Skip to content

Commit bd97c1b

Browse files
authored
Merge pull request #28818 from codyhoag/gcp-disk-encrypt-update
Update GCP disk encryption docs based on KMS SA support issues
2 parents 26e9c91 + df14e5b commit bd97c1b

File tree

6 files changed

+34
-9
lines changed

6 files changed

+34
-9
lines changed

installing/installing_gcp/installing-gcp-customizations.adoc

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -37,6 +37,10 @@ include::modules/installation-configuration-parameters.adoc[leveloffset=+2]
3737

3838
include::modules/installation-gcp-config-yaml.adoc[leveloffset=+2]
3939

40+
== Additional resources
41+
42+
* xref:../../machine_management/creating_machinesets/creating-machineset-gcp.adoc#machineset-enabling-customer-managed-encryption_creating-machineset-gcp[Enabling customer-managed encryption keys for a machine set]
43+
4044
// Removing; Proxy not supported for GCP IPI for 4.2
4145
// include::modules/installation-configure-proxy.adoc[leveloffset=+2]
4246

installing/installing_gcp/installing-gcp-network-customizations.adoc

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -46,6 +46,10 @@ include::modules/nw-install-config-parameters.adoc[leveloffset=+2]
4646

4747
include::modules/installation-gcp-config-yaml.adoc[leveloffset=+2]
4848

49+
== Additional resources
50+
51+
* xref:../../machine_management/creating_machinesets/creating-machineset-gcp.adoc#machineset-enabling-customer-managed-encryption_creating-machineset-gcp[Enabling customer-managed encryption keys for a machine set]
52+
4953
// Removing; Proxy not supported for GCP IPI for 4.2
5054
// include::modules/installation-configure-proxy.adoc[leveloffset=+2]
5155

installing/installing_gcp/installing-gcp-private.adoc

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -41,6 +41,10 @@ include::modules/installation-configuration-parameters.adoc[leveloffset=+2]
4141

4242
include::modules/installation-gcp-config-yaml.adoc[leveloffset=+2]
4343

44+
== Additional resources
45+
46+
* xref:../../machine_management/creating_machinesets/creating-machineset-gcp.adoc#machineset-enabling-customer-managed-encryption_creating-machineset-gcp[Enabling customer-managed encryption keys for a machine set]
47+
4448
include::modules/installation-configure-proxy.adoc[leveloffset=+2]
4549

4650
include::modules/installation-launching-installer.adoc[leveloffset=+1]

installing/installing_gcp/installing-gcp-vpc.adoc

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -35,6 +35,10 @@ include::modules/installation-configuration-parameters.adoc[leveloffset=+2]
3535

3636
include::modules/installation-gcp-config-yaml.adoc[leveloffset=+2]
3737

38+
== Additional resources
39+
40+
* xref:../../machine_management/creating_machinesets/creating-machineset-gcp.adoc#machineset-enabling-customer-managed-encryption_creating-machineset-gcp[Enabling customer-managed encryption keys for a machine set]
41+
3842
include::modules/installation-configure-proxy.adoc[leveloffset=+2]
3943

4044
include::modules/installation-launching-installer.adoc[leveloffset=+1]

modules/installation-configuration-parameters.adoc

Lines changed: 16 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -627,9 +627,14 @@ link:https://yaml.org/spec/1.2/spec.html#sequence//[YAML sequence].
627627
|For control plane machines, the ID of the project in which the KMS key ring exists. This value defaults to the VM project ID if not set.
628628
|The GCP project ID.
629629

630-
|`controlPlane.platform.gcp.osDisk.encryptionKey.kmsKeyServiceAccount`
631-
|The GCP Compute Engine System service account used for the encryption request for the given KMS key. The Compute Engine default service account is always used for control plane machines during installation, which follows this pattern: `service-<project_number>@compute-system.iam.gserviceaccount.com`. The default service account must have access to the KMS key specified for the control plane machines. The custom service account defined is available for use during post-installation operations. For more information on GCP service accounts, see Google's documentation on link:https://cloud.google.com/iam/docs/service-accounts#types[Types of service accounts].
632-
|The GCP Compute Engine System service account email, like `<service_account_name>@<project_id>.iam.gserviceaccount.com`.
630+
////
631+
`controlPlane.platform.gcp.osDisk.encryptionKey.kmsKeyServiceAccount`
632+
633+
The GCP Compute Engine System service account used for the encryption request for the given KMS key. The Compute Engine default service account is always used for control plane machines during installation, which follows this pattern: `service-<project_number>@compute-system.iam.gserviceaccount.com`. The default service account must have access to the KMS key specified for the control plane machines. The custom service account defined is available for use during post-installation operations. For more information on GCP service accounts, see Google's documentation on link:https://cloud.google.com/iam/docs/service-accounts#types[Types of service accounts].
634+
635+
The GCP Compute Engine System service account email, like `<service_account_name>@<project_id>.iam.gserviceaccount.com`.
636+
////
637+
// kmsKeyServiceAccount not yet fully supported in 4.7. Re-add when more stable.
633638

