Enable encryption of etcd secrets by an Azure Key Vault managed key.
Khaled (Kal) Henidak [[email protected]]
Azure
WIP: https://github.com/Azure/acs-engine/issues/1116
Brendan Burns, Anthony Howe (Not yet agreed upon, proposed)
Brendan Burns (Not yet agreed upon, Proposed)
N/A
N/A
1.9
/sig azure
@jdumars can you mention GitHub ID of Khaled (or assign this feature directly to him)?
Also, please, describe in which stage (alpha/beta/stable) will this feature land in 1.8?
@idvoretskyi this step in the feature process is stable, but lays the groundwork for later integration.
@jdumars unfortunately, @khenidak is not a member of Kubernetes org, so the feature can't be assigned to him on GitHub. Can you suggest someone from the org, who can shadow him with this role?
/assign @brendandburns
@jdumars @brendandburns @kubernetes/sig-azure-misc can you confirm that this feature targets 1.8?
If yes, please, update the features tracking spreadsheet with the feature data, otherwise, let's remove this item from 1.8 milestone.
Thanks
@idvoretskyi removed from milestone, also removing help wanted label to make your life easier.
Docs will be needed, and provided by @Khenidak
This is on hold indefinitely.
@jdumars thanks for updating
With Kubernetes 1.10 the alpha support for gRPC KMS, it's now possible to implement this as an out-of-tree integration.
@pires looks like @khenidak has already implemented this stuff :) https://github.com/Azure/kubernetes-kms
yes and yes :-) but its @ritazh who is driving the work.
@khenidak
Any plans for this in 1.11?
If so, can you please ensure the feature is up-to-date with the appropriate:
stage/{alpha,beta,stable}
sig/*
kind/feature
/assign @khenidak
cc @idvoretskyi
This feature current has no milestone, so we'd like to check in and see if there are any plans for this in Kubernetes 1.12.
If so, please ensure that this issue is up-to-date with ALL of the following information:
Set the following:
Once this feature is appropriately updated, please explicitly ping @justaugustus, @kacole2, @robertsandoval, @rajendar38 to note that it is ready to be included in the Features Tracking Spreadsheet for Kubernetes 1.12.
Please make sure all PRs for features have relevant release notes included as well.
Happy shipping!
P.S. This was sent via automation
@khenidak @ritazh I'm doing some clean up. According to https://github.com/kubernetes/kubernetes/pull/48574 it looks like this has been merged. Can we close this issue?
@khenidak @ritazh bump for previous comment
Issues go stale after 90d of inactivity.
Mark the issue as fresh with /remove-lifecycle stale
.
Stale issues rot after an additional 30d of inactivity and eventually close.
If this issue is safe to close now please do so with /close
.
Send feedback to sig-testing, kubernetes/test-infra and/or fejta.
/lifecycle stale
yes, this was addressed by the KMS integration point and promoted in 1.13
/close
@liggitt: Closing this issue.
In response to this:
yes, this was addressed by the KMS integration point and promoted in 1.13
/close
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.
Most helpful comment
@pires looks like @khenidak has already implemented this stuff :) https://github.com/Azure/kubernetes-kms