You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: content/operate/kubernetes/security/vault.md
+6Lines changed: 6 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -16,6 +16,7 @@ You can configure HashiCorp Vault as the centralized secret management system fo
16
16
17
17
When Vault integration is enabled, all secrets referenced in Redis Enterprise custom resources are retrieved from Vault instead of Kubernetes secrets, including:
||[Active-Active database secrets]({{< relref "/operate/kubernetes/active-active" >}}) |[`globalConfigurations`]({{< relref "/operate/kubernetes/reference/api/redis_enterprise_active_active_database_api#redisenterpriseactiveactivedatabasespec" >}}) | All secret names specified in REAADB global configurations |
44
+
{{</table-scrollable>}}
43
45
44
46
45
47
For complete details on supported secrets, see the [`RedisEnterpriseCluster` API reference]({{< relref "/operate/kubernetes/reference/api/redis_enterprise_cluster_api" >}}) and [`RedisEnterpriseDatabase` API reference]({{< relref "/operate/kubernetes/reference/api/redis_enterprise_database_api" >}}).
@@ -177,6 +179,7 @@ Multi-cluster considerations: When deploying across multiple Kubernetes clusters
177
179
178
180
Configuration parameters:
179
181
182
+
{{<table-scrollable>}}
180
183
| Parameter | Description | Default | Required |
181
184
|-----------|-------------|---------|----------|
182
185
| `CREDENTIAL_TYPE` | Must be set to `"vault"` to enable Vault integration | - | Yes |
@@ -188,6 +191,7 @@ Multi-cluster considerations: When deploying across multiple Kubernetes clusters
0 commit comments