- 필수 기능
- 시작하기
- Glossary
- 표준 속성
- Guides
- Agent
- 통합
- 개방형텔레메트리
- 개발자
- Administrator's Guide
- API
- Datadog Mobile App
- CoScreen
- Cloudcraft
- 앱 내
- 서비스 관리
- 인프라스트럭처
- 애플리케이션 성능
- APM
- Continuous Profiler
- 스팬 시각화
- 데이터 스트림 모니터링
- 데이터 작업 모니터링
- 디지털 경험
- 소프트웨어 제공
- 보안
- AI Observability
- 로그 관리
- 관리
Use Customer-Managed Encryption Keys (CMEK) to encrypt node boot disks using keys managed within Cloud Key Management Service (Cloud KMS). GCE persistent disks are encrypted at rest by default using envelope encryption with keys managed by Google. For additional protection, users can manage the Key Encryption Keys using Cloud KMS.
Note: This cannot be remediated by updating an existing cluster. The node pool must either be recreated or a new cluster created.
To create a new node pool:
disabled
ADD NODE POOL
Standard persistent disk
or SSD persistent disk
Enable customer-managed encryption for Boot Disk
and select the Cloud KMS encryption key to be used.CREATE
To create a new cluster:
CREATE
and click CONFIGURE
for the required cluster modeNODE POOLS
, expand the default-pool list and click Nodes
Standard persistent disk
or SSD Persistent Disk
as the Boot disk typeEnable customer-managed encryption for Boot Disk
check box and choose the Cloud KMS encryption key
to be usedCREATE
pd-standard
or pd-ssd
:gcloud container node-pools create <cluster_name> --disk-type <disk_type> --boot-disk-kms-keyprojects/<key_project_id>/locations/<location>/keyRings/<ring_name>/cryptoKeys/<key_name>
pd-standard
or pd-ssd
:gcloud container clusters create <cluster_name> --disk-type <disk_type> --boot-disk-kms-key projects/<key_project_id>/locations/<location>/keyRings/<ring_name>/cryptoKeys/<key_name>