Skip to content

Commit 9de106c

Browse files
authored
Merge pull request #196 from RedisLabs/6.2.8-2
promoting version 6.2.8-2
2 parents 0fa46c8 + 2706187 commit 9de106c

17 files changed

+18542
-1138
lines changed

README.md

+45-42
Original file line numberDiff line numberDiff line change
@@ -32,9 +32,9 @@ High level architecture and overview of the solution can be found [HERE](https:/
3232
The following are the images and tags for this release:
3333
| Component | k8s | Openshift |
3434
| --- | --- | --- |
35-
| Redis Enterprise | `redislabs/redis:6.2.4-55` | `redislabs/redis:6.2.4-55.rhel7-openshift` |
36-
| Operator | `redislabs/operator:6.2.4-1` | `redislabs/operator:6.2.4-1` |
37-
| Services Rigger | `redislabs/k8s-controller:6.2.4-1` | `redislabs/k8s-controller:6.2.4-1` |
35+
| Redis Enterprise | `redislabs/redis:6.2.8-41` | `redislabs/redis:6.2.8-41.rhel7-openshift` |
36+
| Operator | `redislabs/operator:6.2.8-2` | `redislabs/operator:6.2.8-2` |
37+
| Services Rigger | `redislabs/k8s-controller:6.2.8-2` | `redislabs/k8s-controller:6.2.8-2` |
3838
> * RedHat certified images are available on [Redhat Catalog](https://access.redhat.com/containers/#/product/71f6d1bb3408bd0d) </br>
3939
4040

