An Azure service that provides serverless Kubernetes, an integrated continuous integration and continuous delivery experience, and enterprise-grade security and governance.
Hello Robin,
Thank you for the detailed explanation and for your patience while we reviewed this with the engineering teams.
We have checked this scenario with engineering team, and the behavior you observed is expected. When auto-rotation is enabled on the Disk Encryption Set, the DES will automatically update to the latest Key Vault key version after CMK rotation, and this does not require a node pool rescale or an AKS upgrade. The existing nodes continue to function normally, and encryption at host or any internal key caching mechanism does not change this behavior.
Regarding the documentation reference you mentioned, the rescale or upgrade steps apply in scenarios where auto-rotation is not enabled or when a manual key adoption process is required. In your case, since auto-rotation is enabled, the platform handles the transition seamlessly in the background.
For the second scenario, where a separate CMK is used for PVC-backed data disks, the behavior you observed is also expected. If the CMK is deleted or becomes unavailable, the associated disk cannot be decrypted, which can lead to the node becoming unavailable. Because of this dependency, it is important to ensure that customer-managed keys used for disk encryption are not deleted or disabled while they are still in use.
Overall, your observations are aligned with the expected platform behavior.
Hope this resolved your query. Please let me know if you have any queries.