Skip to content

Commit 7e77f3f

Browse files
committed
Adjust per recommendations.
Signed-off-by: Michael Montgomery <[email protected]>
1 parent b27d201 commit 7e77f3f

File tree

1 file changed

+11
-7
lines changed

1 file changed

+11
-7
lines changed

deploy-manage/users-roles/cluster-or-deployment-auth/managed-credentials-eck.md

Lines changed: 11 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -68,22 +68,26 @@ If you are using the `elastic` user credentials in your own applications, they w
6868

6969
To regenerate all auto-generated credentials in a namespace, run the following command:
7070

71-
```sh
72-
kubectl delete secret -l eck.k8s.elastic.co/credentials=true,common.k8s.elastic.co/type!=kibana
73-
```
74-
7571
::::{warning}
76-
This command regenerates auto-generated credentials of **all** {{stack}} applications in the namespace.
72+
The following command regenerates auto-generated credentials of **all** {{stack}} applications in the namespace.
7773
::::
7874

7975
::::{applies-switch}
8076

8177
:::{applies-item} 3.2+:
82-
When deleting secrets so they can be regenerated, the following label `common.k8s.elastic.co/type!=kibana` is no longer required as the {{kib}} secret is no longer labeled as containing credentials.
78+
In ECK versions 3.2 and beyond:
79+
80+
```sh
81+
kubectl delete secret -l eck.k8s.elastic.co/credentials=true
82+
```
8383
:::
8484

8585
:::{applies-item} Prior to 3.2:
86-
When deleting secrets so they can be regenerated, make sure to exclude {{kib}} secrets by specifying `common.k8s.elastic.co/type!=kibana`. {{kib}} secrets contain encryption keys, which should not be deleted.
86+
In ECK versions prior to 3.2:
87+
88+
```sh
89+
kubectl delete secret -l eck.k8s.elastic.co/credentials=true,common.k8s.elastic.co/type!=kibana
90+
```
8791
:::
8892

8993
::::

0 commit comments

Comments
 (0)