You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
-[Add client certificates]({{< relref "/operate/kubernetes/7.22/security/add-client-certificates" >}}) - Set up client certificate authentication for databases
Reference these secrets in your REC specification under `spec.certificates`. See [Internode encryption]({{< relref "/operate/kubernetes/7.22/security/internode-encryption">}}) forcomplete configuration details.
102
+
83
103
## Best practices
84
104
85
105
- Store sensitive configuration in Secrets rather than directly in YAML files.
Internode encryption provides added security by encrypting communication between nodes in your Redis Enterprise cluster (REC).
14
14
15
+
## Enable internode encryption
16
+
15
17
Enable internode encryption in the `spec` section of your REC custom resource file.
16
18
17
19
```yaml
@@ -24,8 +26,111 @@ This change will apply to all databases created in the REC. You can override the
24
26
Edit your Redis Enterprise database (REDB) custom resource file to disable internode encryption for only that database.
25
27
26
28
```yaml
27
-
spec:
29
+
spec:
28
30
dataInternodeEncryption: false
29
31
```
30
32
31
33
To learn more about internode encryption, see [Internode encryption for Redis Enterprise Software]({{< relref "/operate/rs/security/encryption/internode-encryption.md" >}}).
34
+
35
+
## Use custom certificates for internode encryption
36
+
37
+
By default, Redis Enterprise uses self-signed certificates for internode encryption. You can provide your own certificates for both control plane and data plane internode encryption by storing them in Kubernetes secrets and referencing them in your REC specification.
38
+
39
+
### Prerequisites
40
+
41
+
- Certificates must be in PEM format
42
+
- You must create the Kubernetes secrets before referencing them in the REC spec
43
+
- Certificates should include the full certificate chain if using a certificate authority
44
+
45
+
### Create secrets for internode encryption certificates
46
+
47
+
Create Kubernetes secrets to store your internode encryption certificates. You need separate secrets for control plane and data plane encryption.
48
+
49
+
1. Create a secret for control plane internode encryption:
You can configure one or both certificate types. If you don't specify a certificate secret name, the cluster uses a self-signed certificate for that encryption type.
80
+
81
+
Apply the updated REC specification:
82
+
83
+
```sh
84
+
kubectl apply -f <rec-file>.yaml
85
+
```
86
+
87
+
### Certificate rotation
88
+
89
+
You can rotate internode encryption certificates using either of these methods:
90
+
91
+
#### Method 1: Update the existing secret
92
+
93
+
Edit the certificate data in the existing Kubernetes secret. The operator automatically detects the change and applies the new certificate.
When you remove a certificate secret reference from the REC specification, the operator does not delete the certificate from the Redis Enterprise cluster. The cluster continues to use the previously configured certificate until you explicitly replace it or the cluster reverts to using a self-signed certificate.
131
+
132
+
## More info
133
+
134
+
- [Manage REC certificates]({{< relref "/operate/kubernetes/7.22/security/manage-rec-certificates" >}}) - General certificate management for Redis Enterprise clusters
135
+
- [Configuration secrets]({{< relref "/operate/kubernetes/7.22/security/configuration-secrets" >}}) - Best practices for storing configuration in Kubernetes secrets
136
+
- [Internode encryption for Redis Enterprise Software]({{< relref "/operate/rs/security/encryption/internode-encryption.md" >}}) - Detailed information about how internode encryption works
--from-literal=name=<proxy | api | cm | syncer | metrics_exporter>
27
+
--from-literal=name=<proxy | api | cm | syncer | metrics_exporter| cp_internode_encryption | dp_internode_encryption>
28
28
```
29
29
30
+
{{<note>}}For internode encryption certificates, see [Internode encryption]({{< relref "/operate/kubernetes/7.22/security/internode-encryption" >}}) for detailed configuration instructions.{{</note>}}
31
+
30
32
## Update certificates in the REC custom resource
31
33
32
34
Edit the Redis Enterprise cluster (REC) custom resource to add a `certificates` subsection under the `spec` section. You are only required to add the fields for the certificates you are installing.
0 commit comments