@@ -114,11 +114,12 @@ This is the fastest way to get up and running with a new Redis Enterprise on Kub
114114
* Enable the Kubernetes webhook using the generated certificate
115115
116116
**NOTE**: One must replace REPLACE_WITH_NAMESPACE in the following command with the namespace the REC was installed into.
117-
117+
* Save the certificate into a local environmental variable
118118
```shell script
119-
# save cert
120119
CERT=`kubectl get secret admission-tls -o jsonpath='{.data.cert}'`
121-
# create patch file
120+
```
121+
* Create a patch file
122+
```shell script
122123
sed 's/NAMESPACE_OF_SERVICE_ACCOUNT/REPLACE_WITH_NAMESPACE/g' admission/webhook.yaml | kubectl create -f -
123124
124125
cat > modified-webhook.yaml <<EOF
@@ -128,37 +129,44 @@ This is the fastest way to get up and running with a new Redis Enterprise on Kub
128129
caBundle: $CERT
129130
admissionReviewVersions: ["v1beta1"]
130131
EOF
131-
# patch webhook with caBundle
132+
```
133+
* Patch the validating webhook with the certificate (caBundle)
134+
```shell script
132135
kubectl patch ValidatingWebhookConfiguration redb-admission --patch "$(cat modified-webhook.yaml)"
133-
```
136+
```
134137
135-
* Limiting the webhook to the relevant namespaces:
136-
Unless limited, webhooks will intercept requests from all namespaces.<br>
137-
In case you have several REC objects on your K8S cluster you need to limit the webhook to the relevant namespace.
138-
This is done by adding a `namespaceSelector` to the webhook spec that targets a label found on the namespace.<br>
139-
First, make sure you have such a relevant label on the namespace and that it is unique for this namespace. e.g.
140-
```
141-
apiVersion: v1
142-
kind: Namespace
143-
metadata:
144-
labels:
145-
namespace-name: staging
146-
name: staging
147-
```
148-
Then patch the webhook with a namespaceSelector. See this example:
149-
```
138+
* Limiting the webhook to the relevant namespaces:
139+
Unless limited, webhooks will intercept requests from all namespaces.<br>
140+
In case you have several REC objects on your K8S cluster you need to limit the webhook to the relevant namespace.
141+
This is done by adding a `namespaceSelector` to the webhook spec that targets a label found on the namespace.<br>
142+
143+
* First, make sure you have such a relevant label on the namespace and that it is unique for this namespace. e.g.
144+
145+
```yaml
146+
apiVersion: v1
147+
kind: Namespace
148+
metadata:
149+
labels:
150+
namespace-name: staging
151+
name: staging
152+
```
153+
154+
* Then, patch the webhook with a namespaceSelector. See this example:
155+
```shell script
150156
cat > modified-webhook.yaml <<EOF
151157
webhooks:
152158
- name: redb.admission.redislabs
153159
namespaceSelector:
154160
matchLabels:
155161
namespace-name: staging
156162
EOF
157-
158-
# apply the patch:
163+
```
164+
165+
* apply the patch:
166+
```shell script
159167
kubectl patch ValidatingWebhookConfiguration redb-admission --patch "$(cat modified-webhook.yaml)"
160168
```
161-
* Verify the installation
169+
* Verify the installation
162170
In order to verify that the all the components of the Admission Controller are installed correctly, we will try to apply an invalid resource that should force the admission controller to reject it. If it applies succesfully, it means the admission controller has not been hooked up correctly.
163171
164172
```shell script
@@ -331,7 +339,7 @@ The operator deploys a `RedisEnterpriseCluster` with default configurations valu
331339
redisEnterpriseImageSpec:
332340
imagePullPolicy: IfNotPresent
333341
repository: redislabs/redis
334-
versionTag: 6.2.4-55
342+
versionTag: 6.2.8-41
335343
```
336344
337345
* Persistence
@@ -433,21 +441,21 @@ For example:
433441
redisEnterpriseImageSpec:
434442
imagePullPolicy: IfNotPresent
435443
repository: harbor.corp.local/redisenterprise/redis
436-
versionTag: 6.2.4-55
444+
versionTag: 6.2.8-41
437445
```
438446
439447
```yaml
440448
redisEnterpriseServicesRiggerImageSpec:
441449
imagePullPolicy: IfNotPresent
442450
repository: harbor.corp.local/redisenterprise/k8s-controller
443-
versionTag: 6.2.4-1
451+
versionTag: 6.2.8-2
444452
```
445453
446454
```yaml
447455
bootstrapperImageSpec:
448456
imagePullPolicy: IfNotPresent
449457
repository: harbor.corp.local/redisenterprise/operator
450-
versionTag: 6.2.4-1
458+
versionTag: 6.2.8-2
451459
```
452460
453461
In Operator Deployment spec (operator.yaml):
@@ -459,7 +467,7 @@ spec:
459467
spec:
460468
containers:
461469
- name: redis-enterprise-operator
462-
image: harbor.corp.local/redisenterprise/operator:6.2.4-1
470+
image: harbor.corp.local/redisenterprise/operator:6.2.8-2
463471
```
464472
465473
Image specification follow the [K8s Container schema](https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.10/#container-v1-core).
@@ -582,7 +590,7 @@ Note: in the examples above the Redis Enterprise Cluster name is: 'rec' and the
582590
The Operator automates and simplifies the upgrade process.
583591
The Redis Enterprise Cluster Software, and the Redis Enterprise Operator for Kubernetes versions are tightly coupled and should be upgraded together.
584592
It is recommended to use the bundle.yaml to upgrade, as it loads all the relevant CRD documents for this version. If the updated CRDs are not loaded, the operator might fail.
585-
There are two ways to upgrade - either set 'autoUpgradeRedisEnterprise' within the Redis Enterprise Cluster Spec to instruct the operator to automatically upgrade to the compatible version, or specify the correct Redis Enterprise image manually using the versionTag attribute. The Redis Enterprise Version compatible with this release is 6.2.4-55
593+
There are two ways to upgrade - either set 'autoUpgradeRedisEnterprise' within the Redis Enterprise Cluster Spec to instruct the operator to automatically upgrade to the compatible version, or specify the correct Redis Enterprise image manually using the versionTag attribute. The Redis Enterprise Version compatible with this release is 6.2.8-41
586594
587595
```yaml
588596
autoUpgradeRedisEnterprise: true
@@ -591,7 +599,7 @@ There are two ways to upgrade - either set 'autoUpgradeRedisEnterprise' within t
591599
Alternatively:
592600
```yaml
593601
RedisEnterpriseImageSpec:
594-
versionTag: redislabs/redis:6.2.4-55
602+
versionTag: redislabs/redis:6.2.8-41
595603
```
596604
597605
## Supported K8S Distributions
@@ -603,32 +611,27 @@ Supported versions (platforms/versions that are not listed are not supported):
603611
| OpenShift 4.6 (K8s 1.19) | supported |
604612
| OpenShift 4.7 (K8s 1.20) | supported |
605613
| OpenShift 4.8 (K8s 1.21) | supported |
606-
| KOPS vanilla 1.16 | deprecated |
607-
| KOPS vanilla 1.17 | deprecated |
608614
| KOPS vanilla 1.18 | supported |
609615
| KOPS vanilla 1.19 | supported |
610616
| KOPS vanilla 1.20 | supported |
611617
| KOPS vanilla 1.21 | supported |
612-
| GKE 1.18 | supported |
613618
| GKE 1.19 | supported |
614619
| GKE 1.20 | supported |
615620
| GKE 1.21 | supported |
616-
| Rancher 2.4 (K8s 1.17) | supported |
617-
| Rancher 2.4 (K8s 1.18) | supported |
621+
| Rancher 2.4 (K8s 1.17) | deprecated |
622+
| Rancher 2.4 (K8s 1.18) | deprecated |
618623
| Rancher 2.5 (K8s 1.17) | supported |
619624
| Rancher 2.5 (K8s 1.18) | supported |
620625
| Rancher 2.5 (K8s 1.19) | supported |
621626
| Rancher 2.5 (K8s 1.20) | supported |
622-
| VMWare TKGIE* 1.7 (K8s 1.16) | deprecated |
623-
| VMWare TKGIE* 1.8 (K8s 1.17) | deprecated |
624627
| VMWare TKGIE** 1.10 (K8s 1.19) | supported |
625-
| AKS 1.18 | supported |
626628
| AKS 1.19 | supported |
627629
| AKS 1.20 | supported |
630+
| AKS 1.21 | supported |
628631
| EKS 1.18 | supported |
629632
| EKS 1.19 | supported |
630633
| EKS 1.20 | supported |
631634
| EKS 1.21 | supported |
632635
633-
\* No longer supported by VMware
636+
\* No longer supported by the vendor
634637
\*\* Tanzu Kubernetes Grid Integrated Edition

0 commit comments

Comments
 (0)