Skip to main content
Skip to main content

Pub/Sub IAM permissions

This article describes the GCP IAM permissions ClickPipes requires to authenticate with Google Cloud Pub/Sub and consume data from your topics, and how to set up a service account that grants exactly those permissions.

Prerequisites

To follow this guide, you will need:

  • An active ClickHouse Cloud service
  • A GCP project containing the Pub/Sub topic you want to ingest from
  • IAM permissions in that project to create service accounts and grant roles

Authentication model

ClickPipes for Pub/Sub authenticates with GCP using a service account JSON key. When you create a pipe, you upload the key file; ClickPipes encrypts it at rest and uses it at runtime to:

  • list and read topics in your project,
  • create and delete the managed subscription ClickPipes uses to consume messages,
  • consume messages from that subscription, and
  • (optionally) read native Pub/Sub schemas from the schema registry, and seek to a snapshot.

There is no workload identity or inline credential paste option — the service account JSON key is the only supported authentication method today.

Required permissions

ClickPipes requires the following IAM permissions on the GCP project that owns the topic. They cover the full pipe lifecycle: discovery (topic listing, validation, sampling), subscription management, steady-state ingestion, and cleanup.

Topic access (discovery and validation)

PermissionPurpose
pubsub.topics.listList available topics in the project during discovery
pubsub.topics.getValidate topic existence and retrieve schema settings
pubsub.topics.attachSubscriptionRequired on the topic when creating a subscription against it

Subscription lifecycle (discovery and ingestion)

PermissionPurpose
pubsub.subscriptions.createCreate the managed subscription (clickpipes-{pipeID}) and ephemeral discovery subscriptions
pubsub.subscriptions.getHealth checks (every 60s), follower polling, subscription validation
pubsub.subscriptions.deleteClean up ephemeral discovery subscriptions and delete the managed subscription on pipe deletion
pubsub.subscriptions.consumeReceive(), Ack(), Nack(), and seek-to-timestamp operations

Snapshot access (optional — only for seek-to-snapshot)

PermissionPurpose
pubsub.snapshots.seekSeek a subscription to a saved snapshot. Not needed for timestamp seeks.

Schema access (optional — only for native Avro/Protobuf topics)

PermissionPurpose
pubsub.schemas.getRetrieve native schema definitions from the Pub/Sub schema registry

Predefined roles

RoleSufficient?Notes
roles/pubsub.editorYesCovers all required permissions. Broadest option.
roles/pubsub.subscriberNoMissing topics.list, topics.attachSubscription, subscriptions.create, subscriptions.delete, and schemas.get.
roles/pubsub.viewerNoRead-only — no subscription management or consumption.
Custom role (recommended)YesUse the seven core permissions above (plus optional snapshots.seek and schemas.get) for least-privilege access.

Setup

Create a custom role (recommended)

For least-privilege access, create a custom role with exactly the permissions ClickPipes needs.

You can do this with the gcloud CLI:

gcloud iam roles create clickpipes.pubsub.ingestion \
  --project=YOUR_PROJECT_ID \
  --title="ClickPipes Pub/Sub Ingestion" \
  --description="Permissions required by ClickHouse ClickPipes to ingest from Pub/Sub" \
  --permissions=pubsub.topics.list,pubsub.topics.get,pubsub.topics.attachSubscription,pubsub.subscriptions.create,pubsub.subscriptions.get,pubsub.subscriptions.delete,pubsub.subscriptions.consume \
  --stage=GA

Or, in the GCP Console, go to IAM & Admin → Roles → Create role and add the permissions listed in Required permissions.

Optional permissions

Append pubsub.snapshots.seek to the --permissions list if you plan to use the Seek to Snapshot starting offset, and pubsub.schemas.get if you ingest from topics that use native Pub/Sub Avro or Protobuf schemas. Leave them out otherwise to keep the role minimal.

If you prefer to skip the custom role, you can grant roles/pubsub.editor instead.

Create a service account

Create a dedicated service account for the ClickPipe:

gcloud iam service-accounts create clickpipes-pubsub \
  --project=YOUR_PROJECT_ID \
  --display-name="ClickPipes Pub/Sub Ingestion"

Grant the role to the service account

Bind the role you created (or roles/pubsub.editor) to the service account at the project level:

gcloud projects add-iam-policy-binding YOUR_PROJECT_ID \
  --member="serviceAccount:clickpipes-pubsub@YOUR_PROJECT_ID.iam.gserviceaccount.com" \
  --role="projects/YOUR_PROJECT_ID/roles/clickpipes.pubsub.ingestion"

Create and download a service account key

Create a JSON key for the service account and download it locally:

gcloud iam service-accounts keys create clickpipes-pubsub-key.json \
  --iam-account=clickpipes-pubsub@YOUR_PROJECT_ID.iam.gserviceaccount.com

You will upload this clickpipes-pubsub-key.json file in the ClickPipes UI when creating the pipe.

Treat the key as a secret

Service account keys grant access to your GCP project. Store the file securely, do not commit it to source control, and rotate it periodically. ClickPipes encrypts the key at rest after upload.

Notes

  • pubsub.topics.attachSubscription is required on the topic resource, not the subscription. This is commonly missed when granting only subscription-level permissions.
  • If your topic does not use a native Pub/Sub schema (Avro or Protobuf), the pubsub.schemas.get permission is not needed.
  • Managed subscriptions are named clickpipes-{pipeID} with a 60s ack deadline, 7-day message retention, and message ordering enabled.
  • Ephemeral discovery subscriptions are named clickpipes-discovery-{uuid} with a 10s ack deadline, 10-minute retention, and a 24-hour auto-expiry TTL.
  • ClickPipes treats PermissionDenied and Unauthenticated errors as non-retryable — if a permission is missing, the pipe fails fast rather than retrying indefinitely.