{
  "id": "add-client-certificates",
  "title": "Add client certificates",
  "url": "https://redis.io/docs/latest/operate/kubernetes/7.8.4/security/add-client-certificates/",
  "summary": "Add client certificates to your REDB custom resource.",
  "content": "\nFor each client certificate you want to use with your database, you need to create a Kubernetes secret to hold it. You can then reference that secret in your Redis Enterprise database (REDB) custom resource spec.\n\n## Create a secret to hold the new certificate\n\n1. [Create the secret config file](https://kubernetes.io/docs/tasks/configmap-secret/managing-secret-using-config-file/) with the required fields shown below.\n\n    ```yaml\n    apiVersion: v1\n    kind: Secret\n    type: Opaque\n    metadata:\n      name: \u003cclient-cert-secret\u003e\n      namespace: \u003cyour-rec-namespace\u003e\n    data:\n      cert: \u003cclient-certificate\u003e\n    ```\n  \n1. Apply the file to create the secret resource.\n\n    ```bash\n    kubectl apply -f \u003cclient-cert-secret\u003e.yaml\n    ```\n\n## Edit the REDB resource\n\n1. Add the secret name to the REDB custom resource (`redb.yaml`) with the `clientAuthenticationCertificates` property in the `spec` section.\n\n  ```yaml\n   spec:\n      clientAuthenticationCertificates:\n      - \u003cclient-cert-secret\u003e\n  ```\n",
  "tags": ["docs","operate","kubernetes"],
  "last_updated": "2026-04-08T12:21:52-07:00"
}

