in GKE by granting them specific permissions via Workload Identity.
- Data processing pipelines: Allow your data processing jobs within GKE to read and write data to Google Cloud Storage or BigQuery without exposing sensitive keys.
- Integrating with other GCP services: Enable seamless integration between applications running inside GKE and other Google Cloud services like Pub/Sub, Cloud SQL, etc.
Key capabilities
- Allows pods to assume the identity of a Google Service Account.
- Eliminates the need for managing service account keys within your Kubernetes cluster.
- Provides granular control over permissions granted to workloads.
- Enhances security by reducing the attack surface associated with credential management.
Example prompts
- "Configure my GKE pod to access Cloud Storage using Workload Identity."
- "Grant this pod permission to read from BigQuery using a service account identity."
- “Create a workload identity for accessing Pub/Sub.”
Tips & gotchas
- Requires proper configuration of Workload Identity on your GKE cluster. Ensure the necessary IAM roles are assigned and the Kubernetes Service Account is properly configured.
Tags
TrustedSkills Verification
Unlike other registries that point to live repositories, TrustedSkills pins every skill to a verified commit hash. This protects you from malicious updates — what you install today is exactly what was reviewed and verified.
Security Audits
| Gen Agent Trust Hub | Pass |
| Socket | Pass |
| Snyk | Pass |
🌐 Community
Passed automated security scans.