Skip to content

Commit 203225e

Browse files
alon-zadaUbuntu
and
Ubuntu
authored
promoting version 6.2.10-34 (#233)
* promoting version 6.2.10-34 * Misc fixes to release Co-authored-by: Ubuntu <[email protected]>
1 parent 8ec3d71 commit 203225e

21 files changed

+848
-20020
lines changed

README.md

+31-34
Original file line numberDiff line numberDiff line change
@@ -24,17 +24,17 @@ High level architecture and overview of the solution can be found [HERE](https:/
2424

2525
### Prerequisites
2626

27-
- A Kubernetes cluster version of 1.11 or higher, with a minimum of 3 worker nodes.
27+
- A Kubernetes cluster with a supported version (see below) with a minimum of 3 worker nodes.
2828
- A Kubernetes client (kubectl) with a matching version. For OpenShift, an OpenShift client (oc).
2929
- Access to DockerHub, RedHat Container Catalog or a private repository that can serve the required images.
3030

3131

3232
The following are the images and tags for this release:
3333
| Component | k8s | Openshift |
3434
| --- | --- | --- |
35-
| Redis Enterprise | `redislabs/redis:6.2.10-90` | `redislabs/redis:6.2.10-90.rhel7-openshift` |
36-
| Operator | `redislabs/operator:6.2.10-4` | `redislabs/operator:6.2.10-4` |
37-
| Services Rigger | `redislabs/k8s-controller:6.2.10-4` | `redislabs/k8s-controller:6.2.10-4` |
35+
| Redis Enterprise | `redislabs/redis:6.2.10-107` | `redislabs/redis:6.2.10-107.rhel8-openshift` |
36+
| Operator | `redislabs/operator:6.2.10-34` | `redislabs/operator:6.2.10-34` |
37+
| Services Rigger | `redislabs/k8s-controller:6.2.10-34` | `redislabs/k8s-controller:6.2.10-34` |
3838
> * RedHat certified images are available on [Redhat Catalog](https://access.redhat.com/containers/#/product/71f6d1bb3408bd0d) </br>
3939
4040

