Skip to content

Commit bc63ae1

Browse files
Merge pull request #32330 from lbarbeevargas/BZ-1890452-BYOK-disk-encryption-DES
BZ-1890452 Azure BYOL disk encryption through DES
2 parents 4862497 + 680f851 commit bc63ae1

File tree

2 files changed

+41
-0
lines changed

2 files changed

+41
-0
lines changed

machine_management/creating_machinesets/creating-machineset-azure.adoc

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -16,3 +16,5 @@ include::modules/machineset-creating.adoc[leveloffset=+1]
1616
include::modules/machineset-non-guaranteed-instance.adoc[leveloffset=+1]
1717

1818
include::modules/machineset-creating-non-guaranteed-instances.adoc[leveloffset=+1]
19+
20+
include::modules/machineset-customer-managed-encryption-azure.adoc[leveloffset=+1]
Lines changed: 39 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,39 @@
1+
// Module included in the following assemblies:
2+
//
3+
// * machine_management/creating_machinesets/creating-machineset-gcp.adoc
4+
5+
[id="machineset-enabling-customer-managed-encryption-azure_{context}"]
6+
= Enabling customer-managed encryption keys for a machine set
7+
8+
You can supply an encryption key to Azure to encrypt data on managed disks at rest. You can enable server-side encryption with customer-managed keys by using the Machine API.
9+
10+
An Azure Key Vault, a disk encryption set, and an encryption key are required to use a customer-managed key. The disk encryption set must preside in a resource group where the Cloud Credential Operator (CCO) has granted permissions. If not, an additional reader role is required to be granted on the disk encryption set.
11+
12+
.Prerequisites
13+
14+
* link:https://docs.microsoft.com/en-us/azure/aks/azure-disk-customer-managed-keys#create-an-azure-key-vault-instance[Create an Azure Key Vault instance].
15+
* link:https://docs.microsoft.com/en-us/azure/aks/azure-disk-customer-managed-keys#create-an-instance-of-a-diskencryptionset[Create an instance of a disk encryption set].
16+
* link:https://docs.microsoft.com/en-us/azure/aks/azure-disk-customer-managed-keys#grant-the-diskencryptionset-access-to-key-vault[Grant the disk encryption set access to key vault].
17+
18+
.Procedure
19+
20+
. Configure the disk encryption set under the `providerSpec` field in your machine set YAML file. For example:
21+
+
22+
[source,yaml]
23+
----
24+
...
25+
providerSpec:
26+
value:
27+
...
28+
osDisk:
29+
diskSizeGB: 128
30+
managedDisk:
31+
diskEncryptionSet:
32+
id: /subscriptions/<subscription_id>/resourceGroups/<resource_group_name>/providers/Microsoft.Compute/diskEncryptionSets/<disk_encryption_set_name>
33+
storageAccountType: Premium_LRS
34+
...
35+
----
36+
37+
.Additional resources
38+
39+
* You can learn more about https://docs.microsoft.com/en-us/azure/virtual-machines/disk-encryption#customer-managed-keys[customer-managed keys] in the Azure documentation.

0 commit comments

Comments
 (0)