Skip to content

Commit 6990c6e

Browse files
authored
Update use-kms-etcd-encryption.md
1 parent 75aba0f commit 6990c6e

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

articles/aks/use-kms-etcd-encryption.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -37,7 +37,7 @@ The following limitations apply when you integrate KMS etcd encryption with AKS:
3737
* Bring your own (BYO) Azure Key Vault from another tenant isn't supported.
3838
* With KMS enabled, you can't change associated Azure Key Vault model (public, private). To [change associated key vault mode][changing-associated-key-vault-mode], you need to disable and enable KMS again.
3939
* If a cluster is enabled KMS with private key vault and not using the `API Server VNet integration` tunnel, then stop/start cluster is not allowed.
40-
* Calling VMSS API to scale down the AKS nodes to 0 will make cluster down and unrecoverable.
40+
* Using the virtual machine scale set (VMSS) API to scale down nodes in the cluster to zero will deallocate the nodes, causing the cluster to go down and unrecoverable.
4141

4242

4343
KMS supports [public key vault][Enable-KMS-with-public-key-vault] and [private key vault][Enable-KMS-with-private-key-vault].

0 commit comments

Comments
 (0)