diff --git a/deploy-manage/users-roles/cluster-or-deployment-auth/managed-credentials-eck.md b/deploy-manage/users-roles/cluster-or-deployment-auth/managed-credentials-eck.md index bc21c4b3b2..b4ab44c417 100644 --- a/deploy-manage/users-roles/cluster-or-deployment-auth/managed-credentials-eck.md +++ b/deploy-manage/users-roles/cluster-or-deployment-auth/managed-credentials-eck.md @@ -68,12 +68,30 @@ If you are using the `elastic` user credentials in your own applications, they w To regenerate all auto-generated credentials in a namespace, run the following command: +::::{warning} +The following command regenerates auto-generated credentials of **all** {{stack}} applications in the namespace. +:::: + +::::{applies-switch} + +:::{applies-item} { "eck": "ga 3.2" } +In ECK versions 3.2 and beyond: + ```sh kubectl delete secret -l eck.k8s.elastic.co/credentials=true ``` -::::{warning} -This command regenerates auto-generated credentials of **all** {{stack}} applications in the namespace. +::: + +:::{applies-item} { "eck": "ga 3.1" } +In ECK versions prior to 3.2: + +```sh +kubectl delete secret -l eck.k8s.elastic.co/credentials=true,common.k8s.elastic.co/type!=kibana +``` + +::: + :::: ### Control the length of auto-generated passwords