Skip to content

Commit b84343d

Browse files
authored
Merge pull request #96778 from jneczypor/OSDOCS-15379
OSDOCS-15379: Incorrect statement in etcd description
2 parents 303880d + 10a5314 commit b84343d

File tree

1 file changed

+2
-9
lines changed

1 file changed

+2
-9
lines changed

modules/rosa-sdpolicy-security.adoc

Lines changed: 2 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -96,17 +96,10 @@ With {product-title}, AWS provides a standard DDoS protection on all load balanc
9696
[id="rosa-sdpolicy-etcd-encryption_{context}"]
9797
== etcd encryption
9898

99-
In
100-
ifdef::openshift-rosa-hcp[]
101-
{hcp-title-first},
102-
endif::openshift-rosa-hcp[]
103-
ifndef::openshift-rosa-hcp[]
104-
{product-title},
105-
endif::openshift-rosa-hcp[]
106-
the control plane storage is encrypted at rest by default and this includes encryption of the etcd volumes. This storage-level encryption is provided through the storage layer of the cloud provider.
99+
In {product-title}, the control plane storage is encrypted at rest by default, including encryption of the etcd volumes. This storage-level encryption is provided through the storage layer of the cloud provider.
107100

108101
ifdef::openshift-rosa-hcp[]
109-
The etcd database is always encrypted by default. Customers might opt to provide their own custom AWS KMS keys for the purpose of encrypting the etcd database.
102+
Customers can also opt to encrypt the etcd database at build time or provide their own custom AWS KMS keys for the purpose of encrypting the etcd database.
110103

111104
Etcd encryption will encrypt the following Kubernetes API server and OpenShift API server resources:
112105
endif::openshift-rosa-hcp[]

0 commit comments

Comments
 (0)