For each client certificate you want to use with your database, you need to create a Kubernetes secret to hold it. You can then reference that secret in your Redis Enterprise database (REDB) custom resource spec.

Create a secret to hold the new certificate

  1. Create the secret config file with the required fields shown below.

    apiVersion: v1
    kind: Secret
    type: Opaque
      name: <client-cert-secret>
      namespace: <your-rec-namespace>
      cert: <client-certificate>
  2. Apply the file to create the secret resource.

    kubectl apply -f <client-cert-secret>.yaml

Edit the REDB resource

  1. Add the secret name to the REDB custom resource (redb.yaml) with the clientAuthenticationCertificates property in the spec section.
    - <client-cert-secret>