adamant-kite-43734
01/14/2025, 7:16 AMcreamy-pencil-82913
01/14/2025, 5:24 PMsalmon-dress-95863
01/14/2025, 5:59 PMServer Encryption Hashes: All hashes match
creamy-pencil-82913
01/14/2025, 6:04 PMsalmon-dress-95863
01/14/2025, 6:04 PMsalmon-dress-95863
01/14/2025, 6:05 PMsalmon-dress-95863
01/14/2025, 6:07 PMcreamy-pencil-82913
01/14/2025, 6:07 PMsalmon-dress-95863
01/14/2025, 6:08 PMsalmon-dress-95863
01/14/2025, 6:10 PMcreamy-pencil-82913
01/14/2025, 6:13 PMsalmon-dress-95863
01/14/2025, 6:15 PM{"kind":"EncryptionConfiguration","apiVersion":"<http://apiserver.config.k8s.io/v1|apiserver.config.k8s.io/v1>","resources":[{"resources":["secrets"],"providers":[{"aescbc":{"keys":[{"name":"aescbckey","secret":"<hidden>="}]}},{"identity":{}}]}]}
salmon-dress-95863
01/14/2025, 6:41 PMk3s secrets-encrypt disable
and it reported it is disabled (but left --secrets-encryption
in k3s startup arguments and appears to have successfully updated to Server Version: v1.31.4+k3s1
. secrets-encrypt list status still reports that it is disabled. What does --secrets-encryption
do in that case? Or does k3s secrets-encrypt disable
overwrite the CLI argument?creamy-pencil-82913
01/14/2025, 6:47 PMsalmon-dress-95863
01/14/2025, 6:48 PMcreamy-pencil-82913
01/14/2025, 6:50 PMsalmon-dress-95863
01/14/2025, 6:50 PM# k3s secrets-encrypt status
Encryption Status: Disabled, no configuration file found
creamy-pencil-82913
01/14/2025, 6:53 PMcreamy-pencil-82913
01/14/2025, 6:54 PMsalmon-dress-95863
01/14/2025, 6:54 PMcreamy-pencil-82913
01/14/2025, 6:55 PMsalmon-dress-95863
01/14/2025, 7:00 PM{
"kind": "EncryptionConfiguration",
"apiVersion": "<http://apiserver.config.k8s.io/v1|apiserver.config.k8s.io/v1>",
"resources": [
{
"resources": [
"secrets"
],
"providers": [
{
"aescbc": {
"keys": [
{
"name": "aescbckey",
"secret": "key="
}
]
}
},
{
"identity": {}
}
]
}
]
}
New:
{
"kind": "EncryptionConfiguration",
"apiVersion": "<http://apiserver.config.k8s.io/v1|apiserver.config.k8s.io/v1>",
"resources": [
{
"resources": [
"secrets"
],
"providers": [
{
"identity": {}
},
{
"aescbc": {
"keys": [
{
"name": "aescbckey",
"secret": "key="
}
]
}
}
]
}
]
}
Is there any easy way to confirm the arguments to the daemon?salmon-dress-95863
01/14/2025, 7:03 PMEnvironmentFile=-/etc/systemd/system/k3s.service.env
and:
CMD_K3S_EXEC="server --secrets-encryption --flannel-backend=none --disable-network-policy --resolv-conf=/data/kubernetes/resolv.conf --kube-controller-manager-arg terminated-pod-gc-threshold=5"
salmon-dress-95863
01/15/2025, 6:33 AM3s secrets-encrypt status
to state that there is no config file. Is it documented which files are relevant? As asked earlier, does it exist a good way to confirm that the expected commandline arguments are actually passed to k3s? Couldn't find anything about it in the systemd journalsalmon-dress-95863
01/15/2025, 4:48 PMk3s secrets-encrypt
looking in when deciding whether encryption is enabled or not?salmon-dress-95863
01/15/2025, 5:10 PMCMD_K3S_EXEC
is not accepted any more. Added the arguments to Exec= string directly in systemd unit file and it workscreamy-pencil-82913
01/15/2025, 5:50 PMsalmon-dress-95863
01/15/2025, 5:51 PMcreamy-pencil-82913
01/15/2025, 5:55 PMsalmon-dress-95863
01/15/2025, 5:59 PMsalmon-dress-95863
01/15/2025, 6:01 PMcreamy-pencil-82913
01/15/2025, 6:10 PMsalmon-dress-95863
01/15/2025, 6:12 PMsalmon-dress-95863
01/15/2025, 6:13 PMcreamy-pencil-82913
01/15/2025, 6:21 PM