Product Guide
Cloud Accounts
Google Cloud Platform

Connect Google Cloud Account

GCP connects via OAuth. Sign in with Google, authorize, and you're set.

Prerequisites

  • A GCP project with billing enabled
  • Owner or Editor role on the project
  • Required APIs enabled (see below)

Enable Required APIs

Before connecting, enable these APIs in your GCP project (APIs & Services > Enable APIs):

APIPurposeDirect Link
Compute Engine APICreate/manage VMsEnable (opens in a new tab)
Cloud Resource Manager APIList projectsEnable (opens in a new tab)
Cloud Storage APIManage bucketsEnable (opens in a new tab)
Cloud DNS APIManage DNS zonesEnable (opens in a new tab)
⚠️

If you skip this step, you'll get "API not enabled" errors when trying to use OEC.sh features.

Connect via OAuth

  1. Go to Settings > Cloud Accounts > Add Account
  2. Click Google Cloud under One-Click Connect
  3. Sign in with your Google account
  4. Review permissions and click Continue

You may see "This app isn't verified" -- this is normal. Click Advanced > Go to OEC.sh (unsafe) to proceed.

The account shows Active with Compute, Storage, and DNS badges.

Permissions Requested

ScopePurpose
computeManage Compute Engine VMs
cloud-platform.read-onlyList projects and resources
openid, email, profileIdentify your account

Using Your GCP Account

Servers -- Go to Servers > Add Server > Provision from Cloud. Pick project, region/zone (e.g., us-central1-a), and machine type (e.g., e2-medium).

Backups -- Go to Settings > Storage > Quick Setup. Select or create a Cloud Storage bucket. GCP Cloud Storage is S3-compatible via HMAC keys -- OEC.sh handles this automatically.

DNS -- Go to Settings > DNS Providers > Quick Setup. Select a Cloud DNS managed zone.

Regions

RegionZonesLocation
us-central1a, b, c, fIowa
us-east1b, c, dSouth Carolina
europe-west1b, c, dBelgium
europe-west4a, b, cNetherlands
asia-east1a, b, cTaiwan
asia-southeast1a, b, cSingapore

Token Management

Tokens refresh automatically. If the account expires (password change, 2FA reset, or revoked access), click Reconnect and re-authorize.

To fully disconnect: delete the account in OEC.sh, then revoke OEC.sh access in Google Security Settings (opens in a new tab).

Alternative: Service Account Key

If OAuth doesn't work for your setup (e.g., automated pipelines), you can use a service account:

  1. GCP Console > IAM & Admin > Service Accounts > Create
  2. Grant compute.admin, storage.admin, dns.admin roles
  3. Create and download a JSON key
  4. In OEC.sh, use API Key Authentication > Google Cloud and paste the JSON

OAuth is preferred since there's no key file to manage.

Troubleshooting

"API not enabled" -- Enable the missing API in GCP Console > APIs & Services. Wait a minute, then retry.

"No projects found" -- Create a GCP project, make sure billing is enabled, and verify you have Owner/Editor role.

VM creation fails -- Check quotas (IAM & Admin > Quotas), verify billing is active, and try a different zone.

Account shows "Expired" -- Password or 2FA change invalidated the token. Click Reconnect.

Cost Notes

ResourceBilling
Compute Engine VMsPer-second based on machine type
Cloud StoragePer GB + network
Cloud DNSPer zone/month + queries

Use e2- machine types for the best cost efficiency. Preemptible VMs work well for non-production.