Reputation: 131
I aim to enable Application Level Encryption on my GKE cluster. I am using a custom service account (with required permissions to Encrypt/Decrypt a KMS key) to create this cluster, but it still asks me to grant Encrypt/Decrypt permissions to my Kubernetes service agent account(SA that gets created when you enable the Kubernetes API on the GCP project).
Error: The service-xxxxxxxxxxxxx@container-engine-robot.iam.gserviceaccount.com service account does not have permissions to encrypt/decrypt with the selected key.
Upvotes: 0
Views: 263
Reputation: 4909
This is required because the master will also need to be able to decrypt. There is no way for you to use your custom service account on the GKE master node.
Upvotes: 2