[[["易于理解","easyToUnderstand","thumb-up"],["解决了我的问题","solvedMyProblem","thumb-up"],["其他","otherUp","thumb-up"]],[["很难理解","hardToUnderstand","thumb-down"],["信息或示例代码不正确","incorrectInformationOrSampleCode","thumb-down"],["没有我需要的信息/示例","missingTheInformationSamplesINeed","thumb-down"],["翻译问题","translationIssue","thumb-down"],["其他","otherDown","thumb-down"]],["最后更新时间 (UTC):2025-04-03。"],[[["Apigee hybrid encrypts KMS, KVM, and cache data by default using AES-128 encryption, with keys stored as Kubernetes Secrets."],["Encryption keys have varying scopes: KMS keys are organization-wide, KVM keys can be organization or environment-specific, and cache keys are environment-specific."],["While default encryption keys are provided, custom keys can be implemented by modifying the overrides file during initial Apigee hybrid installation, including generating new Base64-encoded keys of 16, 24, or 32 bytes in length."],["Changing encryption keys after the runtime is established will render previously encrypted data unusable; only newly added data will be encrypted with the updated keys."],["Disabling encryption during the initial setup will cause data to be stored unencrypted, and enabling it later will only encrypt future data, while existing unencrypted data will remain as such, however the system will continue working correctly."]]],[]]