Skip to content

Commit f983da6

Browse files
Merge pull request #245646 from MGoedtel/update_use-kms-etcd-encryption
Updated use-kms-etcd-encryption
2 parents 6a82a84 + bd11f71 commit f983da6

File tree

1 file changed

+5
-6
lines changed

1 file changed

+5
-6
lines changed

articles/aks/use-kms-etcd-encryption.md

Lines changed: 5 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -31,15 +31,14 @@ For more information on using the KMS plugin, see [Encrypting Secret Data at Res
3131
The following limitations apply when you integrate KMS etcd encryption with AKS:
3232

3333
* Deletion of the key, Key Vault, or the associated identity isn't supported.
34-
* KMS etcd encryption doesn't work with system-assigned managed identity. The key vault access policy is required to be set before the feature is enabled. In addition, system-assigned managed identity isn't available until cluster creation, thus there's a cycle dependency.
35-
* Azure Key Vault with Firewall enabled to allow public access isn't supported because it blocks traffic from KMS plugin to the Key Vault.
34+
* KMS etcd encryption doesn't work with system-assigned managed identity. The key vault access policy is required to be set before the feature is enabled. In addition, system-assigned managed identity isn't available until cluster creation. Consequently, there's a cycle dependency.
35+
* Azure Key Vault with Firewall enabled to allow public access isn't supported. It blocks traffic from KMS plugin to the Key Vault.
3636
* The maximum number of secrets supported by a cluster enabled with KMS is 2,000. However, it's important to note that [KMS V2][kms-v2-support] isn't limited by this restriction and can handle a higher number of secrets.
3737
* Bring your own (BYO) Azure Key Vault from another tenant isn't supported.
3838
* With KMS enabled, you can't change associated Azure Key Vault model (public, private). To [change associated key vault mode][changing-associated-key-vault-mode], you need to disable and enable KMS again.
3939
* If a cluster is enabled with KMS and private key vault and isn't using the `API Server VNet integration` tunnel, then stop/start cluster isn't allowed.
40-
* Using the virtual machine scale set API to scale the nodes in the cluster down to zero deallocates the nodes, causing the cluster to go down and become unrecoverable.
41-
* After you disable KMS, you can't destroy the keys because it causes the API server to stop working.
42-
40+
* Using the Virtual Machine Scale Sets API to scale the nodes in the cluster down to zero deallocates the nodes, causing the cluster to go down and become unrecoverable.
41+
* After you disable KMS, you can't destroy the keys. Otherwise, it causes the API server to stop working.
4342

4443
KMS supports [public key vault][Enable-KMS-with-public-key-vault] and [private key vault][Enable-KMS-with-private-key-vault].
4544

@@ -288,7 +287,7 @@ After changing the key ID (including key name and key version), you can use [az
288287

289288
> [!WARNING]
290289
> Remember to update all secrets after key rotation. Otherwise, the secrets will be inaccessible if the old keys are not existing or working.
291-
>
290+
>
292291
> Once you rotate the key, the old key (key1) is still cached and shouldn't be deleted. If you want to delete the old key (key1) immediately, you need to rotate the key twice. Then key2 and key3 are cached, and key1 can be deleted without impacting existing cluster.
293292
294293
```azurecli-interactive

0 commit comments

Comments
 (0)