Uploaded image for project: 'OpenShift Hosted Control Plane'
  1. OpenShift Hosted Control Plane
  2. HOSTEDCP-318

Enable etcd secret encryption by default, create appropriate STS role

XMLWordPrintable

    • Icon: Story Story
    • Resolution: Done
    • Icon: Major Major
    • None
    • None
    • None
    • None
    • Hypershift Sprint 9
    • 0
    • 0
    • 0

      Service delivery requires etcd secret encryption SDE-1598 
      We are currently not enabling etcd secret encryption by default. In order to support this, we should:

      1 - Modify `create cluster aws` and `create iam aws` to allow specifying an existing KMS key for etcd secret encryption so that the proper STS role can be created for it. 

      2 - Always enable etcd encryption. If a KMS key is not provided, generate a AESCBC key and store it in a secret. 

              cewong@redhat.com Cesar Wong
              cewong@redhat.com Cesar Wong
              Jie Zhao Jie Zhao
              Votes:
              0 Vote for this issue
              Watchers:
              2 Start watching this issue

                Created:
                Updated:
                Resolved: