Skip to main content

etcd Secrets Encryption at Rest

Understanding CoreWeave CKS cluster secrets encryption at rest

CoreWeave provides encryption at rest for etcd data in CoreWeave Kubernetes Service (CKS) clusters using a KMS-backed setup. For new CKS clusters created after June 24, 2025, this feature is enabled by default and requires no action from you.

Info

For existing CKS clusters created on or before June 24, 2025, you need to rotate your existing Kubernetes Secrets once. After that, CoreWeave handles the entire lifecycle securely and transparently.

In Kubernetes, Secrets are stored unencrypted in etcd by default. Encryption at rest is typically configured manually using a Key Management Service (KMS) provider.

With CKS, CoreWeave sets up and maintains this for you automatically.

Rotate secrets in existing clusters

If your CKS cluster was created before June 24, 2025, your existing Secrets may not yet be encrypted. To ensure full encryption coverage, you'll need to replace the existing Secrets once. Any new Secrets you create going forward will be encrypted automatically.

To rotate your Secrets in place, run:

Example
kubectl get secrets --all-namespaces -o json | kubectl replace -f -

Comparison to upstream Kubernetes

While Kubernetes offers encryption at rest as an optional config, CoreWeave enables it by default. Your CKS clusters have Secrets encryption at rest, with none of the operational burden.

ConceptUpstream KubernetesCoreWeave CKS
KMS providerYou choose and configure the providerCoreWeave
Who manages your keysYou manage your keysCoreWeave
Plugin configYou write and deploy it manuallyCoreWeave provisions and injects it automatically
Encryption scopeYou choose what to encryptCoreWeave encrypts Secrets by default
Key rotation, unseal, backupManual setup and maintenanceAutomated by CoreWeave