Skip to content

Commit 39e6fa5

Browse files
Apply suggestions from code review
Co-authored-by: hassankh148 <[email protected]>
1 parent 0770b4d commit 39e6fa5

File tree

1 file changed

+3
-4
lines changed

1 file changed

+3
-4
lines changed

content/operate/kubernetes/active-active/global-config.md

Lines changed: 3 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -108,7 +108,7 @@ This section edits the secrets under the REAADB `.spec.globalConfigurations` sec
108108

109109
You can configure role-based access control (RBAC) permissions for Active-Active databases using the `rolesPermissions` field in the REAADB `.spec.globalConfigurations` section. The role permissions configuration is propagated across all participating clusters, but the underlying roles and Redis ACLs must be manually created on each cluster.
110110

111-
{{<note>}}You must manually create the specified roles and Redis ACLs on all participating clusters before configuring role permissions. The operator only propagates the role permissions configuration—it does not create the underlying roles and ACLs. If roles or ACLs are missing on any cluster, the operator will log errors until they are manually created.{{</note>}}
111+
{{<note>}}You must manually create the specified roles and Redis ACLs on all participating clusters before configuring role permissions. The operator only propagates the role permissions configuration—it does not create the underlying roles and ACLs. If roles or ACLs are missing on any cluster, the operator will log errors and dispatch an Event associated with the REAADB object until they are manually created.{{</note>}}
112112

113113
### Prerequisites
114114

@@ -139,7 +139,7 @@ Before configuring role permissions:
139139
rolesPermissions:
140140
- role: <role-name>
141141
acl: <acl-name>
142-
type: redis-acl
142+
type: redis-enterprise
143143
participatingClusters:
144144
- name: rerc-ohare
145145
- name: rerc-reagan
@@ -157,7 +157,7 @@ Before configuring role permissions:
157157

158158
```sh
159159
kubectl patch reaadb <reaadb-name> --type merge --patch \
160-
'{"spec": {"globalConfigurations": {"rolesPermissions": [{"role": "<role-name>", "acl": "<acl-name>", "type": "redis-acl"}]}}}'
160+
'{"spec": {"globalConfigurations": {"rolesPermissions": [{"role": "<role-name>", "acl": "<acl-name>", "type": "redis-enterprise"}]}}}'
161161
```
162162

163163
3. Verify the REAADB status shows `active` and `Valid`:
@@ -175,7 +175,6 @@ Before configuring role permissions:
175175
kubectl logs -l name=redis-enterprise-operator
176176
```
177177

178-
Look for log messages indicating "patching local BDB roles permissions" on each participating cluster.
179178

180179
### Troubleshooting role permissions
181180

0 commit comments

Comments
 (0)