- 필수 기능
- 시작하기
- Glossary
- 표준 속성
- Guides
- Agent
- 통합
- 개방형텔레메트리
- 개발자
- API
- Datadog Mobile App
- CoScreen
- Cloudcraft
- 앱 내
- 서비스 관리
- 인프라스트럭처
- 애플리케이션 성능
- APM
- Continuous Profiler
- 스팬 시각화
- 데이터 스트림 모니터링
- 데이터 작업 모니터링
- 디지털 경험
- 소프트웨어 제공
- 보안
- AI Observability
- 로그 관리
- 관리
When you use Dataproc, cluster and job data is stored on Persistent Disks (PDs) associated with the Compute Engine VMs in your cluster and in a Cloud Storage staging bucket. This PD and bucket data is encrypted using a Google-generated data encryption key (DEK) and key encryption key (KEK). The CMEK feature allows you to create, use, and revoke the key encryption key (KEK). Google still controls the data encryption key (DEK).
Cloud services offer the ability to protect data related to those services using encryption keys managed by the customer within Cloud KMS. These encryption keys are called customer-managed encryption keys (CMEK). When customers protect data in Google Cloud services with CMEK, the CMEK key is within the customer’s control.
serviceAccount:service-<project_number>@compute-system.iam.gserviceaccount.com
).Before creating a cluster, ensure that the selected KMS Key has the Cloud KMS CryptoKey
Encrypter/Decrypter role assigned to the Dataproc Cluster service account
(serviceAccount:service-<project_number>@compute-system.iam.gserviceaccount.com
).
Run the clusters create
command to create a new cluster with a customer-managed key:
gcloud dataproc clusters create <cluster_name> --region=us-central1 --gce-pd-kms-key=<key_resource_name>
The above command creates a new cluster in the selected region.
After the cluster is created, migrate all your workloads from the older cluster to the new
cluster and run the clusters delete
command to delete the cluster:
gcloud dataproc clusters delete <cluster_name> --region=us-central1
Repeat step no. 1 to create a new Dataproc cluster. Change the project by running the following command and repeat the remediation procedure for other projects:
gcloud config set project <project_ID>