Skip to content

Commit 86e09fc

Browse files
Merge pull request #234202 from CocoWang-wql/patch-32
Update use-kms-etcd-encryption.md
2 parents 25ec6b2 + 6990c6e commit 86e09fc

File tree

1 file changed

+3
-1
lines changed

1 file changed

+3
-1
lines changed

articles/aks/use-kms-etcd-encryption.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Use Key Management Service (KMS) etcd encryption in Azure Kubernetes Serv
33
description: Learn how to use the Key Management Service (KMS) etcd encryption with Azure Kubernetes Service (AKS)
44
ms.topic: article
55
ms.custom: devx-track-azurecli
6-
ms.date: 02/20/2023
6+
ms.date: 04/12/2023
77
---
88

99
# Add Key Management Service (KMS) etcd encryption to an Azure Kubernetes Service (AKS) cluster
@@ -37,6 +37,8 @@ The following limitations apply when you integrate KMS etcd encryption with AKS:
3737
* Bring your own (BYO) Azure Key Vault from another tenant isn't supported.
3838
* With KMS enabled, you can't change associated Azure Key Vault model (public, private). To [change associated key vault mode][changing-associated-key-vault-mode], you need to disable and enable KMS again.
3939
* If a cluster is enabled KMS with private key vault and not using the `API Server VNet integration` tunnel, then stop/start cluster is not allowed.
40+
* Using the virtual machine scale set (VMSS) API to scale down nodes in the cluster to zero will deallocate the nodes, causing the cluster to go down and unrecoverable.
41+
4042

4143
KMS supports [public key vault][Enable-KMS-with-public-key-vault] and [private key vault][Enable-KMS-with-private-key-vault].
4244

0 commit comments

Comments
 (0)