[[["易于理解","easyToUnderstand","thumb-up"],["解决了我的问题","solvedMyProblem","thumb-up"],["其他","otherUp","thumb-up"]],[["很难理解","hardToUnderstand","thumb-down"],["信息或示例代码不正确","incorrectInformationOrSampleCode","thumb-down"],["没有我需要的信息/示例","missingTheInformationSamplesINeed","thumb-down"],["翻译问题","translationIssue","thumb-down"],["其他","otherDown","thumb-down"]],["最后更新时间 (UTC):2025-04-03。"],[[["Apigee hybrid encrypts KMS, KVM, and cache data by default using AES-128 encryption, with keys stored as Kubernetes Secrets in the runtime plane."],["Encryption keys have specific scopes, with KMS keys at the organization level, KVM keys at either organization or environment level, and cache keys at the environment level."],["While default encryption keys are provided, users can replace them during initial Apigee hybrid installation, but changing keys post-installation will render previously encrypted data unusable."],["To replace default keys, users must provide Base64-encoded strings of 16, 24, or 32 bytes in their overrides file, and then apply these changes with the appropriate `apigeectl` command."],["If encryption is removed during initial install, existing data will not be encrypted, but any new data entered after enabling encryption will be encrypted, and the system can function normally with both encrypted and unencrypted data."]]],[]]