Secure Airbyte access on GKE with IAP

Users running on Google Cloud can use Idendity Aware proxy to control access to their Airbyte instance. David Beaudway shared on slack a snippet to declare an ingress on GKE that is mapped to a static IP protected with IAP:

-- Frontend Config
apiVersion: networking.gke.io/v1beta1
kind: FrontendConfig
metadata:
 name: airbyte-frontend-config
spec:
 redirectToHttps:
   enabled: true
-- Ingress
apiVersion: networking.k8s.io/v1
kind: Ingress
metadata:
 name: airbyte-ingress
 annotations:
   kubernetes.io/ingress.global-static-ip-name: airbyte
   networking.gke.io/managed-certificates: airbyte
   networking.gke.io/v1beta1.FrontendConfig: airbyte-frontend-config
 labels:
   app: airbyte
spec:
 rules:
 - http:
     paths:
     - path: /
       pathType: Prefix
       backend:
         service:
           name: airbyte-webapp-svc
           port: