Manage regions
Application Integration isregional, which means the infrastructure that runs your integrations is located in a specific region, and Google manages it so that it is available redundantly acrossall of the zones within that region. Apart from selecting the initial provisioning region for Application Integration during thesetup process, you can also enable or provision new regions to create and manage your integrations within the same Google Cloud project.
This page describes the steps needed to successfully provision a new Application Integration region and edit an existing region in your Google Cloud project.
Before you begin
Enable the following APIs:
- Application Integration API (
integrations.googleapis.com) - Connectors API (
connectors.googleapis.com)
Provision new region
To provision a new region for Application Integration in your Google Cloud project, select one of the following options:
Console
- Go to theApplication Integration page.
- In the navigation menu, clickRegions
TheRegions page appears listing all the regions provisioned in your project.
- ClickProvision new region.
- Configure the following fields in theProvision new region page:
- Region: Select the new regional location that you want to provision.
For information about the supported Application Integration regions, seeApplication Integration locations.
- Advanced settings: Optionally, expand this section to enable or disable the HTTP access for integrations and configure theencryption method for the selected region.
- HTTP: Click theEnable HTTP toggle to enable HTTP access for integrations within the selected region. When enabled, integrations in this region can be accessed over HTTP.Note: The HTTP toggle is disabled by default to ensure all integrations are invoked securely over HTTPS.
- AI features: Click theEnable AI features toggle to enable AI features in the selected region. For more information about troubleshooting using Gemini AI, seeTroubleshoot failed execution logs using AI.
- Encryption: Select the encryption method for the selected region. There are two options:
- Google-owned and Google-managed encryption key: This is the default encryption method. Use this method if you want Google to manage the encryption keys that protect your data in the selected region.
- Customer-managed encryption key (CMEK): Use this method if you want to manage the encryption keys that protect your data in the selected region.Caution: Enabling CMEK encryption for an Application Integration region cannot be undone. This also means that you can't change/switch the encryption method for a region once CMEK is enabled.
When configuring your encryption settings, you have two options for managing CMEK: Application Integration and Connectors (CMEK), and Use a different CMEK for Integration Connectors, as follows:
- Application Integration and Connectors - CMEK: This is the default option and is suitable if you want to use the same encryption key for both Application Integration and Integration Connectors. To use this option, perform the following steps:
- ClickSelect a Cloud KMS key and choose an existing CMEK key available in the selected region. You can also create a new key or use the KMS resource ID of your existing key.
- ClickVerify to check if your default service account has CryptoKey access to the selected CMEK key.
- If the verification fails, clickGrant to assign the CryptoKey Encrypter/Decrypter IAM role to the default service account.
- Use different CMEK for Integration Connectors: Select this checkbox if you prefer to use separate encryption keys for Application Integration and Integration Connectors. If selected, the following options appear:
- Application Integration - CMEK
- ClickSelect a Cloud KMS key and choose an existing CMEK key for Application Integration in the selected region. Alternatively, you can create a new key or use the Key resource ID of an existing one.
- ClickVerify to finish setting up CMEK for Application Integration.
- Integration Connectors - CMEK
- ClickSelect a Cloud KMS key and choose an existing CMEK key for Integration Connectors in the selected region. Alternatively, you can create a new key or use the Key resource ID of an existing key.
- ClickVerify to check if your default service account has CryptoKey access to the selected CMEK.
- If the verification for the selected CMEK key fails, clickGrant to assign the CryptoKey Encrypter/Decrypter IAM role to the default service account.
- Application Integration - CMEK
For more information about CMEK, seeCustomer-managed encryption keys.
- Application Integration and Connectors - CMEK: This is the default option and is suitable if you want to use the same encryption key for both Application Integration and Integration Connectors. To use this option, perform the following steps:
- Region: Select the new regional location that you want to provision.
- ClickDone.
