Encrypting cloud disks ensures data privacy and control, making it ideal for scenarios that demand high security or compliance standards. This section describes how to use the keys managed by Data Encryption Workshop (DEW) to encrypt EVS disks.
apiVersion: v1
kind: PersistentVolumeClaim
metadata:
name: pvc-evs-auto
namespace: default
annotations:
everest.io/disk-volume-type: SAS # EVS disk
everest.io/crypt-key-id: 37f202db-a970-4ac1-a506-e5c4f2d7ce69 # Encryption key ID, which can be obtained from DEW
labels:
failure-domain.beta.kubernetes.io/region: <your_region> # Region of the node where the application is to be deployed
failure-domain.beta.kubernetes.io/zone: <your_zone> # AZ of the node where the application is to be deployed
spec:
accessModes:
- ReadWriteOnce # The value must be ReadWriteOnce for EVS disks.
resources:
requests:
storage: 10Gi # EVS disk capacity, ranging from 1 to 32768
storageClassName: csi-disk # The storage class is EVS.
kubectl apply -f pvc-evs-auto.yaml