You are looking at the documentation of a prior release. To read the documentation of the latest release, please
visit here.
New to KubeDB? Please start here.
Rotate Authentication of Memcached
This guide will give an overview on how KubeDB Ops-manager operator Rotate Authentication configuration.
Before You Begin
- You should be familiar with the following
KubeDBconcepts:
How Rotate Memcached Authentication Configuration Process Works
The authentication rotation process for Memcached using KubeDB involves the following steps:
A user first creates a
MemcachedCustom Resource Object (CRO).The
KubeDB Provisioner operatorcontinuously watches forMemcachedCROs.When the operator detects a
MemcachedCR, it provisions the requiredPetSets, along with related resources such as secrets, services, and other dependencies.To initiate authentication rotation, the user creates a
MemcachedOpsRequestCR with the desired configuration.The
KubeDB Ops-manageroperator watches forMemcachedOpsRequestCRs.Upon detecting a
MemcachedOpsRequest, the operator pauses the referencedMemcachedobject, ensuring that the Provisioner operator does not perform any operations during the authentication rotation process.The
Ops-manageroperator then updates the necessary configuration (such as credentials) based on the providedMemcachedOpsRequestspecification.After applying the updated configuration, the operator restarts all
MemcachedPods so they come up with the new authentication environment variables and settings.Once the authentication rotation is completed successfully, the operator resumes the
Memcachedobject, allowing the Provisioner operator to continue its usual operations.
In the next section, we will walk you through a step-by-step guide to rotating Memcached authentication using the MemcachedOpsRequest CRD.






























