You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/aks/use-kms-etcd-encryption.md
+9-8Lines changed: 9 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,13 +3,13 @@ title: Use KMS etcd encryption in Azure Kubernetes Service (AKS) (Preview)
3
3
description: Learn how to use kms etcd encryption with Azure Kubernetes Service (AKS)
4
4
services: container-service
5
5
ms.topic: article
6
-
ms.date: 03/24/2022
6
+
ms.date: 04/11/2022
7
7
8
8
---
9
9
10
10
# Add KMS etcd encryption to an Azure Kubernetes Service (AKS) cluster (Preview)
11
11
12
-
This article shows you how to enable encryption at rest for your Kubernetes data in etcd using Azure Key Vault using Key Management Service (KMS) plugin. The KMS plugin allows you to:
12
+
This article shows you how to enable encryption at rest for your Kubernetes data in etcd using Azure Key Vault with Key Management Service (KMS) plugin. The KMS plugin allows you to:
13
13
14
14
* Use a key in Key Vault for etcd encryption
15
15
* Bring your own keys
@@ -72,6 +72,7 @@ The following limitations apply when you integrate KMS etcd encryption with AKS:
72
72
* KMS etcd encryption does not work with System-Assigned Managed Identity. The keyvault access-policy is required to be set before the feature is enabled. In addition, System-Assigned Managed Identity is not available until cluster creation, thus there is a cycle dependency.
73
73
* Using Azure Key Vault with PrivateLink enabled.
74
74
* Using more than 2000 secrets in a cluster.
75
+
* Managed HSM Support
75
76
* Bring your own (BYO) Azure Key Vault from another tenant.
76
77
77
78
@@ -80,19 +81,19 @@ The following limitations apply when you integrate KMS etcd encryption with AKS:
80
81
Use `az keyvault create` to create a KeyVault.
81
82
82
83
```azurecli
83
-
az keyvault create --name MyKevVault --resource-group MyResourceGroup
84
+
az keyvault create --name MyKeyVault --resource-group MyResourceGroup
84
85
```
85
86
86
87
Use `az keyvault key create` to create a key.
87
88
88
89
```azurecli
89
-
az keyvault key create --name MyKeyName --vault-name MyKevVault
90
+
az keyvault key create --name MyKeyName --vault-name MyKeyVault
@@ -129,20 +130,20 @@ The above example stores the value of the Identity Resource Id in *IDENTITY_RESO
129
130
Use `az keyvault set-policy` to create an Azure KeyVault policy.
130
131
131
132
```azurecli-interactive
132
-
az keyvault set-policy -n MyKevVault --key-permissions decrypt encrypt --object-id $IDENTITY_OBJECT_ID
133
+
az keyvault set-policy -n MyKeyVault --key-permissions decrypt encrypt --object-id $IDENTITY_OBJECT_ID
133
134
```
134
135
135
136
## Create an AKS cluster with KMS etcd encryption enabled
136
137
137
-
Create an AKS cluster using the [az aks create][az-aks-create] command with the `--enable-keyvault-kms` and `--azure-keyvault-kms-key-id` parameters to enable KMS etcd encryption.
138
+
Create an AKS cluster using the [az aks create][az-aks-create] command with the `--enable-azure-keyvault-kms` and `--azure-keyvault-kms-key-id` parameters to enable KMS etcd encryption.
138
139
139
140
```azurecli-interactive
140
141
az aks create --name myAKSCluster --resource-group MyResourceGroup --assign-identity $IDENTITY_RESOURCE_ID --enable-azure-keyvault-kms --azure-keyvault-kms-key-id $KEY_ID
141
142
```
142
143
143
144
## Update an exiting AKS cluster to enable KMS etcd encryption
144
145
145
-
Use `az aks update` with the `--enable-keyvault-kms` and `--azure-keyvault-kms-key-id` parameters to enable KMS etcd encryption on an existing cluster.
146
+
Use `az aks update` with the `--enable-azure-keyvault-kms` and `--azure-keyvault-kms-key-id` parameters to enable KMS etcd encryption on an existing cluster.
146
147
147
148
```azurecli-interactive
148
149
az aks update --name myAKSCluster --resource-group MyResourceGroup --enable-azure-keyvault-kms --azure-keyvault-kms-key-id $KEY_ID
0 commit comments