env zero has removed the requirement for setting up PersistentVolumeClaims (PVCs) when using env zero’s Self-Hosted Agents. env zero will encrypt (with a customer provided encryption key) the working directory and persist it in env zero’s secure cloud native file system.Documentation Index
Fetch the complete documentation index at: https://docs.envzero.com/llms.txt
Use this file to discover all available pages before exploring further.
How does it work
- Add a
"env0StateEncryptionKey" = "<your_base64_encoded_state_encryption_key>"key-value pair to your agent’s<your_agent_key>_values.yamlconfiguration file. On existing agents, upgrade helm to apply the changes made in your configuration file. The encryption key can be any random string. - When deploying an environment, the agent uses your encryption key to encrypt deployment state and working directory, and upload them to env zero’s secure cloud native file system.
About PrivacyWe don’t have access to your state files or your encryption key. Your encryption key belongs to you and your agent.
Key rotation
In case you want to change the encryption key, edit theenv0StateEncryptionKey value in your agent’s configuration file, and replace it with a different base64 encoded string.
Next steps
- Self-Hosted Kubernetes Agent - Set
env0StateEncryptionKeyduring Helm installation. - Custom/Optional Configuration - Reference all state and storage Helm values.
- HA/DR Strategy for Self-Hosted Agents - Use encrypted state to resume deployments across clusters.