You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardexpand all lines: docs/rotation.md
+2-2
Original file line number
Diff line number
Diff line change
@@ -13,7 +13,7 @@ This guide demonstrates steps required to update your cluster to use a new KMS k
13
13
14
14
To rotate the encrypt/decrypt key in the cluster, you'll need to run 2 kms plugin pods simultaneously listening on different unix sockets before making the transition.
15
15
16
-
For all Kubernetes master nodes, add the static pod manifest to `/etc/kubernetes/manifests`
16
+
For all Kubernetes control plane nodes, add the static pod manifest to `/etc/kubernetes/manifests`
17
17
18
18
```yaml
19
19
apiVersion: v1
@@ -122,7 +122,7 @@ resources:
122
122
### 4. Restart all `kube-apiserver`
123
123
124
124
* Proceed to the next step if using a single `kube-apiserver`
125
-
* If using multi-master, restart the `kube-apiserver` to ensure each server can still decrypt using the new key in the encryption config.
125
+
* If using multiple control plane nodes, restart the `kube-apiserver` to ensure each server can still decrypt using the new key in the encryption config.
126
126
* To validate the decryption still works, run `kubectl get secret <secret name> -o yaml` with one of the existing secrets to confirm the data is returned and is valid.
127
127
128
128
### 5. Switch the order of provider in the encryption config
0 commit comments