Accessing GCP data securely
This article demonstrates how to securely authenticate with Google Cloud Storage (GCS) and access your data from ClickHouse Cloud.
Introduction
Currently, ClickHouse Cloud connects to GCS using HMAC (Hash-based Message Authentication Code) keys associated with a Google Cloud service account. This approach provides secure access to your GCS buckets without embedding credentials directly in your queries.
ClickHouse Cloud currently only supports HMAC key authentication for GCS access. Support for Workload Identity Federation (the GCP equivalent of AWS IAM role assumption) is planned for a future release.
How it works:
- You create a Google Cloud service account with appropriate GCS permissions
- You generate HMAC keys for that service account
- You provide these HMAC credentials to ClickHouse Cloud
- ClickHouse Cloud uses these credentials to access your GCS buckets
This approach allows you to manage all access to GCS buckets through IAM policies on the service account, making it easier to grant or revoke access without modifying individual bucket policies.
Prerequisites
For following this guide you will need:
- An active ClickHouse Cloud service
- A Google Cloud project with Cloud Storage enabled
- Permissions to create service accounts and generate HMAC keys in your GCP project
Setup
Create a Google Cloud service account
- In the Google Cloud Console, navigate to IAM & Admin → Service Accounts
- Click
Service accountsfrom the left-hand menu, then clickCREATE SERVICE ACCOUNT:
Enter a name and description for your service account, for example:
Click CREATE AND CONTINUE
Grant the service account the Storage Object User role:
This role provides read and write access to GCS objects
For read-only access, use Storage Object Viewer instead
For more granular control, you can create a custom role
Click CONTINUE, then DONE
Make note of the service account email address:
Grant bucket access to the service account
You can grant access at either the project level or individual bucket level.
Option 1: Grant access to specific buckets (recommended)
- Navigate to
Cloud Storage→Buckets - Click on the bucket you want to grant access to
- Go to the
PERMISSIONStab - Under "Permissions" click
GRANT ACCESSfor the principal created in the previous steps - In the "New principals" field, enter your service account email
- Select the appropriate role:
- Storage Object User for read/write access
- Storage Object Viewer for read-only access
- Click
SAVE - Repeat for any additional buckets
Option 2: Grant project-level access
- Navigate to
IAM & Admin→IAM - Click
GRANT ACCESS - Enter your service account email in the "New principals" field
- Select Storage Object User (or Storage Object Viewer for read-only)
- Click SAVE
Grant access only to the specific buckets that ClickHouse needs to access, rather than project-wide permissions.
Generate HMAC keys for the service account
Navigate to Cloud Storage → Settings → Interoperability:
If you don't see an "Access keys" section, click ENABLE INTEROPERABILITY ACCESS
Under "Access keys for service accounts", click CREATE A KEY FOR A SERVICE ACCOUNT:
Select the service account you created earlier (e.g clickhouse-gcs-access@your-project.iam.gserviceaccount.com)
Click CREATE KEY:
The HMAC key will be displayed. Save both the Access Key and Secret immediately - you won't be able to view the secret again.
Example keys are shown below:
Store these credentials securely. The secret cannot be retrieved again after this screen is closed. You will need to generate new keys if you lose the secret.
Use HMAC keys with ClickHouse Cloud
Now you can use the HMAC credentials to access GCS from ClickHouse Cloud. For this, use the GCS table function:
Use wildcards for multiple files:
Best practices
Use separate service accounts for different environments
Create separate service accounts for development, staging, and production environments. For example:
clickhouse-gcs-dev@project.iam.gserviceaccount.comclickhouse-gcs-staging@project.iam.gserviceaccount.comclickhouse-gcs-prod@project.iam.gserviceaccount.com
This allows you to easily revoke access for a specific environment without affecting others.
Apply least-privilege access
Grant only the minimum required permissions:
- Use Storage Object Viewer for read-only access
- Grant access to specific buckets rather than project-wide
- Consider using bucket-level conditions to restrict access to specific paths
Rotate HMAC keys regularly
Implement a key rotation schedule:
- Generate new HMAC keys
- Update ClickHouse configurations with new keys
- Verify functionality with new keys
- Delete old HMAC keys
Google Cloud doesn't enforce HMAC key expiration, so you must implement your own rotation policy.
Monitor access with Cloud Audit Logs
Enable and monitor Cloud Audit Logs for Cloud Storage:
- Navigate to IAM & Admin → Audit Logs
- Find Cloud Storage in the list
- Enable
Admin Read,Data Read, andData Write logs - Use these logs to monitor access patterns and detect anomalies