public sealed class AzureDatabaseEncryption : IMessage<AzureDatabaseEncryption>, IEquatable<AzureDatabaseEncryption>, IDeepCloneable<AzureDatabaseEncryption>, IBufferMessage, IMessage
Reference documentation and code samples for the Anthos Multi-Cloud v1 API class AzureDatabaseEncryption.
Configuration related to application-layer secrets encryption.
Anthos clusters on Azure encrypts your Kubernetes data at rest
in etcd using Azure Key Vault.
Required. The ARM ID of the Azure Key Vault key to encrypt / decrypt data.
For example:
/subscriptions/<subscription-id>/resourceGroups/<resource-group-id>/providers/Microsoft.KeyVault/vaults/<key-vault-id>/keys/<key-name>
Encryption will always take the latest version of the key and hence
specific version is not supported.
[[["Easy to understand","easyToUnderstand","thumb-up"],["Solved my problem","solvedMyProblem","thumb-up"],["Other","otherUp","thumb-up"]],[["Hard to understand","hardToUnderstand","thumb-down"],["Incorrect information or sample code","incorrectInformationOrSampleCode","thumb-down"],["Missing the information/samples I need","missingTheInformationSamplesINeed","thumb-down"],["Other","otherDown","thumb-down"]],["Last updated 2025-09-04 UTC."],[[["\u003cp\u003eThe \u003ccode\u003eAzureDatabaseEncryption\u003c/code\u003e class in the Google.Cloud.GkeMultiCloud.V1 namespace provides configuration for application-layer secrets encryption in Anthos clusters on Azure.\u003c/p\u003e\n"],["\u003cp\u003eThis class, which implements interfaces like \u003ccode\u003eIMessage\u003c/code\u003e, \u003ccode\u003eIEquatable\u003c/code\u003e, and \u003ccode\u003eIDeepCloneable\u003c/code\u003e, allows for the management of database encryption.\u003c/p\u003e\n"],["\u003cp\u003eAnthos clusters on Azure utilize Azure Key Vault to encrypt Kubernetes data at rest in etcd.\u003c/p\u003e\n"],["\u003cp\u003eThe class includes a \u003ccode\u003eKeyId\u003c/code\u003e property, which is required and represents the ARM ID of the Azure Key Vault key used for encryption and decryption.\u003c/p\u003e\n"],["\u003cp\u003eThe latest version, 2.8.0, of the \u003ccode\u003eAzureDatabaseEncryption\u003c/code\u003e class can be accessed with other available versions ranging from 1.0.0-beta01 to 2.7.0.\u003c/p\u003e\n"]]],[],null,["# Anthos Multi-Cloud v1 API - Class AzureDatabaseEncryption (2.8.0)\n\nVersion latestkeyboard_arrow_down\n\n- [2.8.0 (latest)](/dotnet/docs/reference/Google.Cloud.GkeMultiCloud.V1/latest/Google.Cloud.GkeMultiCloud.V1.AzureDatabaseEncryption)\n- [2.7.0](/dotnet/docs/reference/Google.Cloud.GkeMultiCloud.V1/2.7.0/Google.Cloud.GkeMultiCloud.V1.AzureDatabaseEncryption)\n- [2.6.0](/dotnet/docs/reference/Google.Cloud.GkeMultiCloud.V1/2.6.0/Google.Cloud.GkeMultiCloud.V1.AzureDatabaseEncryption)\n- [2.5.0](/dotnet/docs/reference/Google.Cloud.GkeMultiCloud.V1/2.5.0/Google.Cloud.GkeMultiCloud.V1.AzureDatabaseEncryption)\n- [2.4.0](/dotnet/docs/reference/Google.Cloud.GkeMultiCloud.V1/2.4.0/Google.Cloud.GkeMultiCloud.V1.AzureDatabaseEncryption)\n- [2.3.0](/dotnet/docs/reference/Google.Cloud.GkeMultiCloud.V1/2.3.0/Google.Cloud.GkeMultiCloud.V1.AzureDatabaseEncryption)\n- [2.2.0](/dotnet/docs/reference/Google.Cloud.GkeMultiCloud.V1/2.2.0/Google.Cloud.GkeMultiCloud.V1.AzureDatabaseEncryption)\n- [2.1.0](/dotnet/docs/reference/Google.Cloud.GkeMultiCloud.V1/2.1.0/Google.Cloud.GkeMultiCloud.V1.AzureDatabaseEncryption)\n- [2.0.0](/dotnet/docs/reference/Google.Cloud.GkeMultiCloud.V1/2.0.0/Google.Cloud.GkeMultiCloud.V1.AzureDatabaseEncryption)\n- [1.0.0-beta01](/dotnet/docs/reference/Google.Cloud.GkeMultiCloud.V1/1.0.0-beta01/Google.Cloud.GkeMultiCloud.V1.AzureDatabaseEncryption) \n\n