Tetap teratur dengan koleksi
Simpan dan kategorikan konten berdasarkan preferensi Anda.
Appliance air-gapped Google Distributed Cloud (GDC) memiliki penyedia penyimpanan yang ditentukan software dengan sistem autentikasinya sendiri, di mana setiap identitas (layanan inti atau klien) memiliki nama dan kunci terkait.
Dokumen ini menjelaskan langkah-langkah untuk merotasi kunci autentikasi yang harus dilakukan untuk:
rotasi kunci yang dijadwalkan secara rutin untuk memastikan bahwa perangkat tersebut mematuhi dan
aman.
paparan kunci. Anda harus merotasi kunci yang terekspos sesegera mungkin.
[[["Mudah dipahami","easyToUnderstand","thumb-up"],["Memecahkan masalah saya","solvedMyProblem","thumb-up"],["Lainnya","otherUp","thumb-up"]],[["Sulit dipahami","hardToUnderstand","thumb-down"],["Informasi atau kode contoh salah","incorrectInformationOrSampleCode","thumb-down"],["Informasi/contoh yang saya butuhkan tidak ada","missingTheInformationSamplesINeed","thumb-down"],["Masalah terjemahan","translationIssue","thumb-down"],["Lainnya","otherDown","thumb-down"]],["Terakhir diperbarui pada 2025-09-04 UTC."],[[["\u003cp\u003eGoogle Distributed Cloud (GDC) air-gapped appliance utilizes a software-defined storage provider with its own authentication system for core services and clients.\u003c/p\u003e\n"],["\u003cp\u003eAuthentication keys for the GDC air-gapped appliance should be rotated regularly for security and compliance.\u003c/p\u003e\n"],["\u003cp\u003eExposed authentication keys for the GDC air-gapped appliance must be rotated immediately.\u003c/p\u003e\n"],["\u003cp\u003eKey rotation for GDC air-gapped appliance requires SSH access to the three nodes and \u003ccode\u003ekubectl\u003c/code\u003e access to the root admin cluster.\u003c/p\u003e\n"]]],[],null,["# Rotate storage authentication keys\n\nGoogle Distributed Cloud (GDC) air-gapped appliance has a software-defined storage provider with its own authentication system where each identity (core service or client) has an associated name and a key.\n\nThis document describes the steps to rotate the authentication keys that must be performed\nfor:\n\n- regularly scheduled key rotation to ensure that the device is compliant and secure.\n- key exposure. You should rotate the exposed key as soon as possible.\n\nBefore you begin\n----------------\n\nComplete the following steps:\n\n1. You meet the [laptop prerequisites](/distributed-cloud/hosted/docs/latest/appliance/admin/laptop).\n2. You are able to SSH into the three nodes and execute software-defined storage CLI commands.\n3. You are able to log as admin in to the root admin cluster via `kubectl`.\n\nKey locations\n-------------\n\nContent restricted to approved operating partners. Contact your account manager for access to this page.\n\n\u003cbr /\u003e"]]