20
20
# The port that this sentinel instance will run on
21
21
port 26379
22
22
23
- # By default Redis Sentinel does not run as a daemon. Use 'yes' if you need it.
24
- # Note that Redis will write a pid file in /var/run/keydb-sentinel.pid when
23
+ # By default KeyDB Sentinel does not run as a daemon. Use 'yes' if you need it.
24
+ # Note that KeyDB will write a pid file in /var/run/keydb-sentinel.pid when
25
25
# daemonized.
26
26
daemonize no
27
27
28
- # When running daemonized, Redis Sentinel writes a pid file in
28
+ # When running daemonized, KeyDB Sentinel writes a pid file in
29
29
# /var/run/keydb-sentinel.pid by default. You can specify a custom pid file
30
30
# location here.
31
31
pidfile /var/run/keydb-sentinel.pid
@@ -59,7 +59,7 @@ logfile ""
59
59
60
60
# dir <working-directory>
61
61
# Every long running process should have a well-defined working directory.
62
- # For Redis Sentinel to chdir to /tmp at startup is the simplest thing
62
+ # For KeyDB Sentinel to chdir to /tmp at startup is the simplest thing
63
63
# for the process to don't interfere with administrative tasks such as
64
64
# unmounting filesystems.
65
65
dir /tmp
@@ -86,16 +86,16 @@ sentinel monitor mymaster 127.0.0.1 6379 2
86
86
# sentinel auth-pass <master-name> <password>
87
87
#
88
88
# Set the password to use to authenticate with the master and replicas.
89
- # Useful if there is a password set in the Redis instances to monitor.
89
+ # Useful if there is a password set in the KeyDB instances to monitor.
90
90
#
91
91
# Note that the master password is also used for replicas, so it is not
92
92
# possible to set a different password in masters and replicas instances
93
93
# if you want to be able to monitor these instances with Sentinel.
94
94
#
95
- # However you can have Redis instances without the authentication enabled
96
- # mixed with Redis instances requiring the authentication (as long as the
95
+ # However you can have KeyDB instances without the authentication enabled
96
+ # mixed with KeyDB instances requiring the authentication (as long as the
97
97
# password set is the same for all the instances requiring the password) as
98
- # the AUTH command will have no effect in Redis instances with authentication
98
+ # the AUTH command will have no effect in KeyDB instances with authentication
99
99
# switched off.
100
100
#
101
101
# Example:
@@ -105,10 +105,10 @@ sentinel monitor mymaster 127.0.0.1 6379 2
105
105
# sentinel auth-user <master-name> <username>
106
106
#
107
107
# This is useful in order to authenticate to instances having ACL capabilities,
108
- # that is, running Redis 6.0 or greater. When just auth-pass is provided the
109
- # Sentinel instance will authenticate to Redis using the old "AUTH <pass>"
108
+ # that is, running KeyDB 6.0 or greater. When just auth-pass is provided the
109
+ # Sentinel instance will authenticate to KeyDB using the old "AUTH <pass>"
110
110
# method. When also an username is provided, it will use "AUTH <user> <pass>".
111
- # In the Redis servers side, the ACL to provide just minimal access to
111
+ # In the KeyDB servers side, the ACL to provide just minimal access to
112
112
# Sentinel instances, should be configured along the following lines:
113
113
#
114
114
# user sentinel-user >somepassword +client +subscribe +publish \
@@ -125,7 +125,7 @@ sentinel monitor mymaster 127.0.0.1 6379 2
125
125
sentinel down-after-milliseconds mymaster 30000
126
126
127
127
# IMPORTANT NOTE: starting with KeyDB 6.2 ACL capability is supported for
128
- # Sentinel mode, please refer to the KeyDB website https://redis.io/topics/acl
128
+ # Sentinel mode, please refer to the Redis website https://redis.io/topics/acl
129
129
# for more details.
130
130
131
131
# Sentinel's ACL users are defined in the following format:
@@ -137,8 +137,8 @@ sentinel down-after-milliseconds mymaster 30000
137
137
# user worker +@admin +@connection ~* on >ffa9203c493aa99
138
138
#
139
139
# For more information about ACL configuration please refer to the Redis
140
- # website at https://redis.io/topics/acl and redis server configuration
141
- # template redis .conf.
