Skip to content

Commit 2c78e8c

Browse files
committed
several redis->keydb changes in sentinel.conf
Former-commit-id: d2ef059
1 parent 974dc49 commit 2c78e8c

File tree

1 file changed

+24
-24
lines changed

1 file changed

+24
-24
lines changed

sentinel.conf

Lines changed: 24 additions & 24 deletions
Original file line numberDiff line numberDiff line change
@@ -20,12 +20,12 @@
2020
# The port that this sentinel instance will run on
2121
port 26379
2222

23-
# By default Redis Sentinel does not run as a daemon. Use 'yes' if you need it.
24-
# Note that Redis will write a pid file in /var/run/keydb-sentinel.pid when
23+
# By default KeyDB Sentinel does not run as a daemon. Use 'yes' if you need it.
24+
# Note that KeyDB will write a pid file in /var/run/keydb-sentinel.pid when
2525
# daemonized.
2626
daemonize no
2727

28-
# When running daemonized, Redis Sentinel writes a pid file in
28+
# When running daemonized, KeyDB Sentinel writes a pid file in
2929
# /var/run/keydb-sentinel.pid by default. You can specify a custom pid file
3030
# location here.
3131
pidfile /var/run/keydb-sentinel.pid
@@ -59,7 +59,7 @@ logfile ""
5959

6060
# dir <working-directory>
6161
# Every long running process should have a well-defined working directory.
62-
# For Redis Sentinel to chdir to /tmp at startup is the simplest thing
62+
# For KeyDB Sentinel to chdir to /tmp at startup is the simplest thing
6363
# for the process to don't interfere with administrative tasks such as
6464
# unmounting filesystems.
6565
dir /tmp
@@ -86,16 +86,16 @@ sentinel monitor mymaster 127.0.0.1 6379 2
8686
# sentinel auth-pass <master-name> <password>
8787
#
8888
# Set the password to use to authenticate with the master and replicas.
89-
# Useful if there is a password set in the Redis instances to monitor.
89+
# Useful if there is a password set in the KeyDB instances to monitor.
9090
#
9191
# Note that the master password is also used for replicas, so it is not
9292
# possible to set a different password in masters and replicas instances
9393
# if you want to be able to monitor these instances with Sentinel.
9494
#
95-
# However you can have Redis instances without the authentication enabled
96-
# mixed with Redis instances requiring the authentication (as long as the
95+
# However you can have KeyDB instances without the authentication enabled
96+
# mixed with KeyDB instances requiring the authentication (as long as the
9797
# password set is the same for all the instances requiring the password) as
98-
# the AUTH command will have no effect in Redis instances with authentication
98+
# the AUTH command will have no effect in KeyDB instances with authentication
9999
# switched off.
100100
#
101101
# Example:
@@ -105,10 +105,10 @@ sentinel monitor mymaster 127.0.0.1 6379 2
105105
# sentinel auth-user <master-name> <username>
106106
#
107107
# This is useful in order to authenticate to instances having ACL capabilities,
108-
# that is, running Redis 6.0 or greater. When just auth-pass is provided the
109-
# Sentinel instance will authenticate to Redis using the old "AUTH <pass>"
108+
# that is, running KeyDB 6.0 or greater. When just auth-pass is provided the
109+
# Sentinel instance will authenticate to KeyDB using the old "AUTH <pass>"
110110
# method. When also an username is provided, it will use "AUTH <user> <pass>".
111-
# In the Redis servers side, the ACL to provide just minimal access to
111+
# In the KeyDB servers side, the ACL to provide just minimal access to
112112
# Sentinel instances, should be configured along the following lines:
113113
#
114114
# user sentinel-user >somepassword +client +subscribe +publish \
@@ -125,7 +125,7 @@ sentinel monitor mymaster 127.0.0.1 6379 2
125125
sentinel down-after-milliseconds mymaster 30000
126126

127127
# IMPORTANT NOTE: starting with KeyDB 6.2 ACL capability is supported for
128-
# Sentinel mode, please refer to the KeyDB website https://redis.io/topics/acl
128+
# Sentinel mode, please refer to the Redis website https://redis.io/topics/acl
129129
# for more details.
130130

