**Is your feature request related to a problem? Please describe. **
It seems like Outpost only supports connecting to Redis using the default user. This creates issues when connecting to managed Redis services (like AWS ElastiCache/Serverless Cache) that require authentication with non-default users.
Describe the solution you'd like
Add support for a REDIS_USERNAME environment variable to allow authentication with custom Redis users.
Describe alternatives you've considered
Currently, the only workaround is to:
- Grant full permissions to the
default user (on ~* +@all)
- Use the
default user's credentials
- This violates principle of least privilege and security best practices for our organization.
Using REDIS_URL instead of individual fields, but this appears to not be supported based on the .env.example.
Additional context
Environment
- Outpost version: [latest]
- Redis service: AWS ElastiCache Serverless Cache (Valkey 8)
- Deployment: Kubernetes
**Is your feature request related to a problem? Please describe. **
It seems like Outpost only supports connecting to Redis using the default user. This creates issues when connecting to managed Redis services (like AWS ElastiCache/Serverless Cache) that require authentication with non-default users.
Describe the solution you'd like
Add support for a
REDIS_USERNAMEenvironment variable to allow authentication with custom Redis users.Describe alternatives you've considered
Currently, the only workaround is to:
defaultuser (on ~* +@all)defaultuser's credentialsUsing
REDIS_URLinstead of individual fields, but this appears to not be supported based on the.env.example.Additional context
Environment