Truth in IT
    • Sign In
    • Register
        • Videos
        • Channels
        • Pages
        • Galleries
        • News
        • Events
        • All
Truth in IT Truth in IT
  • Data Management ▼
    • Converged Infrastructure
    • DevOps
    • Networking
    • Storage
    • Virtualization
  • Cybersecurity ▼
    • Application Security
    • Backup & Recovery
    • Data Security
    • Identity & Access Management (IAM)
    • Zero Trust
    • Compliance & GRC
    • Endpoint Security
  • Cloud ▼
    • Hybrid Cloud
    • Private Cloud
    • Public Cloud
  • Webinar Library
  • TiPs
  • DRAW

Securing Nomad UI Access with Google Cloud Load Balancer & IAP

HashiCorp
03/30/2026
40
0 (0%)
Share
  • Comments
  • Download
  • Transcript
Report Like Favorite
  • Share/Embed
  • Email
Link
Embed

Transcript


TL;DR

  • Demonstrates securing Nomad's administrative UI using Google Cloud's Identity-Aware Proxy (IAP) to enforce authentication before allowing access to the cluster management interface
  • Implements a complete ingress architecture using Terraform including global load balancer, managed SSL certificates, DNS configuration, and backend health checks targeting a private managed instance group
  • Reveals a Terraform limitation requiring manual creation of OAuth 2.0 credentials through Google Cloud Console, as the API only supports programmatic provisioning for internal organization clients
  • Successfully establishes authenticated access to a working Nomad cluster with three servers and three clients, setting the foundation for future episodes covering workload deployment and production features
  • Provides a roadmap for upcoming topics including public workload exposure, storage interfaces, Docker networking, service discovery with Traefik, and allocation-based autoscaling

Securing Private Nomad Clusters with Google Cloud IAP

This episode demonstrates how to expose a private Nomad cluster's administrative UI securely using Google Cloud's Identity-Aware Proxy (IAP). The presenters walk through configuring a global load balancer that sits in front of a managed instance group running three Nomad servers in a private VPC. Because the cluster is completely isolated with no inbound traffic allowed, the load balancer provides the necessary ingress point while IAP adds an authentication layer that forces users to authenticate with authorized Google accounts before accessing the admin interface. This architecture ensures that sensitive administrative interfaces remain protected while still being accessible to authorized personnel.

Infrastructure as Code Implementation with Terraform

The implementation uses Terraform to provision multiple interconnected Google Cloud resources including a static IP address, backend service targeting the managed instance group, URL map for traffic routing, HTTPS proxy, forwarding rules, and managed SSL certificates. The presenters demonstrate live coding practices including proper resource dependencies, health check configuration, and DNS setup using the domain nomad-on-google.cloud. A key limitation surfaces during implementation: OAuth 2.0 client credentials for IAP must be created manually through the Google Cloud Console rather than via Terraform, as the API only supports internal organization clients programmatically. The session includes troubleshooting IAM role bindings, showing how the iap.httpsResourceAccessor role must be granted to users before they can successfully authenticate through IAP.

Production Readiness Roadmap and Next Steps

While the episode successfully establishes secure access to the Nomad UI, the presenters emphasize this is foundational work toward a production-ready cluster. Future episodes will cover deploying actual workloads, setting up public-facing load balancers for application traffic, implementing storage interfaces, configuring Docker bridge networking, service discovery with Traefik for internal routing, and autoscaling based on resource allocations rather than just CPU usage. The working cluster now displays three healthy servers with proper leader election and three client nodes, all visible through the authenticated web interface, providing a solid platform for the advanced topics ahead.

Chapters

0:00 - Introduction
1:16 - Episode Overview
4:50 - Creating Global Load Balancer
17:40 - Setting up Identity-Aware Proxy
21:35 - OAuth 2.0 Credentials Setup
25:10 - Deploying Infrastructure
32:44 - Viewing Nomad Web UI
33:51 - Troubleshooting IAP Access
39:48 - Successful UI Access
40:37 - Next Steps and Roadmap

Key Quotes

1:54 "We need a way into our cluster. And in Google, to do this safely, you need a load balancer that is exposed to the internet."
4:02 "For a public web service, that's fine. We'll cover that in a future episode as well. But for this admin UI, we want some extra security."
7:58 "If you're setting up a new load balancer in Google, you should always go for this new version."
18:10 "Only internal organization clients can be created through Terraform. External clients must be manually created by the GSP console."
32:01 "It says here it can take 24 hours. In my experience, it's usually 15 to 20 minutes."
40:47 "We're going to add a lot of stuff in the future to really make it production ready. Add a ton of metrics, add applications, add storage, network for Docker and whatnot."

