Skip to content

Commit a21a0c2

Browse files
authored
Merge pull request #39051 from Zhuzhenghao/encrypt-data
[zh-cn] Sync encrypt-data.md
2 parents c58179f + 04f5c73 commit a21a0c2

File tree

1 file changed

+6
-5
lines changed

1 file changed

+6
-5
lines changed

content/zh-cn/docs/tasks/administer-cluster/encrypt-data.md

Lines changed: 6 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -2,6 +2,7 @@
22
title: 静态加密 Secret 数据
33
content_type: task
44
min-kubernetes-server-version: 1.13
5+
weight: 210
56
---
67
<!--
78
title: Encrypting Secret Data at Rest
@@ -10,6 +11,7 @@ reviewers:
1011
- enj
1112
content_type: task
1213
min-kubernetes-server-version: 1.13
14+
weight: 210
1315
-->
1416

1517
<!-- overview -->
@@ -61,7 +63,7 @@ decrypt data stored in the etcd.
6163
{{< /caution >}}
6264

6365
<!--
64-
## Understanding the encryption at rest configuration.
66+
## Understanding the encryption at rest configuration
6567
-->
6668
## 理解静态数据加密 {#understanding-the-encryption-at-rest-configuration}
6769

@@ -154,7 +156,7 @@ Name | Encryption | Strength | Speed | Key Length | Other Considerations
154156
`secretbox` | XSalsa20 and Poly1305 | Strong | Faster | 32-byte | A newer standard and may not be considered acceptable in environments that require high levels of review.
155157
`aesgcm` | AES-GCM with random nonce | Must be rotated every 200k writes | Fastest | 16, 24, or 32-byte | Is not recommended for use except when an automated key rotation scheme is implemented.
156158
`aescbc` | AES-CBC with [PKCS#7](https://datatracker.ietf.org/doc/html/rfc2315) padding | Weak | Fast | 32-byte | Not recommended due to CBC's vulnerability to padding oracle attacks.
157-
`kms` | Uses envelope encryption scheme: Data is encrypted by data encryption keys (DEKs) using AES-CBC with [PKCS#7](https://datatracker.ietf.org/doc/html/rfc2315) padding, DEKs are encrypted by key encryption keys (KEKs) according to configuration in Key Management Service (KMS) | Strongest | Fast | 32-bytes | The recommended choice for using a third party tool for key management. Simplifies key rotation, with a new DEK generated for each encryption, and KEK rotation controlled by the user. [Configure the KMS provider](/docs/tasks/administer-cluster/kms-provider/)
159+
`kms` | Uses envelope encryption scheme: Data is encrypted by data encryption keys (DEKs) using AES-CBC with [PKCS#7](https://datatracker.ietf.org/doc/html/rfc2315) padding (prior to v1.25), using AES-GCM starting from v1.25, DEKs are encrypted by key encryption keys (KEKs) according to configuration in Key Management Service (KMS) | Strongest | Fast | 32-bytes | The recommended choice for using a third party tool for key management. Simplifies key rotation, with a new DEK generated for each encryption, and KEK rotation controlled by the user. [Configure the KMS provider](/docs/tasks/administer-cluster/kms-provider/)
158160

159161
Each provider supports multiple keys - the keys are tried in order for decryption, and if the provider
160162
is the first provider, the first key is used for encryption.
@@ -392,7 +394,7 @@ program to retrieve the contents of your secret data.
392394
4. 通过 API 检索,验证 Secret 是否被正确解密:
393395

394396
```shell
395-
kubectl describe secret secret1 -n default
397+
kubectl get secret secret1 -n default -o yaml
396398
```
397399

398400
<!--
@@ -489,8 +491,7 @@ resources:
489491
```
490492
491493
<!--
492-
Then run the following command to force decrypt
493-
all Secrets:
494+
Then run the following command to force decrypt all Secrets:
494495
-->
495496
然后运行以下命令以强制解密所有 Secret:
496497

0 commit comments

Comments
 (0)