Install on GKE (import test)

gcloud services enable \
    cloudapis.googleapis.com \
    cloudkms.googleapis.com \
    cloudresourcemanager.googleapis.com \
    cloudshell.googleapis.com \
    container.googleapis.com \
    containerregistry.googleapis.com \
    iam.googleapis.com


gcloud iam service-accounts create vault-server \
    --display-name "vault service account"

gcloud kms keyrings create import-test \
  --location us-east1

gcloud kms keys create import-key \
  --location us-east1 \
  --keyring import-test \
  --purpose encryption \
  --skip-initial-version-creation \
  --import-only

#Create the import job

gcloud kms import-jobs create import-job \
  --location us-east1 \
  --keyring import-test \
  --import-method rsa-oaep-3072-sha1-aes-256 \
  --protection-level software

#Checking the state of the import job

gcloud kms import-jobs describe import-job2 \
  --location us-east1 \
  --keyring import-test \
  --format="value(state)"

#Import key

gcloud kms keys versions import \
  --import-job import-job2 \
  --location us-east1 \
  --keyring import-test \
  --key import-key \
  --algorithm google-symmetric-encryption \
  --target-key-file /home/den/test.bin

gcloud kms keys versions list \
  --keyring import-test \
  --location us-east1 \
  --key import-key

gcloud kms keys set-primary-version import-key --version=1 --keyring=import-test --location=us-east1

gcloud kms keys add-iam-policy-binding import-key \
    --location us-east1 \
    --keyring import-test \
    --member serviceAccount:vault-server@import-326514.iam.gserviceaccount.com \
    --role roles/cloudkms.admin \
    --role roles/cloudkms.cryptoKeyEncrypterDecrypter \
    --project import-326514

gcloud container clusters create vault \
    --cluster-version 1.19 \
    --enable-autorepair \
    --enable-autoupgrade \
    --enable-ip-alias \
    --machine-type n1-standard-1 \
    --node-version 1.19 \
    --num-nodes 1 \
    --region us-east1 \
    --scopes cloud-platform \
    --service-account "vault-server@import-326514.iam.gserviceaccount.com"

Recovery Key 1: 6i0u5wYvVymunqEM8tp0wEQ63qE6lHspmHrueFdv+dfE
Recovery Key 2: La59N73DxEZcb2UStumRG4u9KSmieiyTTE2klqAcjmwL
Recovery Key 3: Ou9G8DE0LcQ0ZU9NH+yY7AF9tCieL/TAXGhZMK0WvxD+
Recovery Key 4: HLnWrCdV2oOmbPQEjnmEwY8E+DPBcfLr5kdR4aW64x+0
Recovery Key 5: DpSCi+fa2/rmhFYVGFAMhEQ/4IzrV2J43holzbY5J7tC

Initial Root Token: s.U2keOIOlFttwTjv9U5LDeMxY


export VAULT_TOKEN=s.U2keOIOlFttwTjv9U5LDeMxY


Error unsealing: Error making API request.

URL: PUT https://127.0.0.1:8200/v1/sys/unseal
Code: 500. Errors:
* failed to decrypt encrypted stored keys: failed to decrypt envelope: rpc error: code = InvalidArgument desc = Decryption failed: verify that 'name' refers to the correct CryptoKey.

Last updated

Was this helpful?