From b81f38e7ed5e06416ea105bb8de0f90fd25febbd Mon Sep 17 00:00:00 2001 From: Laurent Droin <32528572+laurentdroin@users.noreply.github.com> Date: Sun, 5 Sep 2021 06:50:22 -0700 Subject: [PATCH] Clarifying that setting the clusterCredentialsSecretName is only for Vault. --- redis_enterprise_cluster_api.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/redis_enterprise_cluster_api.md b/redis_enterprise_cluster_api.md index 22b35ca..8bc2400 100644 --- a/redis_enterprise_cluster_api.md +++ b/redis_enterprise_cluster_api.md @@ -181,7 +181,7 @@ RedisEnterpriseClusterSpec defines the desired state of RedisEnterpriseCluster | podAnnotations | pod annotations | map[string]string | | false | | podTolerations | Tolerations that are added to all managed pods. for more information: https://kubernetes.io/docs/concepts/configuration/taint-and-toleration/ | [][v1.Toleration](https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.18/#toleration-v1-core) | empty | false | | slaveHA | Slave high availability mechanism configuration. | *[SlaveHA](#slaveha) | | false | -| clusterCredentialSecretName | Secret Name/Path to use for Cluster Credentials. If left blank, will use cluster name | string | | false | +| clusterCredentialSecretName | Secret Name/Path to use for Cluster Credentials. To be used only if ClusterCredentialSecretType is vault. | string | | false | | clusterCredentialSecretType | Type of Secret to use for ClusterCredential, Vault, Kuberetes,... If left blank, will default ot kubernetes secrets | string | | true | | clusterCredentialSecretRole | Used only if ClusterCredentialSecretType is vault, to define vault role to be used. If blank, defaults to \"redis-enterprise-rec\" | string | | true | | vaultCASecret | K8s secret name containing Vault's CA cert - defaults to \"vault-ca-cert\" | string | | false |