140
+ # website at https://redis.io/topics/acl and KeyDB server configuration
141
+ # template keydb .conf.
142
142
143
143
# ACL LOG
144
144
#
@@ -156,9 +156,9 @@ acllog-max-len 128
156
156
# ACL file, the server will refuse to start.
157
157
#
158
158
# The format of the external ACL user file is exactly the same as the
159
- # format that is used inside redis .conf to describe users.
159
+ # format that is used inside keydb .conf to describe users.
160
160
#
161
- # aclfile /etc/redis /sentinel-users.acl
161
+ # aclfile /etc/keydb /sentinel-users.acl
162
162
163
163
# requirepass <password>
164
164
#
@@ -168,7 +168,7 @@ acllog-max-len 128
168
168
# group with the same "requirepass" password. Check the following documentation
169
169
# for more info: https://redis.io/topics/sentinel
170
170
#
171
- # IMPORTANT NOTE: starting with Redis 6.2 "requirepass" is a compatibility
171
+ # IMPORTANT NOTE: starting with KeyDB 6.2 "requirepass" is a compatibility
172
172
# layer on top of the ACL system. The option effect will be just setting
173
173
# the password for the default user. Clients will still authenticate using
174
174
# AUTH <password> as usually, or more explicitly with AUTH default <password>
@@ -251,7 +251,7 @@ sentinel failover-timeout mymaster 180000
251
251
# generated in the WARNING level (for instance -sdown, -odown, and so forth).
252
252
# This script should notify the system administrator via email, SMS, or any
253
253
# other messaging system, that there is something wrong with the monitored
254
- # Redis systems.
254
+ # KeyDB systems.
255
255
#
256
256
# The script is called with just two arguments: the first is the event type
257
257
# and the second the event description.
@@ -261,7 +261,7 @@ sentinel failover-timeout mymaster 180000
261
261
#
262
262
# Example:
263
263
#
264
- # sentinel notification-script mymaster /var/redis /notify.sh
264
+ # sentinel notification-script mymaster /var/keydb /notify.sh
265
265
266
266
# CLIENTS RECONFIGURATION SCRIPT
267
267
#
@@ -286,7 +286,7 @@ sentinel failover-timeout mymaster 180000
286
286
#
287
287
# Example:
288
288
#
289
- # sentinel client-reconfig-script mymaster /var/redis /reconfig.sh
289
+ # sentinel client-reconfig-script mymaster /var/keydb /reconfig.sh
290
290
291
291
# SECURITY
292
292
#
@@ -297,11 +297,11 @@ sentinel failover-timeout mymaster 180000
297
297
298
298
sentinel deny-scripts-reconfig yes
299
299
300
- # REDIS COMMANDS RENAMING
300
+ # KEYDB COMMANDS RENAMING
301
301
#
302
- # Sometimes the Redis server has certain commands, that are needed for Sentinel
302
+ # Sometimes the KeyDB server has certain commands, that are needed for Sentinel
303
303
# to work correctly, renamed to unguessable strings. This is often the case
304
- # of CONFIG and SLAVEOF in the context of providers that provide Redis as
304
+ # of CONFIG and SLAVEOF in the context of providers that provide KeyDB as
305
305
# a service, and don't want the customers to reconfigure the instances outside
306
306
# of the administration console.
307
307
#
@@ -325,7 +325,7 @@ sentinel deny-scripts-reconfig yes
325
325
# HOSTNAMES SUPPORT
326
326
#
327
327
# Normally Sentinel uses only IP addresses and requires SENTINEL MONITOR
328
- # to specify an IP address. Also, it requires the Redis replica-announce-ip
328
+ # to specify an IP address. Also, it requires the KeyDB replica-announce-ip
329
329
# keyword to specify only IP addresses.
330
330
#
331
331
# You may enable hostnames support by enabling resolve-hostnames. Note
0 commit comments