| Redis Enterprise Software |
|---|
You can change TLS protocols to improve the security of your Redis Enterprise cluster and databases. The default settings are in line with industry best practices, but you can customize them to match the security policy of your organization.
The communications for which you can modify TLS protocols are:
You can configure TLS protocols with the Cluster Manager UI, rladmin, or the REST API.
After you set the minimum TLS version, Redis Enterprise Software does not accept communications with TLS versions older than the specified version.
If you set TLS 1.3 as the minimum TLS version, clients must support TLS 1.3 to connect to Redis Enterprise.
TLS support depends on the operating system. You cannot enable support for protocols or versions that aren't supported by the operating system running Redis Enterprise Software. In addition, updates to the operating system or to Redis Enterprise Software can impact protocol and version support.
If you have trouble enabling specific versions of TLS, verify that they're supported by your operating system and that they're configured correctly.
To configure minimum TLS versions using the Cluster Manager UI:
Go to Cluster > Security, then select the TLS tab.
Click Edit.
Select the minimum TLS version for cluster connections, database connections, and the discovery service:
Cluster > Security > TLS settings in edit mode in the Cluster Manager UI.Select the TLS mode for the discovery service:
Click Save.
To set the minimum TLS protocol for the control plane using rladmin:
rladmin cluster config min_control_TLS_version <TLS_Version>For example:
rladmin cluster config min_control_TLS_version 1.2
To set the minimum TLS protocol for the data path using rladmin:
rladmin cluster config min_data_TLS_version <TLS_Version>For example:
rladmin cluster config min_data_TLS_version 1.2
To enable TLS for the discovery service using rladmin:
rladmin cluster config sentinel_tls_mode <ssl_policy>ssl_policy values available:
allowed - Allows both TLS and non-TLS connectionsrequired - Allows only TLS connectionsdisabled - Allows only non-TLS connectionsTo set the minimum TLS protocol for the discovery service using rladmin:
rladmin cluster config min_sentinel_TLS_version <TLS_Version>To enforce a minimum TLS version for the discovery service, run the following commands:
Allow only TLS connections:
rladmin cluster config sentinel_tls_mode required
Set the minimal TLS version:
rladmin cluster config min_sentinel_TLS_version 1.2
Restart the discovery service on all cluster nodes to apply your changes:
supervisorctl restart sentinel_service