Skip to content

Commit 085c4cd

Browse files
author
Tim Bannister
committed
Reword advice about replicated encryption configuration
1 parent 47f1599 commit 085c4cd

File tree

1 file changed

+12
-9
lines changed

1 file changed

+12
-9
lines changed

content/en/docs/tasks/administer-cluster/encrypt-data.md

Lines changed: 12 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -72,15 +72,6 @@ you already have at-rest encryption enabled. However, that check does not tell y
7272
a previous migration to encrypted storage has succeeded. If you are not sure, see
7373
[ensure all relevant data are encrypted](#ensure-all-secrets-are-encrypted).
7474

75-
{{< caution >}}
76-
For cluster configurations with two or more control plane nodes, the encryption configuration
77-
**must** be identical across each control plane node.
78-
79-
If there is a difference in the encryption provider configuration, this may well mean
80-
that the kube-apiserver can't decrypt data stored inside the key-value store (potentially
81-
leading to further problems, such as inconsistent resource reads, or even data loss).
82-
{{< /caution >}}
83-
8475
## Understanding the encryption at rest configuration
8576

8677
<!-- note to localizers: the highlight is to make the initial comment obvious -->
@@ -514,6 +505,18 @@ Kubernetes cluster has multiple control plane hosts, so there is more to do.
514505
If you have multiple API servers in your cluster, you should deploy the
515506
changes in turn to each API server.
516507

508+
{{< caution >}}
509+
For cluster configurations with two or more control plane nodes, the encryption configuration
510+
should be identical across each control plane node.
511+
512+
If there is a difference in the encryption provider configuration between control plane
513+
nodes, this difference may mean that the kube-apiserver can't decrypt data.
514+
{{< /caution >}}
515+
516+
When you are planning to update the encryption configuration of your cluster, plan this
517+
so that the API servers in your control plane can always decrypt the stored data
518+
(even part way through rolling out the change).
519+
517520
Make sure that you use the **same** encryption configuration on each
518521
control plane host.
519522

0 commit comments

Comments
 (0)