Discovery Advanced Configuration¶
GCP Support for CMEK in K8S Storage, GCP Storage Buckets, and Pub/Sub Topics¶
Privacera supports encrypted storage in Kubernetes (K8s) using the following variables:
Discovery operations also utilize Google Cloud Storage and Pub/Sub. Google Cloud supports Customer Managed Encryption Keys (CMEK) for encrypting data at rest. To use CMEK with GCP Storage Buckets and Pub/Sub Topics, you need to configure the following variables in the vars.kubernetes.storage.yml
file:
Steps to Configure CMEK in K8s for GCP¶
Copy the vars.kubernetes.storage.yml
file from the sample variables directory to your custom variables directory:
Bash | |
---|---|
Add or update the following variables:
Configure CMEK for GCP Storage Buckets and Pub/Sub Topics¶
By default, Discovery uses K8S_PV_KEY
to encrypt data at rest in GCP Storage Buckets and Pub/Sub Topics. If you want to use different keys for these services, modify the vars.discovery.gcp.yml
file:
Copy the vars.discovery.gcp.yml
file from the sample variables directory to your custom variables directory:
Bash | |
---|---|
Add or update the following variables:
Bash | |
---|---|
Note
- Ensure that the specified CMEK keys exist and are accessible to the Privacera components running in the GCP environment.
- The CMEK format for GCP should follow this pattern:
projects/<project>/locations/<location>/keyRings/<keyRing>/cryptoKeys/<cryptoKey>
.
- Prev Discovery Setup
- Next Troubleshooting