Skip to content

Commit 8442aed

Browse files
committed
sync encrypt-data.md
1 parent d94bb3a commit 8442aed

File tree

1 file changed

+3
-1
lines changed

1 file changed

+3
-1
lines changed

content/zh-cn/docs/tasks/administer-cluster/encrypt-data.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -97,7 +97,7 @@ resources:
9797
9898
<!--
9999
Each `resources` array item is a separate config and contains a complete configuration. The
100-
`resources.resources` field is an array of Kubernetes resource names (`resource` or `resource.group`
100+
`resources.resources` field is an array of Kubernetes resource names (`resource` or `resource.group`
101101
that should be encrypted like Secrets, ConfigMaps, or other resources.
102102

103103
If custom resources are added to `EncryptionConfiguration` and the cluster version is 1.26 or newer,
@@ -150,13 +150,15 @@ read that resource will fail until it is deleted or a valid decryption key is pr
150150
### Providers
151151

152152
<!--
153+
{{< table caption="Providers for Kubernetes encryption at rest" >}}
153154
Name | Encryption | Strength | Speed | Key Length | Other Considerations
154155
-----|------------|----------|-------|------------|---------------------
155156
`identity` | None | N/A | N/A | N/A | Resources written as-is without encryption. When set as the first provider, the resource will be decrypted as new values are written.
156157
`secretbox` | XSalsa20 and Poly1305 | Strong | Faster | 32-byte | A newer standard and may not be considered acceptable in environments that require high levels of review.
157158
`aesgcm` | AES-GCM with random nonce | Must be rotated every 200k writes | Fastest | 16, 24, or 32-byte | Is not recommended for use except when an automated key rotation scheme is implemented.
158159
`aescbc` | AES-CBC with [PKCS#7](https://datatracker.ietf.org/doc/html/rfc2315) padding | Weak | Fast | 32-byte | Not recommended due to CBC's vulnerability to padding oracle attacks.
159160
`kms` | Uses envelope encryption scheme: Data is encrypted by data encryption keys (DEKs) using AES-CBC with [PKCS#7](https://datatracker.ietf.org/doc/html/rfc2315) padding (prior to v1.25), using AES-GCM starting from v1.25, DEKs are encrypted by key encryption keys (KEKs) according to configuration in Key Management Service (KMS) | Strongest | Fast | 32-bytes | The recommended choice for using a third party tool for key management. Simplifies key rotation, with a new DEK generated for each encryption, and KEK rotation controlled by the user. [Configure the KMS provider](/docs/tasks/administer-cluster/kms-provider/)
161+
+{{< /table >}}
160162

161163
Each provider supports multiple keys - the keys are tried in order for decryption, and if the provider
162164
is the first provider, the first key is used for encryption.

0 commit comments

Comments
 (0)