Skip to content

Commit 9fbc3b7

Browse files
authored
Merge pull request #104203 from mburke5678/node-encryption-azure-3-412
[enterprise-4.12] Added a section for day2 operator for azure disk encryption sets.
2 parents bc36395 + 2932306 commit 9fbc3b7

File tree

2 files changed

+82
-0
lines changed

2 files changed

+82
-0
lines changed

installing/installing_azure/enabling-user-managed-encryption-azure.adoc

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -8,6 +8,8 @@ toc::[]
88

99
In {product-title} version {product-version}, you can install a cluster with a user-managed encryption key in Azure. To enable this feature, you can prepare an Azure DiskEncryptionSet before installation, modify the `install-config.yaml` file, and then perform post-installation steps.
1010

11+
include::modules/installation-azure-day2-operations-diskencryptionsets.adoc[leveloffset=+1]
12+
1113
include::modules/installation-azure-preparing-diskencryptionsets.adoc[leveloffset=+1]
1214

1315
[id="enabling-disk-encryption-sets-azure-next-steps"]
Lines changed: 80 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,80 @@
1+
// Module included in the following assemblies:
2+
//
3+
// * installing/installing_azure/enabling-disk-encryption-sets-azure.adoc
4+
5+
:_mod-docs-content-type: PROCEDURE
6+
[id="installation-azure-day2-operations-diskencryptionsets.adoc_{context}"]
7+
= Preparing an Azure Disk Encryption Set for Day2 Operator
8+
9+
The {product-title} installation program can use an existing Disk Encryption Set with a user-managed key. To enable this feature, create a `DiskEncryptionSet` object in Azure and provide the key to the installation program.
10+
11+
.Prerequisite
12+
13+
* You enabled the `EncryptionAtHost` feature in your {azure-short} subscription. For more information, see "Use the Azure portal to enable end-to-end encryption using encryption at host".
14+
.Procedure
15+
16+
. Mark the node from the `encyptionAtHost` cluster resource group as unschedulable by using the following command:
17+
+
18+
[source,terminal]
19+
----
20+
$ oc adm cordon <node_name>
21+
----
22+
23+
. Evacuate the pods from the compute node. There are several ways to do this. For example, you can evacuate all the pods or the selected pods on a node:
24+
+
25+
[source,terminal]
26+
----
27+
$ oc adm drain <compute_node> [--pod-selector=<pod_selector>]
28+
----
29+
+
30+
[NOTE]
31+
====
32+
For other options to evacuate pods from a node, see the "Understanding how to evacuate pods on nodes" section.
33+
====
34+
35+
. De-allocate the node by running the following command:
36+
+
37+
[source,terminal]
38+
----
39+
$ az vm deallocate -n <node_name> -g <cluster_resource_group>
40+
----
41+
42+
. Set the `encryptionAtHost` property to `true` by running the following command:
43+
+
44+
[source,terminal]
45+
----
46+
$ az vm update -n <node_name> -g <cluster_resource_group> --set securityProfile.encryptionAtHost=true
47+
----
48+
49+
. Start the node by running the following commands:
50+
+
51+
[source,terminal]
52+
----
53+
$ az vm start -n <node_name> -g <cluster_resource_group>
54+
----
55+
56+
. Mark the node as schedulable by using the following command:
57+
+
58+
[source,terminal]
59+
----
60+
$ oc adm uncordon <node_name>
61+
----
62+
63+
. Verify that all cluster Operators are available:
64+
+
65+
[source,terminal]
66+
----
67+
$ oc get clusteroperators
68+
----
69+
+
70+
All Operators should show `AVAILABLE=True`, `PROGRESSING=False`, and `DEGRADED=False`.
71+
72+
. Repeat the above steps on all the nodes that run `encryptionAtHost`.
73+
74+
[NOTE]
75+
====
76+
If you want to enable encryption for your host during cluster installation, specify the following parameters in the `install-config.yaml` file:
77+
* `compute.platform.azure.encryptionAtHost`
78+
* `controlPlane.platform.azure.encryptionAtHost`
79+
* `platform.azure.defaultMachinePlatform.encryptionAtHost`
80+
====

0 commit comments

Comments
 (0)