Terraform
Use thegoogle_integrations_client resource. The following example provisions theus-east1 region:
resource "random_id" "default" { byte_length = 8}resource "google_kms_key_ring" "default" { name = "${random_id.default.hex}-example-keyring" location = "us-east1"}resource "google_kms_crypto_key" "default" { name = "crypto-key-example" key_ring = google_kms_key_ring.default.id rotation_period = "7776000s"}resource "google_kms_crypto_key_version" "default" { crypto_key = google_kms_crypto_key.default.id}resource "google_service_account" "default" { account_id = "service-account-id" display_name = "Service Account"}resource "google_integrations_client" "example" { location = "us-east1" create_sample_integrations = true run_as_service_account = google_service_account.default.email cloud_kms_config { kms_location = "us-east1" kms_ring = basename(google_kms_key_ring.default.id) key = basename(google_kms_crypto_key.default.id) key_version = basename(google_kms_crypto_key_version.default.id) kms_project_id = data.google_project.default.project_id }}Edit region
You can edit an existing region to enable or disable integration governance, and to update thedata encryption method for the region.
Caution:Enabling CMEK encryption for an Application Integration region cannot be undone. This also means that you can't change the encryption method for a region if CMEK is already enabled.To edit an existing region in Application Integration, perform the following steps:
- In the Google Cloud console, go to theApplication Integration page.
- In the navigation menu, clickRegions.
- For the existing region that you want to edit, in theActions column, clickRegion actions and selectEdit.
TheEdit region pane appears.
- ExpandAdvanced settings.
- To enable or disable integration governance for the selected region, click theEnable governance toggle.Note:
- Enable governance to make service account authentication mandatory for the region. Once governance is enabled, you must manually add a service account to all the new integrations and integration versions created in this region. You can change or update the service account details of an integration any time from theIntegration settings pane in the integration toolbar.
If governance is enabled, you can publish or test an integration only when a service account is attached to it.
- If you disable governance for the selected region, then all the existing published integrations continue to use their respective attached service accounts until a new version of the integrations is created.
- Enable governance to make service account authentication mandatory for the region. Once governance is enabled, you must manually add a service account to all the new integrations and integration versions created in this region. You can change or update the service account details of an integration any time from theIntegration settings pane in the integration toolbar.
- To enable or disable HTTP access for integrations in the selected region, click theEnable HTTP toggle. When enabled, integrations in this region can be accessed over HTTP.
- To enable or disable AI features for integrations in the selected region, click theEnable AI features toggle. When enabled, you can use AI features like troubleshooting using Gemini AI in the selected region.
- To enable masking for variables, in theVariable Masking section, click theEnable Variable Masking in logs toggle. This feature is inpreview.
For information about masking, seeMask sensitive data in logs.
- To enable CMEK encryption for selected region, selectCustomer-managed encryption key (CMEK), and do the following:
- Select a CMEK from the available drop-down list. The CMEKs listed in the drop-down are based on the provisioned region. To create a new key, seeCreate new CMEK.
- ClickVerify to check if your default service account has CryptoKey access to the selected CMEK.
- If the verification for the selected CMEK fails, clickGrant to assign theCryptoKey Encrypter/Decrypter IAM role to the default service account.
- To enable CMEK encryption for Integration Connectors, selectUse different CMEK for Integration connectors, and do the following:
- Select a CMEK from the available drop-down list. The CMEKs listed in the drop-down are based on the provisioned region. To create a new key, seeCreate new CMEK.
- ClickVerify to finish setting up Integration Connectors CMEK.
- ClickDone to complete editing the region.
TheRegions page appears, listing the provisioned regions in Application Integration.
Except as otherwise noted, the content of this page is licensed under theCreative Commons Attribution 4.0 License, and code samples are licensed under theApache 2.0 License. For details, see theGoogle Developers Site Policies. Java is a registered trademark of Oracle and/or its affiliates.
Last updated 2026-02-19 UTC.