@@ -736,7 +736,7 @@ Generate a 32-byte random key and base64 encode it. You can use this command:
736
736
737
737
{{< note >}}
738
738
<!--
739
- Keep the encryption key confidential, including whilst you generate it and
739
+ Keep the encryption key confidential, including while you generate it and
740
740
ideally even after you are no longer actively using it.
741
741
-->
742
742
保持加密密钥的机密性,包括在生成密钥时,甚至理想的情况下在你不再主动使用密钥后也要保密。
@@ -913,14 +913,34 @@ Kubernetes cluster has multiple control plane hosts, so there is more to do.
913
913
914
914
If you have multiple API servers in your cluster, you should deploy the
915
915
changes in turn to each API server.
916
-
917
- Make sure that you use the **same** encryption configuration on each
918
- control plane host.
919
916
-->
920
917
### 重新配置其他控制平面主机 {#api-server-config-update-more}
921
918
922
919
如果你的集群中有多个 API 服务器,应轮流将更改部署到每个 API 服务器。
923
920
921
+ {{< caution >}}
922
+ <!--
923
+ For cluster configurations with two or more control plane nodes, the encryption configuration
924
+ should be identical across each control plane node.
925
+
926
+ If there is a difference in the encryption provider configuration between control plane
927
+ nodes, this difference may mean that the kube-apiserver can't decrypt data.
928
+ -->
929
+ 对于具有两个或更多控制平面节点的集群配置,每个控制平面节点的加密配置应该是相同的。
930
+
931
+ 如果控制平面节点间的加密驱动配置不一致,这种差异可能导致 kube-apiserver 无法解密数据。
932
+ {{< /caution >}}
933
+
934
+ <!--
935
+ When you are planning to update the encryption configuration of your cluster, plan this
936
+ so that the API servers in your control plane can always decrypt the stored data
937
+ (even part way through rolling out the change).
938
+
939
+ Make sure that you use the **same** encryption configuration on each
940
+ control plane host.
941
+ -->
942
+ 你在计划更新集群的加密配置时,请确保控制平面中的 API 服务器在任何时候都能解密存储的数据(即使是在更改逐步实施的过程中也是如此)。
943
+
924
944
确保在每个控制平面主机上使用** 相同的** 加密配置。
925
945
926
946
<!--
0 commit comments