public sealed class AzureDatabaseEncryption : IMessage\u003cAzureDatabaseEncryption\u003e, IEquatable\u003cAzureDatabaseEncryption\u003e, IDeepCloneable\u003cAzureDatabaseEncryption\u003e, IBufferMessage, IMessage\n\nReference documentation and code samples for the Anthos Multi-Cloud v1 API class AzureDatabaseEncryption.\n\nConfiguration related to application-layer secrets encryption.\n\nAnthos clusters on Azure encrypts your Kubernetes data at rest\nin etcd using Azure Key Vault. \n\nInheritance\n-----------\n\n[object](https://learn.microsoft.com/dotnet/api/system.object) \\\u003e AzureDatabaseEncryption \n\nImplements\n----------\n\n[IMessage](https://cloud.google.com/dotnet/docs/reference/Google.Protobuf/latest/Google.Protobuf.IMessage-1.html)[AzureDatabaseEncryption](/dotnet/docs/reference/Google.Cloud.GkeMultiCloud.V1/latest/Google.Cloud.GkeMultiCloud.V1.AzureDatabaseEncryption), [IEquatable](https://learn.microsoft.com/dotnet/api/system.iequatable-1)[AzureDatabaseEncryption](/dotnet/docs/reference/Google.Cloud.GkeMultiCloud.V1/latest/Google.Cloud.GkeMultiCloud.V1.AzureDatabaseEncryption), [IDeepCloneable](https://cloud.google.com/dotnet/docs/reference/Google.Protobuf/latest/Google.Protobuf.IDeepCloneable-1.html)[AzureDatabaseEncryption](/dotnet/docs/reference/Google.Cloud.GkeMultiCloud.V1/latest/Google.Cloud.GkeMultiCloud.V1.AzureDatabaseEncryption), [IBufferMessage](https://cloud.google.com/dotnet/docs/reference/Google.Protobuf/latest/Google.Protobuf.IBufferMessage.html), [IMessage](https://cloud.google.com/dotnet/docs/reference/Google.Protobuf/latest/Google.Protobuf.IMessage.html) \n\nInherited Members\n-----------------\n\n[object.GetHashCode()](https://learn.microsoft.com/dotnet/api/system.object.gethashcode) \n[object.GetType()](https://learn.microsoft.com/dotnet/api/system.object.gettype) \n[object.ToString()](https://learn.microsoft.com/dotnet/api/system.object.tostring)\n\nNamespace\n---------\n\n[Google.Cloud.GkeMultiCloud.V1](/dotnet/docs/reference/Google.Cloud.GkeMultiCloud.V1/latest/Google.Cloud.GkeMultiCloud.V1)\n\nAssembly\n--------\n\nGoogle.Cloud.GkeMultiCloud.V1.dll\n\nConstructors\n------------\n\n### AzureDatabaseEncryption()\n\n public AzureDatabaseEncryption()\n\n### AzureDatabaseEncryption(AzureDatabaseEncryption)\n\n public AzureDatabaseEncryption(AzureDatabaseEncryption other)\n\nProperties\n----------\n\n### KeyId\n\n public string KeyId { get; set; }\n\nRequired. The ARM ID of the Azure Key Vault key to encrypt / decrypt data.\n\nFor example:\n`/subscriptions/\u003csubscription-id\u003e/resourceGroups/\u003cresource-group-id\u003e/providers/Microsoft.KeyVault/vaults/\u003ckey-vault-id\u003e/keys/\u003ckey-name\u003e`\nEncryption will always take the latest version of the key and hence\nspecific version is not supported."]]