You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
> * RedHat certified images are available on [Redhat Catalog](https://access.redhat.com/containers/#/product/71f6d1bb3408bd0d) </br>
39
39
40
40
@@ -185,7 +185,7 @@ This is the fastest way to get up and running with a new Redis Enterprise on Kub
185
185
EOF
186
186
```
187
187
188
-
This must fail with an error output by the admission webhook redb.admisison.redislabs that is being denied because it can't get the login credentials for the Redis Enterprise Cluster as none were specified.
188
+
This must fail with an error output by the admission webhook redb.admisison.redislabs that is being denied because 'illegal' is not a valid eviction policy.
189
189
190
190
```shell script
191
191
Error from server: error when creating "STDIN": admission webhook "redb.admission.redislabs" denied the request: eviction_policy: u'illegal' is not one of [u'volatile-lru', u'volatile-ttl', u'volatile-random', u'allkeys-lru', u'allkeys-random', u'noeviction', u'volatile-lfu', u'allkeys-lfu']
@@ -208,7 +208,6 @@ This is the fastest way to get up and running with a new Redis Enterprise on Kub
Replace the name of the cluster with the one used on the current namespace.
212
211
All REDB configuration options are documented [here](redis_enterprise_database_api.md).
213
212
214
213
@@ -249,16 +248,16 @@ That folder also contains the custom resource definitions compatible with OpenSh
249
248
> Note - change rec in the suffix of the 2nd command with the name of the RedisEnterpriseCluster, if different (see step "Redis Enterprise Cluster custom resource" below).
250
249
251
250
4. Deploy the OpenShift operator bundle:
252
-
> NOTE: Update the `storageClassName` setting in `openshift.bundle.yaml` (by default its set to `gp2`).
253
251
254
252
```bash
255
253
oc apply -f openshift.bundle.yaml
256
254
```
257
255
> Note: If you are running on OpenShift 3.x, use the `bundle.yaml` file located under `openshift_3_x` folder.
> Note: Define a `storageClassName` setting in`openshift/rec_rhel.yaml` as required (it's set to `gp2` by default).
260
259
261
-
Apply the `RedisEnterpriseCluster` resource with RHEL7 based images:
260
+
Apply the `RedisEnterpriseCluster` resource with RHEL8 based images:
262
261
263
262
```bash
264
263
oc apply -f openshift/rec_rhel.yaml
@@ -339,12 +338,12 @@ That folder also contains the custom resource definitions compatible with OpenSh
339
338
EOF
340
339
```
341
340
342
-
This must fail with an error output by the admission webhook redb.admisison.redislabs that is being denied because it can't get the login credentials for the Redis Enterprise Cluster as none were specified.
341
+
This must fail with an error output by the admission webhook redb.admisison.redislabs that is being denied because 'illegal' is not a valid eviction policy.
343
342
344
343
```shell script
345
344
Error from server: error when creating "STDIN": admission webhook "redb.admission.redislabs" denied the request: eviction_policy: u'illegal' is not one of [u'volatile-lru', u'volatile-ttl', u'volatile-random', u'allkeys-lru', u'allkeys-random', u'noeviction', u'volatile-lfu', u'allkeys-lfu']
346
345
```
347
-
> Note: procedure to enable admission is documented with further detail [here](admission/README.md
346
+
> Note: procedure to enable admission is documented with further detail [here](admission/README.md).
Image specification follow the [K8s Container schema](https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.10/#container-v1-core).
@@ -632,7 +630,7 @@ Note: in the examples above the Redis Enterprise Cluster name is: 'rec' and the
632
630
The Operator automates and simplifies the upgrade process.
633
631
The Redis Enterprise Cluster Software, and the Redis Enterprise Operator for Kubernetes versions are tightly coupled and should be upgraded together.
634
632
It is recommended to use the bundle.yaml to upgrade, as it loads all the relevant CRD documents for this version. If the updated CRDs are not loaded, the operator might fail.
