oadm-ca-encrypt man page

oadm ca encrypt — Encrypt data with AES-256-CBC encryption


oadm ca encrypt [Options]


Encrypt data with AES-256-CBC encryption


File to write a randomly generated key to.
File containing the data to encrypt. Read from stdin if omitted.
File containing the encrypting key from in the format written by --genkey.
File to write the encrypted data to. Written to stdout if omitted.

Options Inherited from Parent Commands

DEPRECATED: The API version to use when talking to the server

Username to impersonate for the operation.

Path to a cert. file for the certificate authority.

Path to a client certificate file for TLS.

Path to a client key file for TLS.

The name of the kubeconfig cluster to use

Path to the config file to use for CLI requests.

The name of the kubeconfig context to use

The Google Cloud Platform Service Account JSON Key to use for authentication.

If true, the server's certificate will not be checked for validity. This will make your HTTPS connections insecure.

Maximum number of seconds between log flushes

Require server version to match client version

-n, --namespace=""
If present, the namespace scope for this CLI request.

The address and port of the Kubernetes API server

Bearer token for authentication to the API server.

The name of the kubeconfig user to use


# Encrypt the content of secret.txt with a generated key:
oadm ca encrypt --genkey=secret.key --in=secret.txt --out=secret.encrypted

# Encrypt the content of secret2.txt with an existing key:
oadm ca encrypt --key=secret.key < secret2.txt > secret2.encrypted

See Also



June 2016, Ported from the Kubernetes man-doc generator

Referenced By


Explore man page connections for oadm-ca-encrypt(1).

Openshift Openshift CLI User Manuals June 2016