You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
If you are using version 6.2.18-41 or earlier, you must [apply the security context constraint](#install-security-context-constraint) before the operator bundle.
46
-
44
+
If you are using version 6.2.18-41 or earlier, you must [apply the security context constraint](#install-security-context-constraint) before the operator bundle.
45
+
47
46
```sh
48
47
oc apply -f openshift.bundle.yaml
49
48
```
50
49
51
-
{{< warning >}}Changes to the `openshift.bundle.yaml` file can cause unexpected results.{{< /warning >}}
50
+
{{< warning >}}
51
+
Changes to the `openshift.bundle.yaml` file can cause unexpected results.
52
+
{{< /warning >}}
52
53
53
54
1. Verify that your `redis-enterprise-operator` deployment is running.
54
55
@@ -63,15 +64,19 @@ To see which version of Redis Enterprise for Kubernetes supports your OpenShift
63
64
redis-enterprise-operator 1/1 1 1 0m36s
64
65
```
65
66
66
-
{{<warning>}}DO NOT modify or delete the StatefulSet created during the deployment process. Doing so could destroy your Redis Enterprise cluster (REC).{{</warning>}}
67
+
{{<warning>}}
68
+
DO NOT modify or delete the StatefulSet created during the deployment process. Doing so could destroy your Redis Enterprise cluster (REC).
69
+
{{</warning>}}
67
70
68
71
## Install security context constraint
69
72
70
73
The Redis Enterprise pods must run in OpenShift with privileges setin a [Security Context Constraint](https://docs.openshift.com/container-platform/4.4/authentication/managing-security-context-constraints.html#security-context-constraints-about_configuring-internal-oauth). This grants the pod various rights, such as the ability to change system limits or run as a particular user.
71
74
72
75
1. Apply the file `scc.yaml` file.
73
76
74
-
{{<warning>}}Do not edit this file. {{</warning>}}
77
+
{{<warning>}}
78
+
Do not edit this file.
79
+
{{</warning>}}
75
80
76
81
```sh
77
82
oc apply -f openshift/scc.yaml
@@ -92,12 +97,14 @@ The Redis Enterprise pods must run in OpenShift with privileges set in a [Securi
92
97
system:serviceaccount:<my-project>:<rec>
93
98
```
94
99
95
-
{{<note>}} If you are using version 6.2.18-41 or earlier, add additional permissions for your cluster.
You can check the name of your project using the `oc project` command. To replace the project name, use `oc edit project myproject`. Replace `rec` with the name of your Redis Enterprise cluster, if different.
103
110
@@ -110,7 +117,7 @@ The Redis Enterprise pods must run in OpenShift with privileges set in a [Securi
110
117
The REC name cannot be changed after cluster creation.
111
118
112
119
{{<note>}}
113
-
Each Redis Enterprise cluster requires at least 3 nodes. Single-node RECs are not supported.
120
+
Each Redis Enterprise cluster requires at least 3 nodes. Single-node RECs are not supported.
114
121
{{</note>}}
115
122
116
123
2. Apply the custom resource file to create your Redis Enterprise cluster.
@@ -121,13 +128,13 @@ The Redis Enterprise pods must run in OpenShift with privileges set in a [Securi
121
128
122
129
The operator typically creates the REC within a few minutes.
123
130
124
-
3. Check the cluster status.
131
+
1. Check the cluster status.
125
132
126
133
```sh
127
134
oc get pod
128
135
```
129
136
130
-
You should receive a response similar to the following:
137
+
You should receive a response similar to the following:
131
138
132
139
```sh
133
140
NAME | READY | STATUS | RESTARTS | AGE |
@@ -158,7 +165,7 @@ If not limited, the webhook intercepts requests from all namespaces. If you have
158
165
name: staging
159
166
```
160
167
161
-
1. Patch the webhook spec with the `namespaceSelector` field.
168
+
1. Patch the webhook spec with the `namespaceSelector` field.
162
169
163
170
```sh
164
171
cat > modified-webhook.yaml <<EOF
@@ -170,22 +177,22 @@ If not limited, the webhook intercepts requests from all namespaces. If you have
The 6.4.2-4 release introduces a new `ValidatingWebhookConfiguration` to replace `redb-admission`. See the [6.4.2-4 release notes]({{< relref "/operate/kubernetes/release-notes/6-4-2-releases/" >}}).
188
+
For releases before 6.4.2-4, use this command instead:
The 6.4.2-4 release introduces a new `ValidatingWebhookConfiguration` to replace `redb-admission`. See the [6.4.2-4 release notes]({{< relref "/operate/kubernetes/release-notes/6-4-2-releases/" >}}).
Copy file name to clipboardExpand all lines: content/operate/kubernetes/deployment/quick-start.md
+28-33Lines changed: 28 additions & 33 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -23,10 +23,10 @@ This guide works with most supported Kubernetes distributions. If you're using O
23
23
24
24
To deploy Redis Enterprise for Kubernetes, you'll need:
25
25
26
-
* a Kubernetes cluster in a [supported distribution]({{< relref "/operate/kubernetes/reference/supported_k8s_distributions.md" >}})
27
-
* a minimum of three worker nodes
28
-
* a Kubernetes client (kubectl)
29
-
* access to DockerHub, RedHat Container Catalog, or a private repository that can hold the required images.
26
+
- Kubernetes cluster in a [supported distribution]({{< relref "/operate/kubernetes/reference/supported_k8s_distributions.md" >}})
27
+
- minimum of three worker nodes
28
+
- Kubernetes client (kubectl)
29
+
- access to DockerHub, RedHat Container Catalog, or a private repository that can hold the required images.
