Encrypting Secret Data at REST
Understand how to encrypt secret data at REST in Kubernetes.
Steps of Encrypting Secret Data at REST
Step 2: Understand the encryption configuration
- Here got a lot of providers, this order matters, as the first provider which is identity will encrypt the data first, then it could use any of these (aesgcm, aescbc, secretbox, etc) to decrypt.
- So since the identity it empty, meaning no encryption at all, so if you want to encrypt your data, then you should choose and place either one (aesgcm, aescbc, secretbox) at the first place.
Step 4: Create a new encryption configuration file
Create a new file called enc.yaml
and replace the secret value with the newly generated encryption key.
Step 5: Apply this config file to kube-apiserver
static pod
Step 6: Restart the kube-apiserver
If not mistaken, it will auto restart once you save the file, if not, you can restart it manually.
Step 7: Test the encryption
7.1 Check whether the etcd cmd exists
7.2 Create a new secret
7.3 Read the secret out of etcd
The output is similar to this (abbreviated):
Now your data is encrypted at REST. Congratulations!