Skip to content

Commit a46ccbc

Browse files
committed
OSDOCS-2407 - Adding an etcd encryption section for OSD and ROSA
1 parent ad03a82 commit a46ccbc

File tree

2 files changed

+42
-1
lines changed

2 files changed

+42
-1
lines changed

modules/rosa-sdpolicy-security.adoc

Lines changed: 20 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,6 @@
66
[id="rosa-sdpolicy-security_{context}"]
77
= Security
88

9-
109
This section provides information about the service definition for {product-title} security.
1110

1211
[id="rosa-sdpolicy-auth-provider_{context}"]
@@ -58,3 +57,23 @@ See Understanding process and security for ROSA for the latest compliance inform
5857
[id="rosa-sdpolicy-network-security_{context}"]
5958
== Network security
6059
With {product-title}, AWS provides a standard DDoS protection on all load balancers, called AWS Shield. This provides 95% protection against most commonly used level 3 and 4 attacks on all the public facing load balancers used for {product-title}. A 10-second timeout is added for HTTP requests coming to the `haproxy` router to receive a response or the connection is closed to provide additional protection.
60+
61+
[id="rosa-sdpolicy-etcd-encryption_{context}"]
62+
== etcd encryption
63+
64+
In {product-title}, the control plane storage is encrypted at rest by default and this includes encryption of the etcd volumes. This storage-level encryption is provided through the storage layer of the cloud provider.
65+
66+
You can also enable etcd encryption, which encrypts the key values in etcd state, but not the keys. If you enable etcd encryption, the following Kubernetes API server and OpenShift API server resources are encrypted:
67+
68+
* Secrets
69+
* Config maps
70+
* Routes
71+
* OAuth access tokens
72+
* OAuth authorize tokens
73+
74+
The etcd encryption feature is not enabled by default and it can be enabled only at cluster installation time.
75+
76+
[IMPORTANT]
77+
====
78+
By enabling etcd encryption for the key values in etcd state, you might incur a performance overhead of approximately 20%. Red Hat only recommends that you enable etcd encryption in addition to the default storage-level encryption if you specifically require this for your use case.
79+
====

modules/sdpolicy-security.adoc

Lines changed: 22 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -6,6 +6,8 @@
66
[id="sdpolicy-security_{context}"]
77
= Security
88

9+
This section provides information about the service definition for {product-title} security.
10+
911
[id="auth-provider_{context}"]
1012
== Authentication provider
1113
Authentication for the cluster is configured as part of the {OCM} cluster creation process. OpenShift is not an identity provider, and all access to the cluster must be managed by the customer as part of their integrated solution. Provisioning multiple identity providers provisioned at the same time is supported. The following identity providers are supported:
@@ -58,3 +60,23 @@ See link:https://www.openshift.com/products/dedicated/process-and-security#compl
5860
[id="network-security_{context}"]
5961
== Network security
6062
With {product-title} on AWS, AWS provides a standard DDoS protection on all Load Balancers, called AWS Shield. This provides 95% protection against most commonly used level 3 and 4 attacks on all the public facing Load Balancers used for {product-title}. A 10-second timeout is added for HTTP requests coming to the haproxy router to receive a response or the connection is closed to provide additional protection.
63+
64+
[id="etcd-encryption_{context}"]
65+
== etcd encryption
66+
67+
In {product-title}, the control plane storage is encrypted at rest by default and this includes encryption of the etcd volumes. This storage-level encryption is provided through the storage layer of the cloud provider.
68+
69+
You can also enable etcd encryption, which encrypts the key values in etcd state, but not the keys. If you enable etcd encryption, the following Kubernetes API server and OpenShift API server resources are encrypted:
70+
71+
* Secrets
72+
* Config maps
73+
* Routes
74+
* OAuth access tokens
75+
* OAuth authorize tokens
76+
77+
The etcd encryption feature is not enabled by default and it can be enabled only at cluster installation time.
78+
79+
[IMPORTANT]
80+
====
81+
By enabling etcd encryption for the key values in etcd state, you might incur a performance overhead of approximately 20%. Red Hat only recommends that you enable etcd encryption in addition to the default storage-level encryption if you specifically require this for your use case.
82+
====

0 commit comments

Comments
 (0)