What You Need
- Service account JSON key file
- Optional: project ID (auto-extracted from the key)
- Optional: default region (e.g.,
us-central1)
Create Credentials
Open the Service Accounts page
Grant roles
For a quick start, grant Compute Admin and Service Account User. For production, create a custom role with the minimum permissions listed below.
Create a JSON key
Click the service account name → Keys tab → Add Key → Create new key → JSON. Download the file.
Required Permissions
Predefined roles (simpler, broader):roles/compute.admin(Compute Admin)roles/iam.serviceAccountUser(Service Account User)
Minimum permissions list
Minimum permissions list
CLI setup (alternative to console)
CLI setup (alternative to console)
How Credentials Are Stored
Credentials are encrypted at rest in your IDE’s secret storage and on your Monk cluster using your cloud provider’s KMS — so your infrastructure can manage itself autonomously. They are never sent to Monk servers and never exposed to the LLM. See Security for full details.Troubleshooting
Service account disabled — check the service account status in IAM & Admin. JSON key file malformed — re-download the key. Make sure you selected JSON format, not P12. Missing roles — if Monk reports permission errors, verify the custom role or predefined roles are bound to the service account. Ask your agent for help:Deploy your first app
Credentials ready — now deploy

