Skip to content

Commit 55f8394

Browse files
committed
add admonitions in docs for amazon_web_services.eks_kms_arn config option
1 parent 57abcbb commit 55f8394

File tree

1 file changed

+3
-0
lines changed

1 file changed

+3
-0
lines changed

docs/docs/explanations/advanced-provider-configuration.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -119,16 +119,19 @@ after setting a _different_ key ARN, the re-deploy should succeed but the KMS ke
119119
not actually change in the cluster config and the original key will remain set. The integrity of a faulty
120120
deployment can be restored, following a failed re-deploy attempt to remove a previously set KMS key, by
121121
simply re-deploying Nebari while ensuring `eks_kms_arn` is set to the original KMS key ARN.
122+
:::
122123

123124
:::danger
124125
If the KMS key used for envelope encryption of secrets is ever deleted, then there is no way to recover
125126
the EKS cluster.
127+
:::
126128

127129
:::note
128130
After enabling cluster encryption on your cluster, you must encrypt all existing secrets with the
129131
new key by running the following command:
130132
`kubectl get secrets --all-namespaces -o json | kubectl annotate --overwrite -f - kms-encryption-timestamp="time value"`
131133
Consult [Encrypt K8s secrets with AWS KMS on existing clusters](https://docs.aws.amazon.com/eks/latest/userguide/enable-kms.html) for more information.
134+
:::
132135

133136
Here is an example of how you would set KMS key ARN in `nebari-config.yaml`.
134137

0 commit comments

Comments
 (0)