This document describes the steps to rotate the authentication keys that must be performed for:
- regularly scheduled key rotation to ensure that the device is compliant and secure.
- key exposure. You should rotate the exposed key as soon as possible.
Before you begin
Complete the following steps:
- You meet the laptop prerequisites.
- You are able to SSH into the three nodes and execute software-defined storage CLI commands.
- You are able to log as admin in to the root admin cluster via
kubectl
.