Truth in IT
    • Sign In
    • Register
        • Videos
        • Channels
        • Pages
        • Galleries
        • News
        • Events
        • All
Truth in IT Truth in IT
  • Data Management ▼
    • Converged Infrastructure
    • DevOps
    • Networking
    • Storage
    • Virtualization
  • Cybersecurity ▼
    • Application Security
    • Backup & Recovery
    • Data Security
    • Identity & Access Management (IAM)
    • Zero Trust
    • Compliance & GRC
    • Endpoint Security
  • Cloud ▼
    • Hybrid Cloud
    • Private Cloud
    • Public Cloud
  • Webinar Library
  • TiPs

Securing Nomad UI Access with Google Cloud Load Balancer & IAP

HashiCorp
03/30/2026
0
0 (0%)
Share
  • Comments
  • Download
  • Transcript
Report Like Favorite
  • Share/Embed
  • Email
Link
Embed

Transcript


TL;DR

  • Demonstrates securing Nomad's administrative UI using Google Cloud's Identity-Aware Proxy (IAP) to enforce authentication before allowing access to the cluster management interface
  • Implements a complete ingress architecture using Terraform including global load balancer, managed SSL certificates, DNS configuration, and backend health checks targeting a private managed instance group
  • Reveals a Terraform limitation requiring manual creation of OAuth 2.0 credentials through Google Cloud Console, as the API only supports programmatic provisioning for internal organization clients
  • Successfully establishes authenticated access to a working Nomad cluster with three servers and three clients, setting the foundation for future episodes covering workload deployment and production features
  • Provides a roadmap for upcoming topics including public workload exposure, storage interfaces, Docker networking, service discovery with Traefik, and allocation-based autoscaling

Securing Private Nomad Clusters with Google Cloud IAP

This episode demonstrates how to expose a private Nomad cluster's administrative UI securely using Google Cloud's Identity-Aware Proxy (IAP). The presenters walk through configuring a global load balancer that sits in front of a managed instance group running three Nomad servers in a private VPC. Because the cluster is completely isolated with no inbound traffic allowed, the load balancer provides the necessary ingress point while IAP adds an authentication layer that forces users to authenticate with authorized Google accounts before accessing the admin interface. This architecture ensures that sensitive administrative interfaces remain protected while still being accessible to authorized personnel.

Infrastructure as Code Implementation with Terraform

The implementation uses Terraform to provision multiple interconnected Google Cloud resources including a static IP address, backend service targeting the managed instance group, URL map for traffic routing, HTTPS proxy, forwarding rules, and managed SSL certificates. The presenters demonstrate live coding practices including proper resource dependencies, health check configuration, and DNS setup using the domain nomad-on-google.cloud. A key limitation surfaces during implementation: OAuth 2.0 client credentials for IAP must be created manually through the Google Cloud Console rather than via Terraform, as the API only supports internal organization clients programmatically. The session includes troubleshooting IAM role bindings, showing how the iap.httpsResourceAccessor role must be granted to users before they can successfully authenticate through IAP.

Production Readiness Roadmap and Next Steps

While the episode successfully establishes secure access to the Nomad UI, the presenters emphasize this is foundational work toward a production-ready cluster. Future episodes will cover deploying actual workloads, setting up public-facing load balancers for application traffic, implementing storage interfaces, configuring Docker bridge networking, service discovery with Traefik for internal routing, and autoscaling based on resource allocations rather than just CPU usage. The working cluster now displays three healthy servers with proper leader election and three client nodes, all visible through the authenticated web interface, providing a solid platform for the advanced topics ahead.

Chapters

0:00 - Introduction
1:16 - Episode Overview
4:50 - Creating Global Load Balancer
17:40 - Setting up Identity-Aware Proxy
21:35 - OAuth 2.0 Credentials Setup
25:10 - Deploying Infrastructure
32:44 - Viewing Nomad Web UI
33:51 - Troubleshooting IAP Access
39:48 - Successful UI Access
40:37 - Next Steps and Roadmap

Key Quotes

1:54 "We need a way into our cluster. And in Google, to do this safely, you need a load balancer that is exposed to the internet."
4:02 "For a public web service, that's fine. We'll cover that in a future episode as well. But for this admin UI, we want some extra security."
7:58 "If you're setting up a new load balancer in Google, you should always go for this new version."
18:10 "Only internal organization clients can be created through Terraform. External clients must be manually created by the GSP console."
32:01 "It says here it can take 24 hours. In my experience, it's usually 15 to 20 minutes."
40:47 "We're going to add a lot of stuff in the future to really make it production ready. Add a ton of metrics, add applications, add storage, network for Docker and whatnot."

Categories:
  • » Cybersecurity » Application Security
  • » Cybersecurity » Cloud Security
  • » Data Protection
Channels:
News:
Events:
Tags:
  • Cloud Security
  • Identity & Access
  • Technical Deep Dive
  • How-To
  • DevSecOps
  • Nomad cluster management
  • Google Cloud load balancing
  • Identity-Aware Proxy
  • IAP
  • Terraform infrastructure as code
  • OAuth 2.0 authentication
  • SSL certificate management
  • DNS configuration
Show more Show less

Browse videos

  • Related
  • Featured
  • By date
  • Most viewed
  • Top rated
  •  

              Video's comments: Securing Nomad UI Access with Google Cloud Load Balancer & IAP

              Upcoming Webinar Calendar

              • 04/08/2026
                01:00 PM
                04/08/2026
                Managing Configuration at Scale Across Group Policy and Intune
                https://www.truthinit.com/index.php/channel/1865/managing-configuration-at-scale-across-group-policy-and-intune/
              • 04/15/2026
                01:00 PM
                04/15/2026
                Service Account Security in the Age of AI: From Legacy Accounts to Agentic Identities
                https://www.truthinit.com/index.php/channel/1866/service-account-security-in-the-age-of-ai-from-legacy-accounts-to-agentic-identities/
              • 04/30/2026
                10:00 AM
                04/30/2026
                Insights from the 2026 Keepit Annual Data Report on SaaS Data Protection
                https://www.truthinit.com/index.php/channel/1868/insights-from-the-2026-keepit-annual-data-report-on-saas-data-protection/

              Upcoming Events

              • Apr
                08

                Managing Configuration at Scale Across Group Policy and Intune

                04/08/202601:00 PM ET
                • Apr
                  15

                  Service Account Security in the Age of AI: From Legacy Accounts to Agentic Identities

                  04/15/202601:00 PM ET
                  • Apr
                    30

                    Insights from the 2026 Keepit Annual Data Report on SaaS Data Protection

                    04/30/202610:00 AM ET
                    More events
                    Truth in IT
                    • Sponsor
                    • About Us
                    • Terms of Service
                    • Privacy Policy
                    • Contact Us
                    • Preference Management
                    Desktop version
                    Standard version