Skip to content

Commit 55865ed

Browse files
committed
DOC-5426 Added Redis 8 breaking changes and behavior changes to RS Gilboa release notes
1 parent c229dd4 commit 55865ed

File tree

2 files changed

+56
-0
lines changed

2 files changed

+56
-0
lines changed

content/operate/rs/release-notes/rs-8-0-releases/_index.md

Lines changed: 28 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -41,6 +41,34 @@ Redis Enterprise Software version 8.0 introduces the following breaking changes:
4141

4242
- TBA
4343

44+
### Redis database version 8 breaking changes {#redis-8-breaking-changes}
45+
46+
When new major versions of Redis Open Source change existing commands, upgrading your database to a new version can potentially break some functionality. Before you upgrade, read the provided list of breaking changes that affect Redis Software and update any applications that connect to your database to handle these changes.
47+
48+
#### ACL behavior changes
49+
50+
Before Redis 8, the existing [ACL]({{<relref "/operate/rs/security/access-control/redis-acl-overview">}}) categories `@read`, `@write`, `@dangerous`, `@admin`, `@slow`, and `@fast` did not include commands for the Redis Query Engine and the JSON, time series, and probabilistic data structures.
51+
52+
Starting with Redis 8, Redis includes all Query Engine, JSON, time series, Bloom filter, cuckoo filter, top-k, count-min sketch, and t-digest commands in these existing ACL categories.
53+
54+
As a result:
55+
56+
- Existing ACL rules such as `+@read +@write` will allow access to more commands than in previous versions of Redis. Here are some examples:
57+
- A user with `+@read` access will be able to execute `FT.SEARCH`.
58+
- A user with `+@write` access will be able to execute `JSON.SET`.
59+
60+
- ACL rules such as `+@all -@write` will allow access to fewer commands than previous versions of Redis.
61+
- For example, a user with `+@all -@write` will not be able to execute `JSON.SET`.
62+
- Explicit inclusion of new [command categories]({{<relref "/operate/oss_and_stack/management/security/acl#command-categories">}}) is required to maintain access.
63+
64+
- ACL rules such as `+@read +JSON.GET` can now be simplified as `+@read` because `JSON.GET` is included in the `@read` category.
65+
66+
Note that the `@all` category did not change, as it always included all the commands.
67+
68+
#### Redis Query Engine changes
69+
70+
{{<embed-md "redis8-breaking-changes-rqe.md">}}
71+
4472
### Product lifecycle updates
4573

4674
- TBA

content/operate/rs/release-notes/rs-8-0-releases/rs-8-0-tba.md

Lines changed: 28 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -176,6 +176,34 @@ Redis Enterprise Software version 8.0.0 introduces the following breaking change
176176
177177
- TBA
178178
179+
### Redis database version 8 breaking changes {#redis-8-breaking-changes}
180+
181+
When new major versions of Redis Open Source change existing commands, upgrading your database to a new version can potentially break some functionality. Before you upgrade, read the provided list of breaking changes that affect Redis Software and update any applications that connect to your database to handle these changes.
182+
183+
#### ACL behavior changes
184+
185+
Before Redis 8, the existing [ACL]({{<relref "/operate/rs/security/access-control/redis-acl-overview">}}) categories `@read`, `@write`, `@dangerous`, `@admin`, `@slow`, and `@fast` did not include commands for the Redis Query Engine and the JSON, time series, and probabilistic data structures.
186+
187+
Starting with Redis 8, Redis includes all Query Engine, JSON, time series, Bloom filter, cuckoo filter, top-k, count-min sketch, and t-digest commands in these existing ACL categories.
188+
189+
As a result:
190+
191+
- Existing ACL rules such as `+@read +@write` will allow access to more commands than in previous versions of Redis. Here are some examples:
192+
- A user with `+@read` access will be able to execute `FT.SEARCH`.
193+
- A user with `+@write` access will be able to execute `JSON.SET`.
194+
195+
- ACL rules such as `+@all -@write` will allow access to fewer commands than previous versions of Redis.
196+
- For example, a user with `+@all -@write` will not be able to execute `JSON.SET`.
197+
- Explicit inclusion of new [command categories]({{<relref "/operate/oss_and_stack/management/security/acl#command-categories">}}) is required to maintain access.
198+
199+
- ACL rules such as `+@read +JSON.GET` can now be simplified as `+@read` because `JSON.GET` is included in the `@read` category.
200+
201+
Note that the `@all` category did not change, as it always included all the commands.
202+
203+
#### Redis Query Engine changes
204+
205+
{{<embed-md "redis8-breaking-changes-rqe.md">}}
206+
179207
### Product lifecycle updates
180208
181209
- TBA

0 commit comments

Comments
 (0)