You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/aks/azure-disk-customer-managed-keys.md
+3-29Lines changed: 3 additions & 29 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,7 +3,7 @@ title: Use a customer-managed key to encrypt Azure disks in Azure Kubernetes Ser
3
3
description: Bring your own keys (BYOK) to encrypt AKS OS and Data disks.
4
4
ms.topic: article
5
5
ms.custom: devx-track-azurecli
6
-
ms.date: 07/18/2022
6
+
ms.date: 05/10/2023
7
7
---
8
8
9
9
# Bring your own keys (BYOK) with Azure disks in Azure Kubernetes Service (AKS)
@@ -93,39 +93,13 @@ az aks create -n myAKSCluster -g myResourceGroup --node-osdisk-diskencryptionset
93
93
94
94
When new node pools are added to the cluster created above, the customer-managed key provided during the create process is used to encrypt the OS disk.
95
95
96
-
## Encrypt your AKS cluster data disk(optional)
96
+
## Encrypt your AKS cluster data disk
97
97
98
-
OS disk encryption key is used to encrypt the data disk if the key isn't provided for data disk from AKS version 1.17.2. You can also encrypt AKS data disks with your other keys.
98
+
If you have already provided a disk encryption set during cluster creation, encrypting data disks with the same disk encryption set is the default option. Therefore, this step is optional. However, if you want to encrypt data disks with a different disk encryption set, you can follow these steps.
99
99
100
100
> [!IMPORTANT]
101
101
> Ensure you have the proper AKS credentials. The managed identity needs to have contributor access to the resource group where the diskencryptionset is deployed. Otherwise, you'll get an error suggesting that the managed identity does not have permissions.
102
102
103
-
```azurecli-interactive
104
-
# Retrieve your Azure Subscription Id from id property as shown below
105
-
az account list
106
-
```
107
-
108
-
The following example resembles output from the command:
Create a file called **byok-azure-disk.yaml** that contains the following information. Replace *myAzureSubscriptionId*, *myResourceGroup*, and *myDiskEncrptionSetName* with your values, and apply the yaml. Make sure to use the resource group where your DiskEncryptionSet is deployed.
0 commit comments