131131
# Sentinel's ACL users are defined in the following format:
@@ -137,8 +137,8 @@ sentinel down-after-milliseconds mymaster 30000
137137
# user worker +@admin +@connection ~* on >ffa9203c493aa99
138138
#
139139
# For more information about ACL configuration please refer to the Redis
140-
# website at https://redis.io/topics/acl and redis server configuration
141-
# template redis.conf.
140+
# website at https://redis.io/topics/acl and KeyDB server configuration
141+
# template keydb.conf.
142142

143143
# ACL LOG
144144
#
@@ -156,9 +156,9 @@ acllog-max-len 128
156156
# ACL file, the server will refuse to start.
157157
#
158158
# The format of the external ACL user file is exactly the same as the
159-
# format that is used inside redis.conf to describe users.
159+
# format that is used inside keydb.conf to describe users.
160160
#
161-
# aclfile /etc/redis/sentinel-users.acl
161+
# aclfile /etc/keydb/sentinel-users.acl
162162

163163
# requirepass <password>
164164
#
@@ -168,7 +168,7 @@ acllog-max-len 128
168168
# group with the same "requirepass" password. Check the following documentation
169169
# for more info: https://redis.io/topics/sentinel
170170
#
171-
# IMPORTANT NOTE: starting with Redis 6.2 "requirepass" is a compatibility
171+
# IMPORTANT NOTE: starting with KeyDB 6.2 "requirepass" is a compatibility
172172
# layer on top of the ACL system. The option effect will be just setting
173173
# the password for the default user. Clients will still authenticate using
174174
# AUTH <password> as usually, or more explicitly with AUTH default <password>
@@ -251,7 +251,7 @@ sentinel failover-timeout mymaster 180000
251251
# generated in the WARNING level (for instance -sdown, -odown, and so forth).
252252
# This script should notify the system administrator via email, SMS, or any
253253
# other messaging system, that there is something wrong with the monitored
254-
# Redis systems.
254+
# KeyDB systems.
255255
#
256256
# The script is called with just two arguments: the first is the event type
257257
# and the second the event description.
@@ -261,7 +261,7 @@ sentinel failover-timeout mymaster 180000
261261
#
262262
# Example:
263263
#
264-
# sentinel notification-script mymaster /var/redis/notify.sh
264+
# sentinel notification-script mymaster /var/keydb/notify.sh
265265

266266
# CLIENTS RECONFIGURATION SCRIPT
267267
#
@@ -286,7 +286,7 @@ sentinel failover-timeout mymaster 180000
286286
#
287287
# Example:
288288
#
289-
# sentinel client-reconfig-script mymaster /var/redis/reconfig.sh
289+
# sentinel client-reconfig-script mymaster /var/keydb/reconfig.sh
290290

291291
# SECURITY
292292
#
@@ -297,11 +297,11 @@ sentinel failover-timeout mymaster 180000
297297

298298
sentinel deny-scripts-reconfig yes
299299

300-
# REDIS COMMANDS RENAMING
300+
# KEYDB COMMANDS RENAMING
301301
#
302-
# Sometimes the Redis server has certain commands, that are needed for Sentinel
302+
# Sometimes the KeyDB server has certain commands, that are needed for Sentinel
303303
# to work correctly, renamed to unguessable strings. This is often the case
304-
# of CONFIG and SLAVEOF in the context of providers that provide Redis as
304+
# of CONFIG and SLAVEOF in the context of providers that provide KeyDB as
305305
# a service, and don't want the customers to reconfigure the instances outside
306306
# of the administration console.
307307
#
@@ -325,7 +325,7 @@ sentinel deny-scripts-reconfig yes
325325
# HOSTNAMES SUPPORT
326326
#
327327
# Normally Sentinel uses only IP addresses and requires SENTINEL MONITOR
328-
# to specify an IP address. Also, it requires the Redis replica-announce-ip
328+
# to specify an IP address. Also, it requires the KeyDB replica-announce-ip
329329
# keyword to specify only IP addresses.
330330
#
331331
# You may enable hostnames support by enabling resolve-hostnames. Note

0 commit comments

Comments
 (0)