Skip to content

Instantly share code, notes, and snippets.

View davidcueva's full-sized avatar

David G. Cueva Tello davidcueva

  • Google
View GitHub Profile
gcloud services enable dataproc.googleapis.com sqladmin.googleapis.com \
cloudkms.googleapis.com
export PROJECT_ID=$(gcloud info --format='value(config.project)')
export REGION=us-central1
export ZONE=us-central1-b
gcloud iam service-accounts create visualization-security-sa \
--description="Used by products in visualization security" \
--display-name="Visualization security service account"
bash -c 'array=( dataproc.worker cloudsql.editor cloudkms.cryptoKeyDecrypter )
for i in "${array[@]}"
do
gcloud projects add-iam-policy-binding ${PROJECT_ID} \
--member "serviceAccount:visualization-security-sa@${PROJECT_ID}.iam.gserviceaccount.com" \
--role roles/$i
done'
export CLOUD_SQL_NAME=cloudsql-mysql
gcloud sql instances create ${CLOUD_SQL_NAME} \
--tier=db-n1-standard-1 --region=${REGION}
gcloud sql users set-password root \
--host=% --instance ${CLOUD_SQL_NAME} --password mysql-root-password-99
gcloud kms keyrings create my-keyring --location global
gcloud kms keys create my-key \
--location global \
--keyring my-keyring \
--purpose encryption
echo "ranger-admin-password-99" | \
gcloud kms encrypt \
--location=global \
--keyring=my-keyring \
--key=my-key \
--plaintext-file=- \
--ciphertext-file=ranger-admin-password.encrypted
echo "ranger-db-admin-password-99" | \
gcloud kms encrypt \
--location=global \
--keyring=my-keyring \
--key=my-key \
--plaintext-file=- \
--ciphertext-file=ranger-db-admin-password.encrypted