Users running on Google Cloud can use Idendity Aware proxy to control access to their Airbyte instance. David Beaudway shared on slack a snippet to declare an ingress on GKE that is mapped to a static IP protected with IAP:
-- Frontend Config
apiVersion: networking.gke.io/v1beta1
kind: FrontendConfig
metadata:
name: airbyte-frontend-config
spec:
redirectToHttps:
enabled: true
-- Ingress
apiVersion: networking.k8s.io/v1
kind: Ingress
metadata:
name: airbyte-ingress
annotations:
kubernetes.io/ingress.global-static-ip-name: airbyte
networking.gke.io/managed-certificates: airbyte
networking.gke.io/v1beta1.FrontendConfig: airbyte-frontend-config
labels:
app: airbyte
spec:
rules:
- http:
paths:
- path: /
pathType: Prefix
backend:
service:
name: airbyte-webapp-svc
port: