Each connected cluster has a bearer token (Documentation Index
Fetch the complete documentation index at: https://radarhq.io/docs/llms.txt
Use this file to discover all available pages before exploring further.
rhc_<random>). The Hub stores only a SHA-256 hash; the in-cluster Radar presents the token over the WebSocket handshake. Rotating the token invalidates the old one and forces the in-cluster Radar to reconnect with the new one.
When to rotate
- An operator with cluster-admin (or Helm-history) access leaves the team.
- A
values.yamlcontaining the token leaks into a public repo, log file, or screenshot. - You’re following a routine rotation policy (every 90 days).
- You’re moving the in-cluster Radar from one cluster to another and want a clean break.
How to rotate
Clusters → cluster → Rotate token (owner-only).-
Click Rotate token. The Hub mints a new
rhc_...and invalidates the old one immediately. - The new token is shown once, with a Helm command pre-filled.
-
Run the command in the cluster:
- The in-cluster Radar reconnects within a few seconds. The cluster’s status flips back to connected.
--reuse-values keeps every other Helm value you’d previously set (RBAC opt-ins, image tag, etc.). You’re only swapping the token.
What happens to the old token
It’s gone. The hash is overwritten in Postgres, and any in-flight handshake using the old token returns401. There’s no grace period - by design - so a leaked token stops working the moment you click rotate.
The action emits a cluster.token_rotated event in the audit log.
Forgot to rotate before uninstalling?
If a cluster is gone but the token still exists in the Hub (nocluster.disconnected cooldown to clean it up), delete the cluster from Clusters → cluster → Delete. Deletion clears the registry row and the hash atomically.
What if rotation goes wrong?
If the in-cluster Radar can’t reach the Hub with the new token:- The old token is already dead - rolling back the Helm release won’t help (the rolled-back token is also invalid by then).
- The fix is rotate again with the same flow. Each rotation is cheap.
[cloud] connected to ... on success or a 401 / TLS / DNS reason on failure.
Don’t store tokens in Helm values long-term
The install command shows the token in plain text for ergonomics. For production:secrets/get in the namespace).
See also
- Connecting a cluster - the initial install flow.
- Audit log - rotation events.
- Cloud RBAC - the token’s relationship to in-cluster impersonation.