Skip to content

Commit 31ccd64

Browse files
author
Steffen Grohsschmiedt
authored
Add docs for customer-managed encryption keys on GCP (logicalclocks#49)
1 parent e03caa9 commit 31ccd64

File tree

2 files changed

+8
-1
lines changed

2 files changed

+8
-1
lines changed
Loading

docs/setup_installation/gcp/cluster_creation.md

+8-1
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,14 @@ Name your cluster (2). Choose the *Region*(3) and *Zone*(4) in which to deploy t
2525

2626
Select the *Instance type* (5) and *Local storage* (6) size for the cluster *Head node*.
2727

28-
Enter the name of the bucket in which the hopsworks cluster will store its data in *Cloud Storage Bucket* (7)
28+
Optional: Specify a [customer-managed encryption key](https://cloud.google.com/compute/docs/disks/customer-managed-encryption) to be used for encryption of local storage. The key has to be specified using the format: `projects/PROJECT_ID/locations/REGION/keyRings/KEY_RING/cryptoKeys/KEY`. Note that your project needs to be configured to allow usage of the key. This can be achieved by executing the gcloud command below. Refer to the GCP documentation for more details: [Protect resources by using Cloud KMS keys](https://cloud.google.com/compute/docs/disks/customer-managed-encryption#before_you_begin).
29+
30+
gcloud projects add-iam-policy-binding KMS_PROJECT_ID \
31+
--member serviceAccount:service-PROJECT_NUMBER@compute-system.iam.gserviceaccount.com \
32+
--role roles/cloudkms.cryptoKeyEncrypterDecrypter
33+
34+
35+
Enter the name of the bucket in which the hopsworks cluster will store its data in *Cloud Storage Bucket* (8)
2936

3037
!!! warning
3138
The bucket must be empty and must be in a region accessible from the region in which the cluster is deployed.

0 commit comments

Comments
 (0)