-
Notifications
You must be signed in to change notification settings - Fork 770
[3.2] Add release notes #8844
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: main
Are you sure you want to change the base?
[3.2] Add release notes #8844
Conversation
✅ Snyk checks have passed. No issues have been found so far.
💻 Catch issues earlier using the plugins for VS Code, JetBrains IDEs, Visual Studio, and Eclipse. |
🔍 Preview links for changed docs |
|
||
#### User Password Generation (Enterprise feature) | ||
|
||
ECK will now generate longer passwords by default for the administrative user of each Elasticsearch Cluster. The password is 24 characters in length by default (can be configured to a maximum of 72 characters), incorporating alphabetic and numeric characters, to make password complexity stronger. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
ECK will now generate longer passwords by default for the administrative user of each Elasticsearch Cluster. The password is 24 characters in length by default (can be configured to a maximum of 72 characters), incorporating alphabetic and numeric characters, to make password complexity stronger. | |
ECK will now generate longer passwords by default for the administrative user of each Elasticsearch cluster. The password is 24 characters in length by default (can be configured to a maximum of 72 characters), incorporating alphabetic and numeric characters, to make password complexity stronger. |
|
||
#### Automatic pod disruption budget (Enterprise feature) | ||
|
||
ECK now offers better out-of-the-box pod disruption budgets that automatically keep your cluster available as pods move across nodes. The new policy calculates the number of pods per tier that can sustain replacement and automatically generates a pod-disruption budget for each tier, enabling the Elasticsearch cluster to vacate Kubernetes nodes more quickly, while considering cluster health, without interruption. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
ECK now offers better out-of-the-box pod disruption budgets that automatically keep your cluster available as pods move across nodes. The new policy calculates the number of pods per tier that can sustain replacement and automatically generates a pod-disruption budget for each tier, enabling the Elasticsearch cluster to vacate Kubernetes nodes more quickly, while considering cluster health, without interruption. | |
ECK now offers better out-of-the-box PodDisruptionBudgets that automatically keep your cluster available as Pods move across nodes. The new policy calculates the number of Pods per tier that can sustain replacement and automatically generates a PodDisruptionBudget for each tier, enabling the Elasticsearch cluster to vacate Kubernetes nodes more quickly, while considering cluster health, without interruption. |
We tend to capitalize Kubernetes API object names in the docs.
...draft...