Skip to content

Commit aecf6d4

Browse files
authored
Update use-kms-etcd-encryption.md
1 parent adf573c commit aecf6d4

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

articles/aks/use-kms-etcd-encryption.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -32,7 +32,7 @@ The following limitations apply when you integrate KMS etcd encryption with AKS:
3232

3333
* Deletion of the key, Key Vault, or the associated identity isn't supported.
3434
* KMS etcd encryption doesn't work with system-assigned managed identity. The key vault access policy is required to be set before the feature is enabled. In addition, system-assigned managed identity isn't available until cluster creation, thus there's a cycle dependency.
35-
* Public Key Vault with firewall setting isn't supported because it blocks the traffic from AKS underlay.
35+
* Azure Key Vault with Firewall enabled to allow public access isn't supported because it blocks traffic from KMS plugin to the Key Vault.
3636
* The maximum number of secrets that a cluster enabled with KMS supports is 2,000.
3737
* Bring your own (BYO) Azure Key Vault from another tenant isn't supported.
3838
* With KMS enabled, you can't change associated Azure Key Vault model (public, private). To [change associated key vault mode][changing-associated-key-vault-mode], you need to disable and enable KMS again.

0 commit comments

Comments
 (0)