Update certificates in a Redis Enterprise cluster.
| Redis Enterprise Software |
|---|
You can use the rladmin command-line interface (CLI) or the REST API to update certificates. The Cluster Manager UI lets you update proxy, syncer, and internode encryption certificates on the Cluster > Security > Certificates screen.
To replace proxy, syncer, or internode encryption certificates using the Cluster Manager UI:
Go to Cluster > Security > Certificates.
Expand the section for the certificate you want to update:
Click Replace Certificate to open the dialog.
Replace proxy certificate dialog.Upload the key file.
Upload the new certificate.
Click Save.
New proxy and syncer certificates are used the next time clients connect to the database. For internode encryption certificates, the new certificates are used after they are replaced on all existing nodes in the cluster.
When you add a new node to the cluster, the certificates are automatically copied to the new node.
/etc/opt/redislabs. Instead, upload new certificates to a temporary location on one of the cluster nodes, such as the /tmp directory.This section describes how to update certificates for Replica Of databases.
To update the proxy certificate on clusters running Replica Of databases:
Use the Cluster Manager UI, rladmin, or the REST API to update the proxy certificate on the source database cluster.
From the Cluster Manager UI, update the destination database (replica) configuration with the new certificate.
To update proxy certificate on clusters running Active-Active databases:
Use the Cluster Manager UI, rladmin, or the REST API to update proxy certificates on a single cluster, multiple clusters, or all participating clusters.
Use the crdb-cli utility to update Active-Active database configuration from the command line. Run the following command once for each Active-Active database residing on the modified clusters:
crdb-cli crdb update --crdb-guid <CRDB-GUID> --force
crdb-cli crdb update operations between the two steps.To update your syncer certificate on clusters running Active-Active databases, follow these steps:
Update your syncer certificate on one or more of the participating clusters using the Cluster Manager UI, rladmin, or the REST API. You can update a single cluster, multiple clusters, or all participating clusters.
Update the Active-Active database configuration from the command line with the crdb-cli utility. Run this command once for each Active-Active database that resides on the modified clusters:
crdb-cli crdb update --crdb-guid <CRDB-GUID> --force
crdb-cli crdb update operations between the two steps.In RHEL 8, if the crypto policy is set to FUTURE, the system will not accept certificates with private key sizes smaller than 3072 bits. This affects the use of custom certificates with smaller keys (such as 2048-bit keys).
To use certificates with smaller key sizes, you need to change the crypto policy from FUTURE to DEFAULT. For more information about crypto policies, see the Red Hat documentation on system-wide cryptographic policies.