Skip to content

Commit c4c61e0

Browse files
Merge pull request #241973 from MGoedtel/update-use-kms-etcd-encrypt
Update updates to use-kms-etcd-encrypt
2 parents b35b90f + a00017f commit c4c61e0

File tree

1 file changed

+11
-11
lines changed

1 file changed

+11
-11
lines changed

articles/aks/use-kms-etcd-encryption.md

Lines changed: 11 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -347,58 +347,58 @@ Use the following command to update all secrets. Otherwise, the old secrets will
347347
kubectl get secrets --all-namespaces -o json | kubectl replace -f -
348348
```
349349

350-
## KMS V2 support
350+
## KMS v2 support
351351

352-
Since AKS version 1.27 and above, enabling the KMS feature configures KMS V2. With KMS V2, you aren't limited to the 2,000 secrets support. For more information, you can refer to the [KMS V2 Improvements](https://kubernetes.io/blog/2023/05/16/kms-v2-moves-to-beta/).
352+
Starting with AKS version 1.27, enabling the KMS feature configures KMS v2. With KMS v2, you aren't limited to the 2,000 secrets it supports. For more information, review [KMS V2 Improvements](https://kubernetes.io/blog/2023/05/16/kms-v2-moves-to-beta/).
353353

354354
### Migration to KMS v2
355355

356-
If your cluster version is less than 1.27 and you already enabled KMS, use the following steps to migrate to KMS V2:
356+
If your cluster version is less than 1.27 and you already enabled KMS, use the following steps to migrate to KMS v2:
357357

358358
1. Disable KMS on the cluster.
359359
2. Perform the storage migration.
360360
3. Upgrade the cluster to version 1.27 or higher.
361361
4. Re-enable KMS on the cluster.
362-
5. Perform the storage migration
362+
5. Perform the storage migration.
363363

364364
#### Disable KMS
365365

366-
Disable KMS on an existing cluster using the `az aks update` command with the `--disable-azure-keyvault-kms` flag.
366+
To disable KMS on an existing cluster, use the `az aks update` command with the `--disable-azure-keyvault-kms` argument.
367367

368368
```azurecli-interactive
369369
az aks update --name myAKSCluster --resource-group MyResourceGroup --disable-azure-keyvault-kms
370370
```
371371

372372
#### Storage migration
373373

374-
Update all secrets using the `kubectl get secrets` command with the `--all-namespaces` flag.
374+
To update all secrets, use the `kubectl get secrets` command with the `--all-namespaces` argument.
375375

376376
```azurecli-interactive
377377
kubectl get secrets --all-namespaces -o json | kubectl replace -f -
378378
```
379379

380380
#### Upgrade AKS cluster
381381

382-
Upgrade the AKS cluster using the `az aks upgrade` command and specify your desired version as `1.27.x` or higher for `--kubernetes-version`.
382+
To upgrade an AKS cluster, use the `az aks upgrade` command and specify the desired version as `1.27.x` or higher with the `--kubernetes-version` argument.
383383

384384
```azurecli-interactive
385385
az aks upgrade --resource-group myResourceGroup --name myAKSCluster --kubernetes-version <AKS version>
386386
```
387387

388-
Example:
388+
For example:
389389

390390
```azurecli-interactive
391391
az aks upgrade --resource-group myResourceGroup --name myAKSCluster --kubernetes-version 1.27.1
392392
```
393393

394394
#### Re-enable KMS
395395

396-
You can reenable the KMS feature on the cluster to encrypt the secrets. After that, the AKS cluster uses KMS V2.
397-
If you dont want to do the KMS v2 migration, you can create a new 1.27+ cluster with KMS enabled.
396+
You can reenable the KMS feature on the cluster to encrypt the secrets. Afterwards, the AKS cluster uses KMS v2.
397+
If you don't want to do the KMS v2 migration, you can create a new version 1.27 and higher cluster with KMS enabled.
398398

399399
#### Storage migration
400400

401-
Re-encrypt all secrets under KMS V2 using the `kubectl get secrets` command with the `--all-namespaces` flag.
401+
To re-encrypt all secrets under KMS v2, use the `kubectl get secrets` command with the `--all-namespaces` argument.
402402

403403
```azurecli-interactive
404404
kubectl get secrets --all-namespaces -o json | kubectl replace -f -

0 commit comments

Comments
 (0)