Skip to content

Commit c30d6ff

Browse files
authored
Merge pull request #90702 from apurvabhide17/OADP-5817-SSE-C-Encryption
OADP-5817: Removed incorrect information regarding SSE-C Encryption
2 parents fef3d7c + 1cfe1c4 commit c30d6ff

File tree

1 file changed

+1
-15
lines changed

1 file changed

+1
-15
lines changed

modules/oadp-ssec-encrypted-backups.adoc

+1-15
Original file line numberDiff line numberDiff line change
@@ -57,26 +57,12 @@ The following procedure contains an example of a `spec:backupLocations` block th
5757
$ dd if=/dev/urandom bs=1 count=32 > sse.key
5858
----
5959

60-
.. Encode the `sse.key` by using Base64 and save the result as a file named `sse_encoded.key` by running the following command:
61-
+
62-
[source,terminal]
63-
----
64-
$ cat sse.key | base64 > sse_encoded.key
65-
----
66-
67-
.. Link the file named `sse_encoded.key` to a new file named `customer-key` by running the following command:
68-
+
69-
[source,terminal]
70-
----
71-
$ ln -s sse_encoded.key customer-key
72-
----
73-
7460
. Create an {product-title} secret:
7561
** If you are initially installing and configuring {oadp-short}, create the AWS credential and encryption key secret at the same time by running the following command:
7662
+
7763
[source,terminal]
7864
----
79-
$ oc create secret generic cloud-credentials --namespace openshift-adp --from-file cloud=<path>/openshift_aws_credentials,customer-key=<path>/sse_encoded.key
65+
$ oc create secret generic cloud-credentials --namespace openshift-adp --from-file cloud=<path>/openshift_aws_credentials,customer-key=<path>/sse.key
8066
----
8167
** If you are updating an existing installation, edit the values of the `cloud-credential` `secret` block of the `DataProtectionApplication` CR manifest, as in the following example:
8268
+

0 commit comments

Comments
 (0)