[[["易于理解","easyToUnderstand","thumb-up"],["解决了我的问题","solvedMyProblem","thumb-up"],["其他","otherUp","thumb-up"]],[["很难理解","hardToUnderstand","thumb-down"],["信息或示例代码不正确","incorrectInformationOrSampleCode","thumb-down"],["没有我需要的信息/示例","missingTheInformationSamplesINeed","thumb-down"],["翻译问题","translationIssue","thumb-down"],["其他","otherDown","thumb-down"]],["最后更新时间 (UTC):2025-04-02。"],[[["Apigee hybrid runtime plane encrypts KMS, KVM, and cache data by default, using keys that are stored as Kubernetes Secrets and utilize AES-128 encryption."],["Encryption keys for KMS data have organization scope, while KVM keys can have organization or environment scope, and cache keys have environment scope."],["While default encryption keys are provided, they can be replaced with custom Base64-encoded keys that are 16, 24, or 32 bytes long, but doing so after initial setup will make previously encrypted data unusable."],["If encryption keys are removed during the first installation of Apigee hybrid, data is stored unencrypted, but enabling encryption later will encrypt only new data, and existing data will remain unencrypted."],["Changing the encryption keys after runtime data is encrypted is not possible, so if you are looking to replace the default keys, you should do it at the initial install."]]],[]]