1
0
mirror of https://github.com/openshift/openshift-docs.git synced 2026-02-05 21:46:22 +01:00

Add information for encrypt etcd disk

This commit is contained in:
Tami Love
2025-08-25 09:10:10 -04:00
parent 44da12846e
commit da2f4e1ea7
2 changed files with 15 additions and 0 deletions

View File

@@ -20,6 +20,12 @@ include::modules/microshift-install-rhel-tools-concepts.adoc[leveloffset=+1]
include::modules/microshift-install-rhde-steps.adoc[leveloffset=+1]
include::modules/microshift-encrypt-etcd-data.adoc[leveloffset=+1]
[role="_additional-resources"]
.Additional resources
* link:https://docs.redhat.com/en/documentation/red_hat_enterprise_linux/9/html/managing_storage_devices/encrypting-block-devices-using-luks_managing-storage-devices#luks-disk-encryption_encrypting-block-devices-using-luks[LUKS disk encryption]
[id="additional-resources_microshift-install-get-ready_{context}"]
[role="_additional-resources"]
== Additional resources

View File

@@ -0,0 +1,9 @@
// Module included in the following assembly:
//
// * microshift_install_get_ready/microshift-install-get-ready.adoc
:_mod-docs-content-type: CONCEPT
[id="microshift-encrypt-etcd-data_{context}"]
= Encrypt etcd data
Kubernetes objects are stored in an etcd database and might contain sensitive data. The etcd data is not encrypted by default. You can encrypt the disk that contains the etcd database by using the Linux Unified Key Setup-on-disk-format (LUKS) management tool for block device encryption.