@@ -185,7 +185,7 @@ This is the fastest way to get up and running with a new Redis Enterprise on Kub
185185
EOF
186186
```
187187
188-
This must fail with an error output by the admission webhook redb.admisison.redislabs that is being denied because it can't get the login credentials for the Redis Enterprise Cluster as none were specified.
188+
This must fail with an error output by the admission webhook redb.admisison.redislabs that is being denied because 'illegal' is not a valid eviction policy.
189189
190190
```shell script
191191
Error from server: error when creating "STDIN": admission webhook "redb.admission.redislabs" denied the request: eviction_policy: u'illegal' is not one of [u'volatile-lru', u'volatile-ttl', u'volatile-random', u'allkeys-lru', u'allkeys-random', u'noeviction', u'volatile-lfu', u'allkeys-lfu']
@@ -208,7 +208,6 @@ This is the fastest way to get up and running with a new Redis Enterprise on Kub
208208
EOF
209209
kubectl apply -f /tmp/redis-enterprise-database.yml
210210
```
211-
Replace the name of the cluster with the one used on the current namespace.
212211
All REDB configuration options are documented [here](redis_enterprise_database_api.md).
213212
214213
@@ -249,16 +248,16 @@ That folder also contains the custom resource definitions compatible with OpenSh
249248
> Note - change rec in the suffix of the 2nd command with the name of the RedisEnterpriseCluster, if different (see step "Redis Enterprise Cluster custom resource" below).
250249
251250
4. Deploy the OpenShift operator bundle:
252-
> NOTE: Update the `storageClassName` setting in `openshift.bundle.yaml` (by default its set to `gp2`).
253251
254252
```bash
255253
oc apply -f openshift.bundle.yaml
256254
```
257255
> Note: If you are running on OpenShift 3.x, use the `bundle.yaml` file located under `openshift_3_x` folder.
258256
259257
5. Redis Enterprise Cluster custom resource - `RedisEnterpriseCluster`
258+
> Note: Define a `storageClassName` setting in `openshift/rec_rhel.yaml` as required (it's set to `gp2` by default).
260259
261-
Apply the `RedisEnterpriseCluster` resource with RHEL7 based images:
260+
Apply the `RedisEnterpriseCluster` resource with RHEL8 based images:
262261
263262
```bash
264263
oc apply -f openshift/rec_rhel.yaml
@@ -339,12 +338,12 @@ That folder also contains the custom resource definitions compatible with OpenSh
339338
EOF
340339
```
341340
342-
This must fail with an error output by the admission webhook redb.admisison.redislabs that is being denied because it can't get the login credentials for the Redis Enterprise Cluster as none were specified.
341+
This must fail with an error output by the admission webhook redb.admisison.redislabs that is being denied because 'illegal' is not a valid eviction policy.
343342
344343
```shell script
345344
Error from server: error when creating "STDIN": admission webhook "redb.admission.redislabs" denied the request: eviction_policy: u'illegal' is not one of [u'volatile-lru', u'volatile-ttl', u'volatile-random', u'allkeys-lru', u'allkeys-random', u'noeviction', u'volatile-lfu', u'allkeys-lfu']
346345
```
347-
> Note: procedure to enable admission is documented with further detail [here](admission/README.md
346+
> Note: procedure to enable admission is documented with further detail [here](admission/README.md).
348347
349348
7. Redis Enterprise Database custom resource - `RedisEnterpriseDatabase`
350349
@@ -363,7 +362,6 @@ That folder also contains the custom resource definitions compatible with OpenSh
363362
EOF
364363
oc apply -f /tmp/redis-enterprise-database.yml
365364
```
366-
Replace the name of the cluster with the one used on the current namespace.
367365
All REDB configuration options are documented [here](redis_enterprise_database_api.md).
368366
369367
@@ -381,7 +379,7 @@ The operator deploys a `RedisEnterpriseCluster` with default configurations valu
381379
redisEnterpriseImageSpec:
382380
imagePullPolicy: IfNotPresent
383381
repository: redislabs/redis
384-
versionTag: 6.2.10-90
382+
versionTag: 6.2.10-107
385383
```
386384
387385
* Persistence
@@ -470,7 +468,7 @@ The operator deploys a `RedisEnterpriseCluster` with default configurations valu
470468
471469
Whenever images are not pulled from DockerHub, the following configuration must be specified:
472470
473-
In *RedisEnterpriseClusterSpec* (redis_enterprise_cluster.yaml):
471+
In *RedisEnterpriseClusterSpec* :
474472
- *redisEnterpriseImageSpec*
475473
- *redisEnterpriseServicesRiggerImageSpec*
476474
- *bootstrapperImageSpec*
@@ -483,21 +481,21 @@ For example:
483481
redisEnterpriseImageSpec:
484482
imagePullPolicy: IfNotPresent
485483
repository: harbor.corp.local/redisenterprise/redis
486-
versionTag: 6.2.10-90
484+
versionTag: 6.2.10-107
487485
```
488486
489487
```yaml
490488
redisEnterpriseServicesRiggerImageSpec:
491489
imagePullPolicy: IfNotPresent
492490
repository: harbor.corp.local/redisenterprise/k8s-controller
493-
versionTag: 6.2.10-4
491+
versionTag: 6.2.10-34
494492
```
495493
496494
```yaml
497495
bootstrapperImageSpec:
498496
imagePullPolicy: IfNotPresent
499497
repository: harbor.corp.local/redisenterprise/operator
500-
versionTag: 6.2.10-4
498+
versionTag: 6.2.10-34
501499
```
502500
503501
In Operator Deployment spec (operator.yaml):
@@ -509,7 +507,7 @@ spec:
509507
spec:
510508
containers:
511509
- name: redis-enterprise-operator
512-
image: harbor.corp.local/redisenterprise/operator:6.2.10-4
510+
image: harbor.corp.local/redisenterprise/operator:6.2.10-34
513511
```
514512
515513
Image specification follow the [K8s Container schema](https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.10/#container-v1-core).
@@ -632,7 +630,7 @@ Note: in the examples above the Redis Enterprise Cluster name is: 'rec' and the
632630
The Operator automates and simplifies the upgrade process.
633631
The Redis Enterprise Cluster Software, and the Redis Enterprise Operator for Kubernetes versions are tightly coupled and should be upgraded together.
634632
It is recommended to use the bundle.yaml to upgrade, as it loads all the relevant CRD documents for this version. If the updated CRDs are not loaded, the operator might fail.
635-
There are two ways to upgrade - either set 'autoUpgradeRedisEnterprise' within the Redis Enterprise Cluster Spec to instruct the operator to automatically upgrade to the compatible version, or specify the correct Redis Enterprise image manually using the versionTag attribute. The Redis Enterprise Version compatible with this release is 6.2.10-90
633+
There are two ways to upgrade - either set 'autoUpgradeRedisEnterprise' within the Redis Enterprise Cluster Spec to instruct the operator to automatically upgrade to the compatible version, or specify the correct Redis Enterprise image manually using the versionTag attribute. The Redis Enterprise Version compatible with this release is 6.2.10-107
636634
637635
```yaml
638636
autoUpgradeRedisEnterprise: true
@@ -641,45 +639,44 @@ There are two ways to upgrade - either set 'autoUpgradeRedisEnterprise' within t
641639
Alternatively:
642640
```yaml
643641
RedisEnterpriseImageSpec:
644-
versionTag: redislabs/redis:6.2.10-90
642+
versionTag: redislabs/redis:6.2.10-107
645643
```
646644
647645
## Supported K8S Distributions
648646
Each release of the Redis Enterprise Operator deployment is thoroughly tested against a set of Kubernetes distributions. The table below lists these, along with the current release's support status. "Supported", as well as "deprecated" support status indicates the current release has been tested in this environment and supported by RedisLabs. "Deprecated" also indicates that support will be dropped in a coming future release. "No longer supported" indicates that support has been dropped for this distribution. Any distribution that isn't explicitly listed is not supported for production workloads by RedisLabs.
649647
Supported versions (platforms/versions that are not listed are not supported):
650648
| Distribution | Support Status |
651649
|---------------------------------|----------------|
652-
| Openshift 3.11 (K8s 1.11) | deprecated |
653-
| OpenShift 4.6 (K8s 1.19) | supported |
650+
| OpenShift 4.6 (K8s 1.19) | deprecated |
654651
| OpenShift 4.7 (K8s 1.20) | supported |
655652
| OpenShift 4.8 (K8s 1.21) | supported |
656653
| OpenShift 4.9 (K8s 1.22) | supported |
657-
| KOPS vanilla 1.18 | supported |
658-
| KOPS vanilla 1.19 | supported |
654+
| OpenShift 4.10 (K8s 1.23) | supported |
655+
| KOPS vanilla 1.18 | deprecated |
656+
| KOPS vanilla 1.19 | deprecated |
659657
| KOPS vanilla 1.20 | supported |
660658
| KOPS vanilla 1.21 | supported |
661659
| KOPS vanilla 1.22 | supported |
662-
| GKE 1.19 | supported |
660+
| KOPS vanilla 1.23 | supported |
661+
| GKE 1.19 | deprecated |
663662
| GKE 1.20 | supported |
664663
| GKE 1.21 | supported |
665664
| GKE 1.22 | supported |
666-
| Rancher 2.5 (K8s 1.17) | *deprecated |
667-
| Rancher 2.5 (K8s 1.18) | *deprecated |
668-
| Rancher 2.5 (K8s 1.19) | *deprecated |
669-
| Rancher 2.5 (K8s 1.20) | *deprecated |
665+
| Rancher 2.6 (K8s 1.18) | deprecated |
670666
| Rancher 2.6 (K8s 1.19) | supported |
671667
| Rancher 2.6 (K8s 1.20) | supported |
672668
| Rancher 2.6 (K8s 1.21) | supported |
673669
| VMWare TKGIE** 1.10 (K8s 1.19) | supported |
674-
| VMWare TKGIE 1.11 (K8s 1.20). | supported |
675-
| AKS 1.19 | deprecated |
676-
| AKS 1.20 | supported |
677-
| AKS 1.21 | supported |
670+
| VMWare TKGIE 1.11 (K8s 1.20) | supported |
671+
| AKS 1.20 | deprecated |
672+
| AKS 1.21 | deprecated |
678673
| AKS 1.22 | supported |
679-
| EKS 1.18 | supported |
680-
| EKS 1.19 | supported |
674+
| AKS 1.23 | supported |
675+
| EKS 1.18 | deprecated |
676+
| EKS 1.19 | deprecated |
681677
| EKS 1.20 | supported |
682678
| EKS 1.21 | supported |
679+
| EKS 1.22 | supported |
683680
684681
\* No longer supported by the vendor
685682
\*\* Tanzu Kubernetes Grid Integrated Edition

