You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
## Step 3: Creating a service account for your cluster instances
67
-
The cluster instances will need to be granted permission to access the storage bucket and the artifcate registry. You achieve this by creating a service account that will later be attached to the Hopsworks cluster instances. This service account should be different from the service account created in step 1, as it has only those permissions related to storing objects in a GCP bucket and docker images in an artifact registry repository.
67
+
The cluster instances will need to be granted permission to access the storage bucket and the artifact registry. You achieve this by creating a service account that will later be attached to the Hopsworks cluster instances. This service account should be different from the service account created in step 1, as it has only those permissions related to storing objects in a GCP bucket and docker images in an artifact registry repository.
68
68
69
69
### Step 3.1: Creating a custom role for accessing storage
70
70
Create a file named *hopsworksai_instances_role.yaml* with the following content:
0 commit comments