---
Title: Edit Redis Enterprise remote clusters
alwaysopen: false
categories:
- docs
- operate
- kubernetes
description: Edit the configuration details of an existing RERC with Redis Enterprise
for Kubernetes.
linkTitle: Edit RERC
weight: 60
url: '/operate/kubernetes/7.8.6/active-active/edit-rerc/'
---
{{}}This feature is supported for general availability in releases 6.4.2-6 and later. Some of these features were available as a preview in 6.4.2-4 and 6.4.2-5. Please upgrade to 6.4.2-6 for the full set of general availability features and bug fixes. and later.{{}}
Before a RedisEnterpriseCluster (REC) can participate in an Active-Active database, it needs an accompanying RedisEnterpriseRemoteCluster (RERC) custom resource. The RERC contains details allowing the REC to link to the RedisEnterpriseActiveActiveDatabase (REAADB). The RERC resource is listed in the REAADB resource to become a participating cluster for the Active-Active database.
The RERC controller periodically connects to the local REC endpoint via its external address, to ensure it’s setup correctly. For this to work, the external load balancer must support [NAT hairpinning](https://en.wikipedia.org/wiki/Network_address_translation#NAT_loopback). In some cloud environments, this may involve disabling IP preservation for the load balancer target groups.
For more details, see the [RERC API reference]({{}}).
## Edit RERC
Use the `kubectl patch rerc --type merge --patch` command to patch the local RERC custom resource with your changes. For a full list of available fields, see the [RERC API reference]({{}}).
The following example edits the `dbFqdnSuffix` field for the RERC named `rerc-ohare`.
```sh
kubectl patch rerc rerc-ohare --type merge --patch \
'{"spec":{"dbFqdnSuffix": "-example2-cluster-rec-chicago-ns-illinois.example.com"}}'
```
## Update RERC secret
If the credentials are changed or updated for a REC participating cluster, you need to manually edit the RERC secret and apply it to all participating clusters.
1. On the local cluster, update the secret with new credentials and name it with the following convention: `redis-enterprise-`.
A secret for a remote cluster named `rerc-ohare` would be similar to the following:
```yaml
apiVersion: v1
data:
password: PHNvbWUgcGFzc3dvcmQ+
username: PHNvbWUgdXNlcj4
kind: Secret
metadata:
name: redis-enterprise-rerc-ohare
type: Opaque
```
1. Apply the file.
```sh
kubectl apply -f
```
1. Watch the RERC to verify the status is "Active" and the spec status is "Valid."
```sh
kubectl get rerc
```
The output should look like this:
```sh
NAME STATUS SPEC STATUS LOCAL
rerc-ohare Active Valid true
```
To troubleshoot invalid configurations, view the RERC custom resource events and the [Redis Enterprise operator logs]({{< relref "/operate/kubernetes/7.8.6/logs/" >}}).
1. Verify the status of each REAADB using that RERC is "Active" and the spec status is "Valid."
```sh
kubectl get reaadb reaadb-boeing
NAME STATUS SPEC STATUS LINKED REDBS REPLICATION STATUS
reaadb-boeing active Valid up
```
To troubleshoot invalid configurations, view the RERC custom resource events and the [Redis Enterprise operator logs]({{< relref "/operate/kubernetes/7.8.6/logs/" >}}).
1. Repeat the above steps on all other participating clusters.