635
-
There are two ways to upgrade - either set 'autoUpgradeRedisEnterprise' within the Redis Enterprise Cluster Spec to instruct the operator to automatically upgrade to the compatible version, or specify the correct Redis Enterprise image manually using the versionTag attribute. The Redis Enterprise Version compatible with this release is 6.2.10-90
633
+
There are two ways to upgrade - either set'autoUpgradeRedisEnterprise' within the Redis Enterprise Cluster Spec to instruct the operator to automatically upgrade to the compatible version, or specify the correct Redis Enterprise image manually using the versionTag attribute. The Redis Enterprise Version compatible with this release is 6.2.10-107
636
634
637
635
```yaml
638
636
autoUpgradeRedisEnterprise: true
@@ -641,45 +639,44 @@ There are two ways to upgrade - either set 'autoUpgradeRedisEnterprise' within t
641
639
Alternatively:
642
640
```yaml
643
641
RedisEnterpriseImageSpec:
644
-
versionTag: redislabs/redis:6.2.10-90
642
+
versionTag: redislabs/redis:6.2.10-107
645
643
```
646
644
647
645
## Supported K8S Distributions
648
646
Each release of the Redis Enterprise Operator deployment is thoroughly tested against a set of Kubernetes distributions. The table below lists these, along with the current release's support status. "Supported", as well as "deprecated" support status indicates the current release has been tested in this environment and supported by RedisLabs. "Deprecated" also indicates that support will be dropped in a coming future release. "No longer supported" indicates that support has been dropped for this distribution. Any distribution that isn't explicitly listed is not supported for production workloads by RedisLabs.
649
647
Supported versions (platforms/versions that are not listed are not supported):
Copy file name to clipboardExpand all lines: admission/GESHER.md
+3-3
Original file line number
Diff line number
Diff line change
@@ -1,8 +1,8 @@
1
-
# Admission Conrol with Gesher Installation for Redis Enterprise Operator
1
+
# Admission Control with Gesher Installation for Redis Enterprise Operator
2
2
3
3
## Gesher Background
4
4
5
-
Gesher is an operator that enables Kubernetes administrator to delegate the ability to setup webhook validating admisison controllers to users for running within their own namespace.
5
+
Gesher is an operator that enables Kubernetes administrator to delegate the ability to setup webhook validating admission controllers to users for running within their own namespace.
6
6
7
7
Gesher is configured by two custom resources.
8
8
@@ -11,7 +11,7 @@ Gesher is configured by two custom resources.
11
11
12
12
### Choosing Traditional Cluster or Gesher's Delegated installation methods.
13
13
14
-
Redis Labs provides two methods for integrating admission control into one's system, what we refer to as *cluster* and *delegated* configurations.
14
+
Redis provides two methods for integrating admission control into one's system, what we refer to as *cluster* and *delegated* configurations.
15
15
16
16
*Cluster* configuration integrates admission via the standard Kubernetes **ValidatingWebhookConfiguration** resource. This is a cluster-scoped kubernetes resource that can only be configured by a cluster administrator.
Copy file name to clipboardExpand all lines: admission/README.md
+1-1
Original file line number
Diff line number
Diff line change
@@ -52,7 +52,7 @@ spec:
52
52
EOF
53
53
```
54
54
55
-
This must fail with an error output by the admission webhook redb.admisison.redislabs that is being denied because it can't get the login credentials for the Redis Enterprise Cluster as none were specified.
55
+
This must fail with an error output by the admission webhook redb.admisison.redislabs that is being denied because 'illegal' is not a valid eviction policy.
56
56
57
57
```shell script
58
58
Error from server: error when creating "STDIN": admission webhook "redb.admission.redislabs" denied the request: eviction_policy: u'illegal' is not one of [u'volatile-lru', u'volatile-ttl', u'volatile-random', u'allkeys-lru', u'allkeys-random', u'noeviction', u'volatile-lfu', u'allkeys-lfu']
0 commit comments