@@ -73,9 +73,12 @@ a previous migration to encrypted storage has succeeded. If you are not sure, se
73
73
[ ensure all relevant data are encrypted] ( #ensure-all-secrets-are-encrypted ) .
74
74
75
75
{{< caution >}}
76
- ** IMPORTANT:** For high-availability configurations (with two or more control plane nodes), the
77
- encryption configuration file must be the same! Otherwise, the ` kube-apiserver ` component cannot
78
- decrypt data stored in the etcd.
76
+ For cluster configurations with two or more control plane nodes, the encryption configuration
77
+ ** must** be identical across each control plane node.
78
+
79
+ If there is a difference in the encryption provider configuration, this may well mean
80
+ that the kube-apiserver can't decrypt data stored inside the key-value store (potentially
81
+ leading to further problems, such as inconsistent resource reads, or even data loss).
79
82
{{< /caution >}}
80
83
81
84
## Understanding the encryption at rest configuration
@@ -198,9 +201,12 @@ For more detailed information about the `EncryptionConfiguration` struct, please
198
201
[ encryption configuration API] ( /docs/reference/config-api/apiserver-encryption.v1/ ) .
199
202
200
203
{{< caution >}}
201
- If any resource is not readable via the encryption config (because keys were changed),
202
- the only recourse is to delete that key from the underlying etcd directly. Calls that attempt to
203
- read that resource will fail until it is deleted or a valid decryption key is provided.
204
+ If any resource is not readable via the encryption configuration (because keys were changed),
205
+ and you cannot restore a working configuration, your only recourse is to delete that entry from
206
+ the underlying etcd directly.
207
+
208
+ Any calls to the Kubernetes API that attempt to read that resource will fail until it is deleted
209
+ or a valid decryption key is provided.
204
210
{{< /caution >}}
205
211
206
212
### Available providers {#providers}
@@ -402,7 +408,7 @@ Generate a 32-byte random key and base64 encode it. You can use this command:
402
408
403
409
404
410
{{< note >}}
405
- Keep the encryption key confidential, including whilst you generate it and
411
+ Keep the encryption key confidential, including while you generate it and
406
412
ideally even after you are no longer actively using it.
407
413
{{< /note >}}
408
414
0 commit comments