Skip to content

Commit ac4f60c

Browse files
Merge pull request #227905 from CocoWang-wql/patch-30
Update use-kms-etcd-encryption.md
2 parents 3215572 + e48c560 commit ac4f60c

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

articles/aks/use-kms-etcd-encryption.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: Use Key Management Service (KMS) etcd encryption in Azure Kubernetes Service (AKS)
33
description: Learn how to use the Key Management Service (KMS) etcd encryption with Azure Kubernetes Service (AKS)
44
ms.topic: article
5-
ms.date: 01/17/2023
5+
ms.date: 02/20/2023
66
---
77

88
# Add Key Management Service (KMS) etcd encryption to an Azure Kubernetes Service (AKS) cluster
@@ -338,7 +338,7 @@ Use the following command to disable KMS on existing cluster.
338338
az aks update --name myAKSCluster --resource-group MyResourceGroup --disable-azure-keyvault-kms
339339
```
340340

341-
Use the following command to update all secrets. Otherwise, the old secrets will still be encrypted with the previous key. For larger clusters, you may want to subdivide the secrets by namespace or script an update.
341+
Use the following command to update all secrets. Otherwise, the old secrets will still be encrypted with the previous key and the encrypt/decrypt permission on key vault is still required. For larger clusters, you may want to subdivide the secrets by namespace or script an update.
342342

343343
```azurecli-interactive
344344
kubectl get secrets --all-namespaces -o json | kubectl replace -f -

0 commit comments

Comments
 (0)