Adding KMS support
When you deploy the Hybrid Manager, the bootstrap kit configuration (values.yaml
) includes the capability of using passphrases or HashiCorp Vault keys for TDE implementation by default:
# - transparentDataEncryptionMethods: List of TDE Encryption Methods for the agent. # Supported options: passphrase, aws_kms, gcp_kms, hashicorp_vault. # Default values: passphrase, hashicorp_vault. transparentDataEncryptionMethods: - passphrase - hashicorp_vault
If you want to use a different Key Management System for TDE, you can edit this section during installation. Alternatively, you can add the key provider after installing the Hybrid Manager. In that case, you'll have to reapply the helm chart with the altered values.yaml
to populate the system with the new configuration.
See the installation guides for infrastructure-specific instructions on how to apply the helm chart.
HashiCorp Vault
The Hybrid Manager configuration includes support for HashiCorp out of the box.
AWS KMS
To use Amazon's KMS, Amazon Key Management Service, add aws_kms
to the list:
# - transparentDataEncryptionMethods: List of TDE Encryption Methods for the agent. # Supported options: passphrase, aws_kms, gcp_kms, hashicorp_vault. # Default values: passphrase, hashicorp_vault. transparentDataEncryptionMethods: - passphrase - hashicorp_vault - aws_kms
Google KMS
If you want to use Google's KMS, Cloud Key Management Service, add gcp_kms
to the list:
# - transparentDataEncryptionMethods: List of TDE Encryption Methods for the agent. # Supported options: passphrase, aws_kms, gcp_kms, hashicorp_vault. # Default values: passphrase, hashicorp_vault. transparentDataEncryptionMethods: - passphrase - hashicorp_vault - gcp_kms
Next steps
- On this page
- HashiCorp Vault
- AWS KMS
- Google KMS
- Next steps
← Prev
Enabling Key Management Systems for TDE
↑ Up
Enabling Key Management Systems for TDE
Next →
HashiCorp Vault
Could this page be better? Report a problem or suggest an addition!