In this step, depending on your specific user journey, you specify hosting locations for your Apigee analytics or control plane, runtime and dataplane instances, and API consumer data region. You also specify encryption key selections.
The difference between each of the user journeys is the selection or creation of encryption keys, whether they are managed by Google or the customer, and whether data residency is enabled or not.
The following keys are used during organization creation:
Encryption key
Description
Control plane key
Encrypts Analytics data that is stored within BigQuery in Apigee tenant project.
Encrypts API proxies, Target Servers, Truststores and Keystores and anything else shared across runtimes.
API consumer data key
Encrypts service infrastructure data. This is required to be a region within the control plane location.
Runtime database key
Encrypts application data such as KVMs, cache, and client secrets, which is then stored in the database.
The following key is used during each instance creation:
Encryption key
Description
Runtime disk key
Encrypts KVMs; environment cache; quota buckets and counters.
Encrypts KMS data API products, developers, developer apps, OAuth tokens (including access tokens, refresh tokens, and authorization codes), and API keys.
Perform the step
Permissions required for this task
You can give the Apigee provisioner a predefined role that includes the permissions needed to complete this task, or give more fine-grained permissions to provide the least privilege necessary. See Predefined roles and Runtime instance permissions.
To view the steps for your specific user journey, select one of the following user journeys. They are listed in order of complexity, with the easiest being user journey A.
View user journey flow diagram
The following diagram shows the possible user journeys to configure hosting and encryption for a Pay-as-you-go organization using the Cloud console.
The user journeys are noted A through F and are ordered easy to complex, where A is the easiest, and F is the most complex.
Want to store your core content and processing in the same geographic region
User journey A: Google-managed encryption, no data residency
In Step 3, the console displays a list of hosting and encryption configuration options and their default values. You can accept the default configuration, or click createEdit to open the Hosting and encryption keys panel.
In the Encryption type section, select Google-managed encryption key. This is a Google-managed, server-side encryption key used to encrypt your Apigee instances and data before it is written to disk.
Click Next.
In the Control Plane section:
Clear the Enable data residency box.
From the Analytics region drop-down list, select the physical location where you want your analytics data stored. For a list of available Apigee API Analytics regions, see Apigee locations.
Click Confirm.
In the Runtime section:
From the Runtime hosting region drop-down list, select the region in which you want your instance hosted.
Under Runtime database encryption key, Google-managed is listed as the encryption type.
Under Runtime disk encryption key, Google-managed is listed as the encryption type.
User journey B: Google-managed encryption, with data residency
In Step 3, the console displays a list of hosting and encryption configuration options and their default values. You can accept the default configuration, or click createEdit to open the Hosting and encryption keys panel.
In the Encryption type section, select Google-managed encryption key. This is a Google-managed, server-side encryption key used to encrypt your Apigee instances and data before it is written to disk.
Click Next.
In the Control Plane section:
Select the Enable data residency box.
From the Control plane hosting jurisdiction drop-down list that displays, select the physical location where you want your data stored.
From the Control plane encryption key drop-down list, select or create a key for data stored and replicated across runtime locations.
Click Grant if prompted.
In the API consumer data region section:
From the API consumer data region drop-down list, select the physical location where you want your data stored. For a list of available consumer data regions, see Apigee locations.
Under API consumer data encryption key, Google-managed is listed as the encryption type.
Click Confirm.
In the Runtime section:
From the Runtime hosting region drop-down list, select the region in which you want your instance hosted. For a list of available runtime regions, see Apigee locations. When using data residency, the runtime location must be within the control plane region.
Under Runtime database encryption key, Google-managed is listed as the encryption type.
Under Runtime disk encryption key, Google-managed is listed as the encryption type.
User Journey C: Customer-managed encryption, no data residency
In Step 3, the console displays a list of hosting and encryption configuration options and their default values. You can accept the default configuration, or click createEdit to open the Hosting and encryption keys panel.
In the Encryption type section, select Customer-managed encryption key (CMEK). This is a user-managed, server-side encryption key used to encrypt your Apigee instances and data before it is written to disk.
Click Next.
In the Control Plane section:
Clear the Enable data residency box.
From the Analytics region drop-down list, select the physical location where you want your analytics data stored. For a list of available Apigee API Analytics regions, see Apigee locations.
Click Confirm.
In the Runtime section:
From the Runtime hosting region drop-down list, select the region in which you want your instance hosted.
From the Runtime database encryption key drop-down list, select or create a key for data stored and replicated across runtime locations.
Click Grant if prompted.
From the Runtime disk encryption key, drop-down list, select or create a key for runtime instance data before it is written to disk. Each instance has its own disk encryption key.
User journey D: Customer-managed encryption, with data residency
In Step 3, the console displays a list of hosting and encryption configuration options and their default values. You can accept the default configuration, or click createEdit to open the Hosting and encryption keys panel.
In the Encryption type section, select Customer-managed encryption key (CMEK). This is a user-managed, server-side encryption key used to encrypt your Apigee instances and data before it is written to disk.
Click Next.
In the Control Plane section:
Select the Enable data residency box.
From the Control plane hosting jurisdiction drop-down list that displays, select the physical location where you want your data stored.
From the Control plane encryption key drop-down list, select or create a key for data stored and replicated across runtime locations.
Click Grant if prompted.
In the API consumer data region section:
From the API consumer data region drop-down list, select the physical location where you want your data stored. For a list of available consumer data regions, see Apigee locations.
From the API consumer data encryption key drop-down list, select or create a key for data stored for the control plane.
Click Grant if prompted.
Click Confirm.
In the Runtime section:
From the Runtime hosting region drop-down list, select the region in which you want your instance hosted. When using data residency, the runtime location must be within the control plane region.
From the Runtime database encryption key drop-down list, select or create a key for data stored and replicated across runtime locations.
Click Grant if prompted.
From the Runtime disk encryption key, drop-down list, select or create a key for runtime instance data before it is written to disk. Each instance has its own disk encryption key.
Select a key ring, or if one doesn't exist, enable Create key ring and enter a key ring name and pick your key ring location. Key ring names can contain letters, numbers, underscores (_), and hyphens (-). Key rings can't be renamed or deleted.
Click Continue.
Create a key. Enter a name and protection level. Note that key names can contain letters, numbers, underscores (_), and hyphens (-). Keys can't be renamed or deleted. For protection level, Software is a good choice. This is the same default used by Cloud KMS; however, you can change it if you wish.
[[["Easy to understand","easyToUnderstand","thumb-up"],["Solved my problem","solvedMyProblem","thumb-up"],["Other","otherUp","thumb-up"]],[["Hard to understand","hardToUnderstand","thumb-down"],["Incorrect information or sample code","incorrectInformationOrSampleCode","thumb-down"],["Missing the information/samples I need","missingTheInformationSamplesINeed","thumb-down"],["Other","otherDown","thumb-down"]],["Last updated 2025-04-24 UTC."],[[["This content guides users through configuring hosting locations and encryption settings for Apigee, specifically excluding Apigee hybrid."],["Users must select between Google-managed or customer-managed encryption keys, and can optionally enable data residency, which determines where core content and processing are stored."],["There are four main user journeys (A-D) detailed, varying in complexity and covering combinations of Google or customer-managed encryption and the presence or absence of data residency."],["During the process, users will define locations for analytics data, control plane hosting, and runtime instances, as well as select or create encryption keys for various components like the control plane, API consumer data, runtime databases, and disks."],["The selections for hosting region and encryption keys are final upon submission, and cannot be changed later."]]],[]]