A new engineer joins the team, needs to test a backup restore, and your Ceph cluster is locked down behind layers of IAM rules. You could hand them temporary keys, pray they clean up, and hope nothing breaks. Or you could make Ceph Cloud Run manage access neatly, automatically, and with a clean audit trail.
Ceph is your durable, self-healing object store. Google Cloud Run gives you stateless, on-demand containers without servers to patch. On their own, they’re powerful. Together, they can be frictionless if you wire identity, permissions, and storage correctly. The trick is to treat Ceph as a service endpoint authenticated through Cloud Run’s short-lived credentials, not as a bucket with permanent keys.
When configured right, Ceph Cloud Run runs jobs as identity-aware clients. Cloud Run retrieves access tokens from your identity provider (Okta, AWS IAM, or Google Identity Platform). Those tokens map to Ceph users created by your provisioning pipeline. Every container request is verified, logged, and bounded by role-based policies. You avoid long-lived keys entirely.
The integration flow is simple conceptually:
- Cloud Run spins up your service with an injected OIDC identity.
- Ceph confirms that identity against your auth gateway or trust policy.
- S3 calls from your app proceed within that scoped context, producing auditable logs.
That’s automation instead of credential chaos.
To tighten it up, follow a few best practices. Map Cloud Run service accounts to Ceph users 1:1 for traceability. Use least-privilege policies and rotate any static secrets used for bootstrap steps. Add request signing in your libraries to detect any replay attempt. And most importantly, keep your audit logs centralized; Ceph’s RGW logs plus Cloud Audit Logs make compliance checks painless.