Skip to content

Commit c6756ed

Browse files
Merge pull request #223327 from CocoWang-wql/patch-20
Update use-kms-etcd-encryption.md
2 parents 05e7f91 + aecf6d4 commit c6756ed

File tree

1 file changed

+4
-1
lines changed

1 file changed

+4
-1
lines changed

articles/aks/use-kms-etcd-encryption.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Use Key Management Service (KMS) etcd encryption in Azure Kubernetes Serv
33
description: Learn how to use the Key Management Service (KMS) etcd encryption with Azure Kubernetes Service (AKS)
44
services: container-service
55
ms.topic: article
6-
ms.date: 12/17/2022
6+
ms.date: 01/09/2023
77
---
88

99
# Add Key Management Service (KMS) etcd encryption to an Azure Kubernetes Service (AKS) cluster
@@ -32,6 +32,7 @@ The following limitations apply when you integrate KMS etcd encryption with AKS:
3232

3333
* Deletion of the key, Key Vault, or the associated identity isn't supported.
3434
* KMS etcd encryption doesn't work with system-assigned managed identity. The key vault access policy is required to be set before the feature is enabled. In addition, system-assigned managed identity isn't available until cluster creation, thus there's a cycle dependency.
35+
* Azure Key Vault with Firewall enabled to allow public access isn't supported because it blocks traffic from KMS plugin to the Key Vault.
3536
* The maximum number of secrets that a cluster enabled with KMS supports is 2,000.
3637
* Bring your own (BYO) Azure Key Vault from another tenant isn't supported.
3738
* With KMS enabled, you can't change associated Azure Key Vault model (public, private). To [change associated key vault mode][changing-associated-key-vault-mode], you need to disable and enable KMS again.
@@ -282,6 +283,8 @@ After changing the key ID (including key name and key version), you can use [az
282283

283284
> [!WARNING]
284285
> Remember to update all secrets after key rotation. Otherwise, the secrets will be inaccessible if the old keys are not existing or working.
286+
>
287+
> Once you rotate the key, the old key (key1) is still cached and shouldn't be deleted. If you want to delete the old key (key1) immediately, you need to rotate the key twice. Then key2 and key3 are cached, and key1 can be deleted without impacting existing cluster.
285288
286289
```azurecli-interactive
287290
az aks update --name myAKSCluster --resource-group MyResourceGroup --enable-azure-keyvault-kms --azure-keyvault-kms-key-id $NewKEY_ID --azure-keyvault-kms-key-vault-network-access "Private" --azure-keyvault-kms-key-vault-resource-id $KEYVAULT_RESOURCE_ID

0 commit comments

Comments
 (0)