Skip to content

Commit 4f89945

Browse files
scrollable tables
1 parent ed16e8c commit 4f89945

File tree

1 file changed

+6
-0
lines changed
  • content/operate/kubernetes/security

1 file changed

+6
-0
lines changed

content/operate/kubernetes/security/vault.md

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -16,6 +16,7 @@ You can configure HashiCorp Vault as the centralized secret management system fo
1616

1717
When Vault integration is enabled, all secrets referenced in Redis Enterprise custom resources are retrieved from Vault instead of Kubernetes secrets, including:
1818

19+
{{<table-scrollable>}}
1920
| **Category** | **Secret Type** | **API Field** | **Description** |
2021
|---|---|---|---|
2122
| **Cluster secrets** | | | |
@@ -40,6 +41,7 @@ When Vault integration is enabled, all secrets referenced in Redis Enterprise cu
4041
| **Other secrets** | | | |
4142
| | [Remote cluster secrets]({{< relref "/operate/kubernetes/active-active" >}}) | [`secretName`]({{< relref "/operate/kubernetes/reference/api/redis_enterprise_remote_cluster_api#redisenterpriseremoteclusterspec" >}}) | Credentials for Redis Enterprise Remote Cluster (RERC) configurations |
4243
| | [Active-Active database secrets]({{< relref "/operate/kubernetes/active-active" >}}) | [`globalConfigurations`]({{< relref "/operate/kubernetes/reference/api/redis_enterprise_active_active_database_api#redisenterpriseactiveactivedatabasespec" >}}) | All secret names specified in REAADB global configurations |
44+
{{</table-scrollable>}}
4345

4446

4547
For complete details on supported secrets, see the [`RedisEnterpriseCluster` API reference]({{< relref "/operate/kubernetes/reference/api/redis_enterprise_cluster_api" >}}) and [`RedisEnterpriseDatabase` API reference]({{< relref "/operate/kubernetes/reference/api/redis_enterprise_database_api" >}}).
@@ -177,6 +179,7 @@ Multi-cluster considerations: When deploying across multiple Kubernetes clusters
177179
178180
Configuration parameters:
179181
182+
{{<table-scrollable>}}
180183
| Parameter | Description | Default | Required |
181184
|-----------|-------------|---------|----------|
182185
| `CREDENTIAL_TYPE` | Must be set to `"vault"` to enable Vault integration | - | Yes |
@@ -188,6 +191,7 @@ Multi-cluster considerations: When deploying across multiple Kubernetes clusters
188191
| `VAULT_AUTH_PATH` | Kubernetes auth method path | `kubernetes` | Yes |
189192
| `VAULT_NAMESPACE` | Vault Enterprise namespace | - | Enterprise only |
190193
| `VAULT_CACHE_SECRET_EXPIRATION_SECONDS` | Secret cache duration | `120` | No |
194+
{{</table-scrollable>}}
191195
192196
Secret path construction: Secrets are stored at `<VAULT_SECRET_ROOT>/data/<VAULT_SECRET_PREFIX>/<secret-name>`
193197
@@ -317,13 +321,15 @@ Multi-cluster considerations: When deploying across multiple Kubernetes clusters
317321
318322
Key configuration fields:
319323
324+
{{<table-scrollable>}}
320325
| Field | Description | Example |
321326
|-------|-------------|---------|
322327
| `clusterCredentialSecretName` | Name of the secret in Vault containing cluster credentials | `rec` |
323328
| `clusterCredentialSecretType` | Must be set to `vault` | `vault` |
324329
| `clusterCredentialSecretRole` | Vault role for cluster authentication | `redis-enterprise-rec-<K8S_NAMESPACE>` |
325330
| `vaultCASecret` | Kubernetes secret containing Vault's CA certificate | `vault-ca-cert` |
326331
| `podAnnotations` | Vault agent annotations for pod-level configuration | See example above |
332+
{{</table-scrollable>}}
327333
328334
329335

0 commit comments

Comments
 (0)