This guide helps you install, understand, and operate the etcd Encryption Manager in to automate etcd data encryption key rotation within your clusters.
It ensures that sensitive data stored in etcd, such as secrets and configmaps, is encrypted using a secure algorithm, enhancing your cluster’s security.
See Cluster Plugin for installation instructions.
Note:
Currently supported:
- On-Premises clusters
- DCS clusters
Not supported:
global cluster
Upon installation, an etcd-encryption-manager
controller is deployed in the kube-system
namespace, which:
kube-apiserver
to hot reload new keys.Cluster stability is maintained throughout these operations.
Parameter | Value |
---|---|
Encrypted resources | secrets, configmaps |
Encryption algorithm | 256-bit AES-GCM |
Rotation interval | 168 hours (7 days) |
Path | Content |
---|---|
/etc/kubernetes/encryption-provider.conf | Current encryption configuration |
/etc/kubernetes/encryption-provider-history.bak | Historical key records (for recovery) |
/etc/kubernetes/encryption-provider-bak/ | Expired encryption configuration versions |
Run the following command to check the current rotation status:
Example output: