Skip to content

Commit 47f1599

Browse files
author
Tim Bannister
committed
Revise callouts in encryption-at-rest task page
1 parent add6a0a commit 47f1599

File tree

1 file changed

+13
-7
lines changed

1 file changed

+13
-7
lines changed

content/en/docs/tasks/administer-cluster/encrypt-data.md

Lines changed: 13 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -73,9 +73,12 @@ a previous migration to encrypted storage has succeeded. If you are not sure, se
7373
[ensure all relevant data are encrypted](#ensure-all-secrets-are-encrypted).
7474

7575
{{< caution >}}
76-
**IMPORTANT:** For high-availability configurations (with two or more control plane nodes), the
77-
encryption configuration file must be the same! Otherwise, the `kube-apiserver` component cannot
78-
decrypt data stored in the etcd.
76+
For cluster configurations with two or more control plane nodes, the encryption configuration
77+
**must** be identical across each control plane node.
78+
79+
If there is a difference in the encryption provider configuration, this may well mean
80+
that the kube-apiserver can't decrypt data stored inside the key-value store (potentially
81+
leading to further problems, such as inconsistent resource reads, or even data loss).
7982
{{< /caution >}}
8083

8184
## Understanding the encryption at rest configuration
@@ -198,9 +201,12 @@ For more detailed information about the `EncryptionConfiguration` struct, please
198201
[encryption configuration API](/docs/reference/config-api/apiserver-encryption.v1/).
199202

200203
{{< caution >}}
201-
If any resource is not readable via the encryption config (because keys were changed),
202-
the only recourse is to delete that key from the underlying etcd directly. Calls that attempt to
203-
read that resource will fail until it is deleted or a valid decryption key is provided.
204+
If any resource is not readable via the encryption configuration (because keys were changed),
205+
and you cannot restore a working configuration, your only recourse is to delete that entry from
206+
the underlying etcd directly.
207+
208+
Any calls to the Kubernetes API that attempt to read that resource will fail until it is deleted
209+
or a valid decryption key is provided.
204210
{{< /caution >}}
205211

206212
### Available providers {#providers}
@@ -402,7 +408,7 @@ Generate a 32-byte random key and base64 encode it. You can use this command:
402408

403409

404410
{{< note >}}
405-
Keep the encryption key confidential, including whilst you generate it and
411+
Keep the encryption key confidential, including while you generate it and
406412
ideally even after you are no longer actively using it.
407413
{{< /note >}}
408414

0 commit comments

Comments
 (0)