Add client certificates

Add client certificates to your REDB custom resource.

For each client certificate you want to use with your database, you need to create a Kubernetes secret to hold it. You can then reference that secret in your Redis Enterprise database (REDB) custom resource spec.

Create a secret to hold the new certificate

  1. Create the secret config file with the required fields shown below.

    apiVersion: v1
    kind: Secret
    type: Opaque
    metadata:
      name: <client-cert-secret>
      namespace: <your-rec-namespace>
    data:
      cert: <client-certificate>
    
  2. Apply the file to create the secret resource.

    kubectl apply -f <client-cert-secret>.yaml
    

Edit the REDB resource

  1. Add the secret name to the REDB custom resource (redb.yaml) with the clientAuthenticationCertificates property in the spec section.
 spec:
    clientAuthenticationCertificates:
    - <client-cert-secret>
RATE THIS PAGE
Back to top ↑