admission/GESHER.md

+3-3
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,8 @@
1-
# Admission Conrol with Gesher Installation for Redis Enterprise Operator
1+
# Admission Control with Gesher Installation for Redis Enterprise Operator
22

33
## Gesher Background
44

5-
Gesher is an operator that enables Kubernetes administrator to delegate the ability to setup webhook validating admisison controllers to users for running within their own namespace.
5+
Gesher is an operator that enables Kubernetes administrator to delegate the ability to setup webhook validating admission controllers to users for running within their own namespace.
66

77
Gesher is configured by two custom resources.
88

@@ -11,7 +11,7 @@ Gesher is configured by two custom resources.
1111

1212
### Choosing Traditional Cluster or Gesher's Delegated installation methods.
1313

14-
Redis Labs provides two methods for integrating admission control into one's system, what we refer to as *cluster* and *delegated* configurations.
14+
Redis provides two methods for integrating admission control into one's system, what we refer to as *cluster* and *delegated* configurations.
1515

1616
*Cluster* configuration integrates admission via the standard Kubernetes **ValidatingWebhookConfiguration** resource. This is a cluster-scoped kubernetes resource that can only be configured by a cluster administrator.
1717

admission/README.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -52,7 +52,7 @@ spec:
5252
EOF
5353
```
5454

55-
This must fail with an error output by the admission webhook redb.admisison.redislabs that is being denied because it can't get the login credentials for the Redis Enterprise Cluster as none were specified.
55+
This must fail with an error output by the admission webhook redb.admisison.redislabs that is being denied because 'illegal' is not a valid eviction policy.
5656

5757
```shell script
5858
Error from server: error when creating "STDIN": admission webhook "redb.admission.redislabs" denied the request: eviction_policy: u'illegal' is not one of [u'volatile-lru', u'volatile-ttl', u'volatile-random', u'allkeys-lru', u'allkeys-random', u'noeviction', u'volatile-lfu', u'allkeys-lfu']

0 commit comments

Comments
 (0)