Integrate Google Cloud KMS in Rancher
Portworx integrates with Google Cloud KMS to store your Portworx secrets for Volume Encryption and Cloud Credentials. This guide will help configure Portworx with Google Cloud KMS.
Portworx requires the following Google Cloud credentials to use its APIs
-
Google Application Credentials [GOOGLE_APPLICATION_CREDENTIALS]
Portworx requires permissions to use Google CloudKMS APIs. It requires the following two predefined roles
- roles/cloudkms.cryptoKeyEncrypterDecrypter
- roles/cloudkms.publicKeyViewer
More info about these roles and the included permissions can be found here
-
Google KMS Public Key Resource ID [GOOGLE_KMS_RESOURCE_ID]
Portworx uses Google's asymmetric key pairs to encrypt and decrypt secrets. More information about asymmetric key pairs and how to create them can be found here
Make sure that while creating the asymmetric key you specify the purpose of the key as Asymmetric decrypt
Once the asymmetric key is created, provide its complete resourceID to Portworx. A typical asymmetric key pair's resource ID looks like this
projects/<Project ID>/locations/<Region>/keyRings/<Key Ring Name>/cryptoKeys/<Asymmetric Key Name>/cryptoKeyVersions/1Portworx requires the above resource ID as an input argument.
For Kubernetes Users
Provide the Google credentials to Portworx by using any one of these methods