Categories:
  • » Cybersecurity » Application Security
  • » Cybersecurity » Cloud Security
  • » Data Protection
Channels:
News:
Events:
Tags:
  • Cloud Security
  • Identity & Access
  • Technical Deep Dive
  • How-To
  • DevSecOps
  • Nomad cluster management
  • Google Cloud load balancing
  • Identity-Aware Proxy
  • IAP
  • Terraform infrastructure as code
  • OAuth 2.0 authentication
  • SSL certificate management
  • DNS configuration
Show more Show less

Browse videos

  • Related
  • Featured
  • By date
  • Most viewed
  • Top rated
  •  

              Video's comments: Securing Nomad UI Access with Google Cloud Load Balancer & IAP

              Upcoming Webinar Calendar

              • 05/19/2026
                01:00 PM
                05/19/2026
                Establishing a Robust AI Governance Framework for GenAI Throughout Deployment Phases
                https://www.truthinit.com/index.php/channel/1936/establishing-a-robust-ai-governance-framework-for-genai-throughout-deployment-phases/
              • 05/20/2026
                08:00 AM
                05/20/2026
                Establishing a Robust AI Governance Framework for GenAI Throughout Its Lifecycle
                https://www.truthinit.com/index.php/channel/1937/establishing-a-robust-ai-governance-framework-for-genai-throughout-its-lifecycle/
              • 05/20/2026
                10:00 PM
                05/20/2026
                Establishing a Robust AI Governance Framework for GenAI Throughout Its Lifecycle
                https://www.truthinit.com/index.php/channel/1953/establishing-a-robust-ai-governance-framework-for-genai-throughout-its-lifecycle/
              • 05/21/2026
                11:00 AM
                05/21/2026
                The Autonomous Era: Orchestrating a Resilient Enterprise
                https://www.truthinit.com/index.php/channel/1372/the-autonomous-era-orchestrating-a-resilient-enterprise/
              • 05/27/2026
                04:00 AM
                05/27/2026
                Rivoluziona i rischi dell'AI in opportunità con Netskope AI Security
                https://www.truthinit.com/index.php/channel/1925/rivoluziona-i-rischi-dellai-in-opportunità-con-netskope-ai-security/
              • 05/27/2026
                10:00 AM
                05/27/2026
                Adopting AI: From Illusion to Intentional Control
                https://www.truthinit.com/index.php/channel/1924/harnessing-ai-transitioning-from-illusion-to-purposeful-mastery/
              • 05/28/2026
                01:00 PM
                05/28/2026
                Harnessing AI for Smaller Teams: Strategies for Secure Implementation
                https://www.truthinit.com/index.php/channel/1951/harnessing-ai-for-smaller-teams-strategies-for-secure-implementation/
              • 06/02/2026
                01:00 PM
                06/02/2026
                Spring of Satori: Delving into Recent Findings and 2026's Threat Landscape
                https://www.truthinit.com/index.php/channel/1930/spring-of-satori-delving-into-recent-findings-and-2026s-threat-landscape/
              • 06/04/2026
                02:00 AM
                06/04/2026
                Mastering the Unseen: Managing Shadow AI and Agentic MCP Traffic
                https://www.truthinit.com/index.php/channel/1948/mastering-the-unseen-managing-shadow-ai-and-agentic-mcp-traffic/
              • 06/16/2026
                07:00 AM
                06/16/2026
                Transforming Data Risk into Actionable Priorities: Essential Fixes First
                https://www.truthinit.com/index.php/channel/1952/transforming-data-risk-into-actionable-priorities-essential-fixes-first/

              Upcoming Events

              • May
                19

                Establishing a Robust AI Governance Framework for GenAI Throughout Deployment Phases

                05/19/202601:00 PM ET
                • May
                  20

                  Establishing a Robust AI Governance Framework for GenAI Throughout Its Lifecycle

                  05/20/202608:00 AM ET
                  • May
                    20

                    Establishing a Robust AI Governance Framework for GenAI Throughout Its Lifecycle

                    05/20/202610:00 PM ET
                    • May
                      21

                      The Autonomous Era: Orchestrating a Resilient Enterprise

                      05/21/202611:00 AM ET
                      • May
                        27

                        Rivoluziona i rischi dell'AI in opportunità con Netskope AI Security

                        05/27/202604:00 AM ET
                        More events
                        Truth in IT
                        • Sponsor
                        • About Us
                        • Terms of Service
                        • Privacy Policy
                        • Contact Us
                        • Preference Management
                        Desktop version
                        Standard version