Skip to content

Commit 5dcbba9

Browse files
authored
Update use-kms-etcd-encryption.md
1 parent 650a6a5 commit 5dcbba9

File tree

1 file changed

+4
-4
lines changed

1 file changed

+4
-4
lines changed

articles/aks/use-kms-etcd-encryption.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -30,11 +30,11 @@ For more information on using the KMS plugin, see [Encrypting Secret Data at Res
3030

3131
The following limitations apply when you integrate KMS etcd encryption with AKS:
3232

33-
* Deletion of the key, Key Vault, or the associated identity is not allowed.
33+
* Deletion of the key, Key Vault, or the associated identity isn't supported.
3434
* KMS etcd encryption doesn't work with system-assigned managed identity. The key vault access policy is required to be set before the feature is enabled. In addition, system-assigned managed identity isn't available until cluster creation, thus there's a cycle dependency.
35-
* There is a hard limit that you cannot use more than 2000 secrets in a cluster enabled with KMS.
36-
* Bring your own (BYO) Azure Key Vault from another tenant is not supported.
37-
* With KMS enabled, you cannot change associated Azure Key Vault model (public, private). For [changing associated key vault mode][changing-associated-key-vault-mode], you need to disable and enable KMS again.
35+
* The maximum number of secrets that a cluster enabled with KMS supports is 2,000.
36+
* Bring your own (BYO) Azure Key Vault from another tenant isn't supported.
37+
* With KMS enabled, you can't change associated Azure Key Vault model (public, private). To [change associated key vault mode][changing-associated-key-vault-mode], you need to disable and enable KMS again.
3838
* If a cluster is enabled KMS with private key vault and not using `VNet integration` tunnel, then stop/start cluster is not allowed.
3939

4040
KMS supports [public key vault][Enable-KMS-with-public-key-vault] and [private key vault][Enable-KMS-with-private-key-vault].

0 commit comments

Comments
 (0)