Skip to content

Commit 44e63a9

Browse files
authored
Update use-kms-etcd-encryption.md
1 parent 73ac4ed commit 44e63a9

File tree

1 file changed

+9
-8
lines changed

1 file changed

+9
-8
lines changed

articles/aks/use-kms-etcd-encryption.md

Lines changed: 9 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -3,13 +3,13 @@ title: Use KMS etcd encryption in Azure Kubernetes Service (AKS) (Preview)
33
description: Learn how to use kms etcd encryption with Azure Kubernetes Service (AKS)
44
services: container-service
55
ms.topic: article
6-
ms.date: 03/24/2022
6+
ms.date: 04/11/2022
77

88
---
99

1010
# Add KMS etcd encryption to an Azure Kubernetes Service (AKS) cluster (Preview)
1111

12-
This article shows you how to enable encryption at rest for your Kubernetes data in etcd using Azure Key Vault using Key Management Service (KMS) plugin. The KMS plugin allows you to:
12+
This article shows you how to enable encryption at rest for your Kubernetes data in etcd using Azure Key Vault with Key Management Service (KMS) plugin. The KMS plugin allows you to:
1313

1414
* Use a key in Key Vault for etcd encryption
1515
* Bring your own keys
@@ -72,6 +72,7 @@ The following limitations apply when you integrate KMS etcd encryption with AKS:
7272
* KMS etcd encryption does not work with System-Assigned Managed Identity. The keyvault access-policy is required to be set before the feature is enabled. In addition, System-Assigned Managed Identity is not available until cluster creation, thus there is a cycle dependency.
7373
* Using Azure Key Vault with PrivateLink enabled.
7474
* Using more than 2000 secrets in a cluster.
75+
* Managed HSM Support
7576
* Bring your own (BYO) Azure Key Vault from another tenant.
7677

7778

@@ -80,19 +81,19 @@ The following limitations apply when you integrate KMS etcd encryption with AKS:
8081
Use `az keyvault create` to create a KeyVault.
8182

8283
```azurecli
83-
az keyvault create --name MyKevVault --resource-group MyResourceGroup
84+
az keyvault create --name MyKeyVault --resource-group MyResourceGroup
8485
```
8586

8687
Use `az keyvault key create` to create a key.
8788

8889
```azurecli
89-
az keyvault key create --name MyKeyName --vault-name MyKevVault
90+
az keyvault key create --name MyKeyName --vault-name MyKeyVault
9091
```
9192

9293
Use `az keyvault key show` to export the Key ID.
9394

9495
```azurecli
95-
export KEY_ID=$(az keyvault key show --name MyKeyName --vault-name MyKevVault --query 'key.kid' -o tsv)
96+
export KEY_ID=$(az keyvault key show --name MyKeyName --vault-name MyKeyVault --query 'key.kid' -o tsv)
9697
echo $KEY_ID
9798
```
9899

@@ -129,20 +130,20 @@ The above example stores the value of the Identity Resource Id in *IDENTITY_RESO
129130
Use `az keyvault set-policy` to create an Azure KeyVault policy.
130131

131132
```azurecli-interactive
132-
az keyvault set-policy -n MyKevVault --key-permissions decrypt encrypt --object-id $IDENTITY_OBJECT_ID
133+
az keyvault set-policy -n MyKeyVault --key-permissions decrypt encrypt --object-id $IDENTITY_OBJECT_ID
133134
```
134135

135136
## Create an AKS cluster with KMS etcd encryption enabled
136137

137-
Create an AKS cluster using the [az aks create][az-aks-create] command with the `--enable-keyvault-kms` and `--azure-keyvault-kms-key-id` parameters to enable KMS etcd encryption.
138+
Create an AKS cluster using the [az aks create][az-aks-create] command with the `--enable-azure-keyvault-kms` and `--azure-keyvault-kms-key-id` parameters to enable KMS etcd encryption.
138139

139140
```azurecli-interactive
140141
az aks create --name myAKSCluster --resource-group MyResourceGroup --assign-identity $IDENTITY_RESOURCE_ID --enable-azure-keyvault-kms --azure-keyvault-kms-key-id $KEY_ID
141142
```
142143

143144
## Update an exiting AKS cluster to enable KMS etcd encryption
144145

145-
Use `az aks update` with the `--enable-keyvault-kms` and `--azure-keyvault-kms-key-id` parameters to enable KMS etcd encryption on an existing cluster.
146+
Use `az aks update` with the `--enable-azure-keyvault-kms` and `--azure-keyvault-kms-key-id` parameters to enable KMS etcd encryption on an existing cluster.
146147

147148
```azurecli-interactive
148149
az aks update --name myAKSCluster --resource-group MyResourceGroup --enable-azure-keyvault-kms --azure-keyvault-kms-key-id $KEY_ID

0 commit comments

Comments
 (0)