Configure CMEK in GCP¶
Privacera supports Customer Managed Encryption Keys (CMEK) for encrypting data at rest in GCP Storage Buckets and Pub/Sub Topics. This section provides steps to configure CMEK in Kubernetes for GCP.
Prerequisites¶
- Discovery is installed and running.
- CMEK keys
- CMEK keys for GCS and Pub/Sub (optional)
Note
- Ensure that the specified CMEK keys exist and are accessible to the Privacera components running in the GCP environment.
- The CMEK format for GCP should follow this pattern:
projects/<project>/locations/<location>/keyRings/<keyRing>/cryptoKeys/<cryptoKey>
.
Setup¶
Go to the Privacera Manager host and navigate to the Privacera Manager installation directory:
Bash | |
---|---|
Add or update the following variables:
Custom CMEK Keys for GCS & Pub/Sub¶
This step is optional
By default, Discovery uses K8S_PV_KEY
to encrypt data at rest in GCP Storage Buckets and Pub/Sub Topics. If you want to use different keys for these services, modify the vars.discovery.gcp.yml
file:
Copy the vars.discovery.gcp.yml
file from the sample variables directory to your custom variables directory:
Bash | |
---|---|
Add or update the following variables:
Bash | |
---|---|
Restart Privacera Services¶
- Prev Advanced Configuration
- Next Troubleshooting