Skip to content

Commit edcf66c

Browse files
Merge pull request #276200 from CocoWang-wql/patch-62
Update use-kms-etcd-encryption.md
2 parents fe84cc5 + 6438067 commit edcf66c

File tree

1 file changed

+8
-3
lines changed

1 file changed

+8
-3
lines changed

articles/aks/use-kms-etcd-encryption.md

Lines changed: 8 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Learn how to use Key Management Service (KMS) etcd encryption with
44
ms.topic: article
55
ms.subservice: aks-security
66
ms.custom: devx-track-azurecli
7-
ms.date: 05/13/2024
7+
ms.date: 05/24/2024
88
---
99

1010
# Add Key Management Service etcd encryption to an Azure Kubernetes Service cluster
@@ -24,8 +24,10 @@ For more information on using KMS, see [Using a KMS provider for data encryption
2424
* Azure CLI version 2.39.0 or later. Run `az --version` to find your version. If you need to install or upgrade, see [Install the Azure CLI][azure-cli-install].
2525

2626
> [!WARNING]
27-
> KMS supports Konnectivity or [API Server VNet Integration (preview)][api-server-vnet-integration].
27+
> KMS supports Konnectivity or [API Server VNet Integration (preview)][api-server-vnet-integration] for public key vault.
2828
>
29+
> KMS only supports [API Server VNet Integration (preview)][api-server-vnet-integration] for private key vault.
30+
>
2931
> You can use `kubectl get po -n kube-system` to verify the results and show that a konnectivity-agent pod is running. If a pod is running, the AKS cluster is using Konnectivity. When you use API Server VNet Integration, you can run the `az aks show -g -n` command to verify that the `enableVnetIntegration` setting is set to `true`.
3032
3133
## Limitations
@@ -38,7 +40,7 @@ The following limitations apply when you integrate KMS etcd encryption with AKS:
3840
* The maximum number of secrets that are supported by a cluster that has KMS turned on is 2,000. However, it's important to note that [KMS v2][kms-v2-support] isn't limited by this restriction and can handle a higher number of secrets.
3941
* Bring your own (BYO) Azure key vault from another tenant isn't supported.
4042
* With KMS turned on, you can't change the associated key vault mode (public versus private). To [update a key vault mode][update-a-key-vault-mode], you must first turn off KMS, and then turn it on again.
41-
* If a cluster has KMS turned on, has a private key vault, and isn't using the API Server VNet integration tunnel, you can't stop and then start the cluster.
43+
* If a cluster has KMS turned on and has a private key vault, it must use the [API Server VNet Integration (preview)][api-server-vnet-integration] tunnel. Konnectivity isn't supported.
4244
* Using the Virtual Machine Scale Sets API to scale the nodes in the cluster down to zero deallocates the nodes. The cluster then goes down and becomes unrecoverable.
4345
* After you turn off KMS, you can't destroy the keys. Destroying the keys causes the API server to stop working.
4446

@@ -198,6 +200,9 @@ kubectl get secrets --all-namespaces -o json | kubectl replace -f -
198200

199201
If you turn on KMS for a private key vault, AKS automatically creates a private endpoint and a private link in the node resource group. The key vault is added a private endpoint connection with the AKS cluster.
200202

203+
> [!WARNING]
204+
> KMS only supports [API Server VNet Integration (preview)][api-server-vnet-integration] for private key vault.
205+
201206
### Create a private key vault and key
202207

203208
> [!WARNING]

0 commit comments

Comments
 (0)