Create One Private Endpoint for Encryption at Rest Using Customer Key Management for One Cloud Provider in One Project
Creates a private endpoint in the specified region for encryption at rest using customer key management.
Path parameters
-
Unique 24-hexadecimal digit string that identifies your project. Use the /groups endpoint to retrieve all projects to which the authenticated user has access.
NOTE: Groups and projects are synonymous terms. Your group id is the same as your project id. For existing groups, your group/project id remains the same. The resource and corresponding endpoints use the term groups.
Format should match the following pattern:
^([a-f0-9]{24})$. -
Human-readable label that identifies the cloud provider for the private endpoint to create.
Values are
AZUREorAWS.
Query parameters
-
Flag that indicates whether Application wraps the response in an
envelopeJSON object. Some API clients cannot access the HTTP response headers or status code. To remediate this, set envelope=true in the query. Endpoints that return a list of results use the results object as an envelope. Application adds the status parameter to the response body.Default value is
false. -
Flag that indicates whether the response body should be in the prettyprint format.
Default value is
false.Prettyprint
atlas api encryptionAtRestUsingCustomerKeyManagement createRestPrivateEndpoint --help import ( "os" "context" "log" sdk "go.mongodb.org/atlas-sdk/v20241023001/admin" ) func main() { ctx := context.Background() clientID := os.Getenv("MONGODB_ATLAS_CLIENT_ID") clientSecret := os.Getenv("MONGODB_ATLAS_CLIENT_SECRET") // See https://dochub.mongodb.org/core/atlas-go-sdk-oauth client, err := sdk.NewClient(sdk.UseOAuthAuth(clientID, clientSecret)) if err != nil { log.Fatalf("Error: %v", err) } params = &sdk.CreateGroupEncryptionAtRestPrivateEndpointApiParams{} sdkResp, httpResp, err := client.EncryptionatRestusingCustomerKeyManagementApi. CreateGroupEncryptionAtRestPrivateEndpointWithParams(ctx, params). Execute() } curl --include --header "Authorization: Bearer ${ACCESS_TOKEN}" \ --header "Accept: application/vnd.atlas.2024-10-23+json" \ --header "Content-Type: application/json" \ -X POST "https://cloud.mongodb.com/api/atlas/v2/groups/{groupId}/encryptionAtRest/{cloudProvider}/privateEndpoints" \ -d '{ <Payload> }' curl --user "${PUBLIC_KEY}:${PRIVATE_KEY}" \ --digest --include \ --header "Accept: application/vnd.atlas.2024-10-23+json" \ --header "Content-Type: application/json" \ -X POST "https://cloud.mongodb.com/api/atlas/v2/groups/{groupId}/encryptionAtRest/{cloudProvider}/privateEndpoints" \ -d '{ <Payload> }' { "regionName": "US_CENTRAL", "cloudProvider": "AZURE" } { "regionName": "US_CENTRAL", "cloudProvider": "AWS" } { "cloudProvider": "AZURE", "errorMessage": "string", "id": "32b6e34b3d91647abb20e7b8", "regionName": "US_CENTRAL", "status": "INITIATING", "privateEndpointConnectionName": "string" } { "cloudProvider": "AWS", "errorMessage": "string", "id": "32b6e34b3d91647abb20e7b8", "regionName": "US_CENTRAL", "status": "INITIATING", "privateEndpointConnectionName": "string" } { "error": 401, "detail": "(This is just an example, the exception may not be related to this endpoint)", "reason": "Unauthorized", "errorCode": "NOT_ORG_GROUP_CREATOR" } { "error": 403, "detail": "(This is just an example, the exception may not be related to this endpoint)", "reason": "Forbidden", "errorCode": "CANNOT_CHANGE_GROUP_NAME" } { "error": 404, "detail": "(This is just an example, the exception may not be related to this endpoint) Cannot find resource AWS", "reason": "Not Found", "errorCode": "RESOURCE_NOT_FOUND" } { "error": 500, "detail": "(This is just an example, the exception may not be related to this endpoint)", "reason": "Internal Server Error", "errorCode": "UNEXPECTED_ERROR" }