Edit Redis Enterprise remote clusters

Edit the configuration details of an existing RERC with Redis Enterprise for Kubernetes.

Note:
This feature is supported for general availability in releases 6.4.2-6 and later. Some of these features were available as a preview in 6.4.2-4 and 6.4.2-5. Please upgrade to 6.4.2-6 for the full set of general availability features and bug fixes. and later.

Before a RedisEnterpriseCluster (REC) can participate in an Active-Active database, it needs an accompanying RedisEnterpriseRemoteCluster (RERC) custom resource. The RERC contains details allowing the REC to link to the RedisEnterpriseActiveActiveDatabase (REAADB). The RERC resource is listed in the REAADB resource to become a participating cluster for the Active-Active database.

The RERC controller periodically connects to the local REC endpoint via its external address, to ensure it’s setup correctly. For this to work, the external load balancer must support NAT hairpinning. In some cloud environments, this may involve disabling IP preservation for the load balancer target groups.

For more details, see the RERC API reference.

Edit RERC

Use the kubectl patch rerc <rerc-name> --type merge --patch command to patch the local RERC custom resource with your changes. For a full list of available fields, see the RERC API reference.

The following example edits the dbFqdnSuffix field for the RERC named rerc-ohare.

kubectl patch rerc rerc-ohare --type merge --patch \
'{"spec":{"dbFqdnSuffix": "-example2-cluster-rec-chicago-ns-illinois.example.com"}}'

Update RERC secret

If the credentials are changed or updated for a REC participating cluster, you need to manually edit the RERC secret and apply it to all participating clusters.

  1. On the local cluster, update the secret with new credentials and name it with the following convention: redis-enterprise-<rerc-name>.

    A secret for a remote cluster named rerc-ohare would be similar to the following:

    apiVersion: v1
    data:
      password: PHNvbWUgcGFzc3dvcmQ+
      username: PHNvbWUgdXNlcj4
    kind: Secret
    metadata:
      name: redis-enterprise-rerc-ohare
    type: Opaque
    
  2. Apply the file.

    kubectl apply -f <secret-file>
    
  3. Watch the RERC to verify the status is "Active" and the spec status is "Valid."

    kubectl get rerc <rerc-name>
    

    The output should look like this:

     NAME        STATUS   SPEC STATUS   LOCAL
      rerc-ohare   Active   Valid         true
    

    To troubleshoot invalid configurations, view the RERC custom resource events and the Redis Enterprise operator logs.

  4. Verify the status of each REAADB using that RERC is "Active" and the spec status is "Valid."

    kubectl get reaadb reaadb-boeing
    
    NAME              STATUS   SPEC STATUS   LINKED REDBS   REPLICATION STATUS
    reaadb-boeing     active   Valid                        up
    

    To troubleshoot invalid configurations, view the RERC custom resource events and the Redis Enterprise operator logs.

  5. Repeat the above steps on all other participating clusters.

RATE THIS PAGE
Back to top ↑