@@ -72,15 +72,6 @@ you already have at-rest encryption enabled. However, that check does not tell y
72
72
a previous migration to encrypted storage has succeeded. If you are not sure, see
73
73
[ ensure all relevant data are encrypted] ( #ensure-all-secrets-are-encrypted ) .
74
74
75
- {{< caution >}}
76
- For cluster configurations with two or more control plane nodes, the encryption configuration
77
- ** must** be identical across each control plane node.
78
-
79
- If there is a difference in the encryption provider configuration, this may well mean
80
- that the kube-apiserver can't decrypt data stored inside the key-value store (potentially
81
- leading to further problems, such as inconsistent resource reads, or even data loss).
82
- {{< /caution >}}
83
-
84
75
## Understanding the encryption at rest configuration
85
76
86
77
<!-- note to localizers: the highlight is to make the initial comment obvious -->
@@ -514,6 +505,18 @@ Kubernetes cluster has multiple control plane hosts, so there is more to do.
514
505
If you have multiple API servers in your cluster, you should deploy the
515
506
changes in turn to each API server.
516
507
508
+ {{< caution >}}
509
+ For cluster configurations with two or more control plane nodes, the encryption configuration
510
+ should be identical across each control plane node.
511
+
512
+ If there is a difference in the encryption provider configuration between control plane
513
+ nodes, this difference may mean that the kube-apiserver can't decrypt data.
514
+ {{< /caution >}}
515
+
516
+ When you are planning to update the encryption configuration of your cluster, plan this
517
+ so that the API servers in your control plane can always decrypt the stored data
518
+ (even part way through rolling out the change).
519
+
517
520
Make sure that you use the ** same** encryption configuration on each
518
521
control plane host.
519
522
0 commit comments