mirror of
https://github.com/grafana/grafana.git
synced 2025-02-25 18:55:37 -06:00
* Use relative aliases for all non-current Grafana aliases Prevents non-latest documentation "stealing" the page away from latest and through permanent redirects for latest pages that no longer exist. The redirected pages are indexed by search engines but our robots.txt forbids them crawling the non-latest page. Signed-off-by: Jack Baldry <jack.baldry@grafana.com> * Remove aliases from shared pages Signed-off-by: Jack Baldry <jack.baldry@grafana.com> * Rewrite all current latest aliases to be next Signed-off-by: Jack Baldry <jack.baldry@grafana.com> * Fix typo in latest alias Signed-off-by: Jack Baldry <jack.baldry@grafana.com> * Remove all current page aliases find docs/sources -type f -name '*.md' -exec sed -z -i 's#\n *- /docs/grafana/next/[^\n]*\n#\n#' {} \; find docs/sources -type f -name '*.md' -exec sed -Ez -i 's#\n((aliases:\n *-)|aliases:\n)#\n\2#' {} \; Signed-off-by: Jack Baldry <jack.baldry@grafana.com> * Prettier Signed-off-by: Jack Baldry <jack.baldry@grafana.com> Signed-off-by: Jack Baldry <jack.baldry@grafana.com>
72 lines
4.3 KiB
Markdown
72 lines
4.3 KiB
Markdown
---
|
||
aliases:
|
||
- ../../../enterprise/enterprise-encryption/using-google-cloud-kms-to-encrypt-database-secrets/
|
||
description: Learn how to use Google Cloud KMS to encrypt secrets in the Grafana database.
|
||
title: Encrypt database secrets using Google Cloud KMS
|
||
weight: 100
|
||
---
|
||
|
||
# Encrypt database secrets using Google Cloud KMS
|
||
|
||
You can use an encryption key from Google Cloud Key Management Service to encrypt secrets in the Grafana database.
|
||
|
||
**Prerequisites:**
|
||
|
||
- A Google Cloud account with permission to list and create KMS keys and service accounts to access those keys
|
||
- Access to the Grafana [configuration]({{< relref "../../../configure-grafana/#config-file-locations" >}}) file
|
||
|
||
1. [Create a key ring](https://cloud.google.com/kms/docs/creating-keys#kms-create-key-ring-console) in Google Cloud KMS.
|
||
|
||
2. [Create a symmetric encryption key](https://cloud.google.com/kms/docs/creating-keys#create_a_key) in the key ring.
|
||
|
||
3. [Create a service account](https://cloud.google.com/iam/docs/creating-managing-service-accounts#creating) and assign it a role: it can be a predefined role or custom role with permissions to encrypt and decrypt secrets with Key Management Service.
|
||
|
||
4. [Create a service account key and save its JSON file](https://cloud.google.com/iam/docs/creating-managing-service-account-keys#creating) to you computer, for example, as `~/.config/gcloud/sample-project-credentials.json`.
|
||
|
||
5. From within Grafana, turn on [envelope encryption]({{< relref "/#envelope-encryption" >}}).
|
||
|
||
6. Add your Google Cloud KMS details to the Grafana configuration file; depending on your operating system, is usually named `grafana.ini`:
|
||
<br><br>a. Add a new section to the configuration file, with a name in the format of `[security.encryption.azurekv.<KEY-NAME>]`, where `<KEY-NAME>` is any name that uniquely identifies this key among other provider keys.
|
||
<br><br>b. Fill in the section with the following values:
|
||
<br>
|
||
|
||
- `key_id`: encryption key ID, refer to [Getting the ID for a Key](https://cloud.google.com/kms/docs/getting-resource-ids#getting_the_id_for_a_key_and_version).
|
||
- `credentials_file`: full path to service account key JSON file on your computer.
|
||
|
||
An example of a Google Cloud KMS provider section in the `grafana.ini` file is as follows:
|
||
|
||
```
|
||
# Example of Google Cloud KMS provider setup
|
||
;[security.encryption.googlekms.example-encryption-key]
|
||
# Google Cloud KMS key ID
|
||
key_id = 1234abcd-12ab-34cd-56ef-1234567890ab
|
||
# Full path to a JSON file with a service account key
|
||
credentials_file = ~/.config/gcloud/sample-project-credentials.json
|
||
```
|
||
|
||
7. Update the `[security]` section of the `grafana.ini` configuration file with the new Encryption Provider key that you created:
|
||
|
||
```
|
||
[security]
|
||
# previous encryption key, used for legacy alerts, decrypting existing secrets or used as default provider when external providers are not configured
|
||
secret_key = AaaaAaaa
|
||
# encryption provider key in the format <PROVIDER>.<KEY-NAME>
|
||
encryption_provider = googlekms.example-encryption-key
|
||
# list of configured key providers, space separated
|
||
available_encryption_providers = googlekms.example-encryption-key
|
||
```
|
||
|
||
**> Note:** The encryption key stored in the `secret_key` field is still used by Grafana’s legacy alerting system to encrypt secrets. Do not change or remove that value.
|
||
|
||
8. [Restart Grafana](https://grafana.com/docs/grafana/latest/installation/restart-grafana/).
|
||
|
||
9. (Optional) From the command line and the root directory of Grafana Enterprise, re-encrypt all of the secrets within the Grafana database with the new key using the following command:
|
||
|
||
`grafana-cli admin secrets-migration re-encrypt`
|
||
|
||
If you do not re-encrypt existing secrets, then they will remain encrypted by the previous encryption key. Users will still be able to access them.
|
||
|
||
**> Note:** This process could take a few minutes to complete, depending on the number of secrets (such as data sources or alert notification channels) in your database. Users might experience errors while this process is running, and alert notifications might not be sent.
|
||
|
||
**> Note:** If you are updating this encryption key during the initial setup of Grafana before any data sources, alert notification channels, or dashboards have been created, then this step is not necessary because there are no secrets in Grafana to migrate.
|