Add client certificates
Add client certificates to your REDB custom resource.
For each client certificate you want to use with your database, you need to create a Kubernetes secret to hold it. You can then reference that secret in your Redis Enterprise database (REDB) custom resource spec.
Create a secret to hold the new certificate
-
Create the secret config file with the required fields shown below.
apiVersion: v1 kind: Secret type: Opaque metadata: name: <client-cert-secret> namespace: <your-rec-namespace> data: cert: <client-certificate>
-
Apply the file to create the secret resource.
kubectl apply -f <client-cert-secret>.yaml
Edit the REDB resource
- Add the secret name to the REDB custom resource (
redb.yaml
) with theclientAuthenticationCertificates
property in thespec
section.
spec:
clientAuthenticationCertificates:
- <client-cert-secret>