634639
|`compute.platform.gcp.osDisk.encryptionKey.kmsKey.name`
635640
|The name of the customer managed encryption key to be used for compute machine disk encryption.
@@ -647,9 +652,14 @@ link:https://yaml.org/spec/1.2/spec.html#sequence//[YAML sequence].
647652
|For compute machines, the ID of the project in which the KMS key ring exists. This value defaults to the VM project ID if not set.
648653
|The GCP project ID.
649654

650-
|`compute.platform.gcp.osDisk.encryptionKey.kmsKeyServiceAccount`
651-
|For compute machines, the GCP Compute Engine System service account used for the encryption request for the given KMS key. If left undefined, the Compute Engine default service account is used, which follows this pattern: `service-<project_number>@compute-system.iam.gserviceaccount.com`. For more information on GCP service accounts, see Google's documentation on link:https://cloud.google.com/iam/docs/service-accounts#types[Types of service accounts].
652-
|The GCP Compute Engine System service account email, like `<service_account_name>@<project_id>.iam.gserviceaccount.com`.
655+
////
656+
`compute.platform.gcp.osDisk.encryptionKey.kmsKeyServiceAccount`
657+
658+
For compute machines, the GCP Compute Engine System service account used for the encryption request for the given KMS key. If left undefined, the Compute Engine default service account is used, which follows this pattern: `service-<project_number>@compute-system.iam.gserviceaccount.com`. For more information on GCP service accounts, see Google's documentation on link:https://cloud.google.com/iam/docs/service-accounts#types[Types of service accounts].
659+
660+
The GCP Compute Engine System service account email, like `<service_account_name>@<project_id>.iam.gserviceaccount.com`.
661+
////
662+
// kmsKeyServiceAccount not yet fully supported in 4.7. Re-add when more stable.
653663
|====
654664

655665
endif::gcp[]

modules/installation-gcp-config-yaml.adoc

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,7 @@
11
// Module included in the following assemblies:
22
//
33
// * installing/installing_gcp/installing-gcp-customizations.adoc
4+
// * installing/installing_gcp/installing-gcp-network-customizations.adoc
45
// * installing/installing_gcp/installing-gcp-vpc.adoc
56
// * installing/installing_gcp/installing-gcp-private.adoc
67

@@ -50,7 +51,6 @@ controlPlane: <2>
5051
keyRing: test-machine-keys
5152
location: global
5253
projectID: project-id
53-
kmsKeyServiceAccount: openshift-service-account@openshift-gcp-project.iam.gserviceaccount.com
5454
replicas: 3
5555
compute: <2>
5656
- hyperthreading: Enabled <3>
@@ -70,7 +70,6 @@ compute: <2>
7070
keyRing: test-machine-keys
7171
location: global
7272
projectID: project-id
73-
kmsKeyServiceAccount: openshift-service-account@openshift-gcp-project.iam.gserviceaccount.com
7473
replicas: 3
7574
metadata:
7675
name: test-cluster <1>
@@ -124,7 +123,7 @@ endif::private[]
124123
====
125124
If you disable simultaneous multithreading, ensure that your capacity planning accounts for the dramatically decreased machine performance. Use larger machine types, such as `n1-standard-8`, for your machines if you disable simultaneous multithreading.
126125
====
127-
<5> Optional: The custom encryption key section to encrypt both virtual machines and persistent volumes.
126+
<5> Optional: The custom encryption key section to encrypt both virtual machines and persistent volumes. Your default compute service account must have the permissions granted to use your KMS key and have the correct IAM role assigned. The default service account name follows the `service-<project_number>@compute-system.iam.gserviceaccount.com` pattern. For more information on granting the correct permissions for your service account, see "Machine management" -> "Creating machine sets" -> "Creating a machine set on GCP".
128127
ifdef::vpc[]
129128
<6> If you use an existing VPC, specify its name.
130129
<7> If you use an existing VPC, specify the name of the existing subnet to deploy the control plane machines to. The subnet must belong to the VPC that you specified.

0 commit comments

Comments
 (0)