30
30
31
31
### Create a new namespace
32
32
@@ -116,7 +116,7 @@ The following example creates a minimal Redis Enterprise cluster. See the [Redis
116
116
1. Create a file that defines a Redis Enterprise cluster with three nodes.
117
117
118
118
{{<note>}}
119
-
The REC name (`my-rec` in this example) cannot be changed after cluster creation.
119
+
The REC name (`my-rec` in this example) cannot be changed after cluster creation.
120
120
{{</note>}}
121
121
122
122
```sh
@@ -130,12 +130,11 @@ The following example creates a minimal Redis Enterprise cluster. See the [Redis
130
130
EOF
131
131
```
132
132
133
-
This will request a cluster with three Redis Enterprise nodes using the
134
-
default requests (i.e., 2 CPUs and 4GB of memory per node).
133
+
This will request a cluster with three Redis Enterprise nodes using the default requests (i.e., 2 CPUs and 4GB of memory per node).
135
134
136
-
To test with a larger configuration, use the example below to add node resources to the `spec` section of your test cluster (`my-rec.yaml`).
135
+
To test with a larger configuration, use the example below to add node resources to the `spec` section of your test cluster (`my-rec.yaml`).
137
136
138
-
```yaml
137
+
```sh
139
138
redisEnterpriseNodeResources:
140
139
limits:
141
140
cpu: 2000m
@@ -146,52 +145,49 @@ The following example creates a minimal Redis Enterprise cluster. See the [Redis
146
145
```
147
146
148
147
{{<note>}}
149
-
Each cluster must have at least 3 nodes. Single-node RECs are not supported.
148
+
Each cluster must have at least 3 nodes. Single-node RECs are not supported.
150
149
{{</note>}}
151
150
152
-
See the [Redis Enterprise hardware requirements]({{< relref "/operate/rs/installing-upgrading/install/plan-deployment/hardware-requirements.md">}}) for more
153
-
information on sizing Redis Enterprise node resource requests.
151
+
See the [Redis Enterprise hardware requirements]({{< relref "/operate/rs/installing-upgrading/install/plan-deployment/hardware-requirements.md" >}}) for more information on sizing Redis Enterprise node resource requests.
154
152
155
153
1. Apply your custom resource file in the same namespace as `my-rec.yaml`.
156
154
157
155
```sh
158
156
kubectl apply -f my-rec.yaml
159
157
```
160
158
161
-
You should see a result similar to this:
159
+
You should see a result similar to this:
162
160
163
-
```sh
164
-
redisenterprisecluster.app.redislabs.com/my-rec created
165
-
```
161
+
```sh
162
+
redisenterprisecluster.app.redislabs.com/my-rec created
163
+
```
166
164
167
165
1. You can verify the creation of the cluster with:
168
166
169
167
```sh
170
168
kubectl get rec
171
169
```
172
170
173
-
You should see a result similar to this:
171
+
You should see a result similar to this:
174
172
175
173
```sh
176
174
NAME AGE
177
175
my-rec 1m
178
176
```
179
177
180
-
At this point, the operator will go through the process of creating various
181
-
services and pod deployments.
178
+
At this point, the operator will go through the process of creating various services and pod deployments.
182
179
183
-
You can track the progress by examining the
184
-
StatefulSet associated with the cluster:
180
+
You can track the progress by examining the StatefulSet associated with the cluster:
185
181
186
-
```sh
187
-
kubectl rollout status sts/my-rec
188
-
```
182
+
```sh
183
+
kubectl rollout status sts/my-rec
184
+
```
189
185
190
-
or by looking at the status of all of the resources in your namespace:
186
+
or by looking at the status of all of the resources in your namespace:
191
187
192
-
```sh
193
-
kubectl get all
194
-
```
188
+
```sh
189
+
kubectl get all
190
+
```
195
191
196
192
## Enable the admission controller
197
193
@@ -250,15 +246,14 @@ The operator bundle includes a webhook file. The webhook will intercept requests
250
246
EOF
251
247
```
252
248
253
-
You should see your request was denied by the `admission webhook "redisenterprise.admission.redislabs"`.
249
+
You should see your request was denied by the `admission webhook "redisenterprise.admission.redislabs"`.
254
250
255
-
```sh
256
-
Error from server: error when creating "STDIN": admission webhook "redisenterprise.admission.redislabs" denied the request: eviction_policy: u'illegal' is not one of [u'volatile-lru', u'volatile-ttl', u'volatile-random', u'allkeys-lru', u'allkeys-random', u'noeviction', u'volatile-lfu', u'allkeys-lfu']
257
-
```
251
+
```sh
252
+
Error from server: error when creating "STDIN": admission webhook "redisenterprise.admission.redislabs" denied the request: eviction_policy: u'illegal' is not one of [u'volatile-lru', u'volatile-ttl', u'volatile-random', u'allkeys-lru', u'allkeys-random', u'noeviction', u'volatile-lfu', u'allkeys-lfu']
253
+
```
258
254
259
255
## Create a Redis Enterprise Database (REDB)
260
256
261
257
You can create multiple databases within the same namespace as your REC or in other namespaces.
262
258
263
259
See [manage Redis Enterprise databases for Kubernetes]({{< relref "/operate/kubernetes/re-databases/db-controller.md">}}) to create a new REDB.
0 commit comments