You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: content/en/docs/tasks/administer-cluster/encrypt-data.md
+14-1Lines changed: 14 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -34,7 +34,7 @@ This page shows how to enable and configure encryption of secret data at rest.
34
34
The `kube-apiserver` process accepts an argument `--encryption-provider-config`
35
35
that controls how API data is encrypted in etcd.
36
36
The configuration is provided as an API named
37
-
[`EncryptionConfiguration`](/docs/reference/config-api/apiserver-encryption.v1/). `--encryption-provider-config-automatic-reload` boolean argument determines if the file set by `--encryption-provider-config` should be automatically reloaded if the disk contents change. This enables key rotation without API server restarts. An example configuration is provided below.
37
+
[`EncryptionConfiguration`](/docs/reference/config-api/apiserver-encryption.v1/). An example configuration is provided below.
38
38
39
39
{{< caution >}}
40
40
**IMPORTANT:** For high-availability configurations (with two or more control plane nodes), the
@@ -462,6 +462,19 @@ Then run the following command to force decrypt all Secrets:
0 commit comments