You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
2. Save the certificate to a local environment variable.
14
+
1. Save the certificate to a local environment variable.
15
15
16
-
```sh
17
-
CERT=`kubectl get secret admission-tls -o jsonpath='{.data.cert}'`
18
-
```
16
+
```sh
17
+
CERT=`kubectl get secret admission-tls -o jsonpath='{.data.cert}'`
18
+
```
19
19
20
-
3. Create a Kubernetes validating webhook, replacing `<namespace>` with the namespace where the REC was installed.
20
+
1. Create a Kubernetes validating webhook, replacing `<namespace>` with the namespace where the REC was installed.
21
21
22
-
The `webhook.yaml` template can be found in [redis-enterprise-k8s-docs/admission](https://github.com/RedisLabs/redis-enterprise-k8s-docs/tree/master/admission)
23
-
24
-
```sh
25
-
sed 's/OPERATOR_NAMESPACE/<namespace>/g' webhook.yaml | kubectl create -f -
26
-
```
27
-
28
-
4. Create a patch file for the Kubernetes validating webhook.
The `webhook.yaml` template can be found in [redis-enterprise-k8s-docs/admission](https://github.com/RedisLabs/redis-enterprise-k8s-docs/tree/master/admission)
23
+
24
+
```sh
25
+
sed 's/OPERATOR_NAMESPACE/<namespace>/g' webhook.yaml | kubectl create -f -
26
+
```
27
+
28
+
1. Create a patch file for the Kubernetes validating webhook.
Copy file name to clipboardExpand all lines: content/operate/kubernetes/deployment/openshift/openshift-cli.md
+44-43Lines changed: 44 additions & 43 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -42,7 +42,7 @@ To see which version of Redis Enterprise for Kubernetes supports your OpenShift
42
42
43
43
1. Deploy the OpenShift operator bundle.
44
44
45
-
{{<note>}} If you are using version 6.2.18-41 or earlier, you must [apply the security context constraint](#install-security-context-constraint) before the operator bundle. {{</note>}}
45
+
If you are using version 6.2.18-41 or earlier, you must [apply the security context constraint](#install-security-context-constraint) before the operator bundle.
46
46
47
47
```sh
48
48
oc apply -f openshift.bundle.yaml
@@ -92,12 +92,12 @@ The Redis Enterprise pods must run in OpenShift with privileges set in a [Securi
92
92
system:serviceaccount:<my-project>:<rec>
93
93
```
94
94
95
-
{{<note>}} If you are using version 6.2.18-41 or earlier, add additional permissions for your cluster.
95
+
{{<note>}} If you are using version 6.2.18-41 or earlier, add additional permissions for your cluster.
You can check the name of your project using the `oc project` command. To replace the project name, use `oc edit project myproject`. Replace `rec` with the name of your Redis Enterprise cluster, if different.
103
103
@@ -109,28 +109,28 @@ The Redis Enterprise pods must run in OpenShift with privileges set in a [Securi
109
109
110
110
The REC name cannot be changed after cluster creation.
111
111
112
-
{{<note>}}
113
-
Each Redis Enterprise cluster requires at least 3 nodes. Single-node RECs are not supported.
114
-
{{</note>}}
112
+
{{<note>}}
113
+
Each Redis Enterprise cluster requires at least 3 nodes. Single-node RECs are not supported.
114
+
{{</note>}}
115
115
116
116
2. Apply the custom resource file to create your Redis Enterprise cluster.
117
117
118
118
```sh
119
119
oc apply -f <rec_rhel>.yaml
120
120
```
121
121
122
-
The operator typically creates the REC within a few minutes.
122
+
The operator typically creates the REC within a few minutes.
123
123
124
124
3. Check the cluster status.
125
125
126
126
```sh
127
127
oc get pod
128
128
```
129
129
130
-
You should receive a response similar to the following:
131
-
130
+
You should receive a response similar to the following:
The 6.4.2-4 release introduces a new `ValidatingWebhookConfiguration` to replace `redb-admission`. See the [6.4.2-4 release notes]({{< relref "/operate/kubernetes/release-notes/6-4-2-releases/" >}}).
186
-
{{</note>}}
187
+
The 6.4.2-4 release introduces a new `ValidatingWebhookConfiguration` to replace `redb-admission`. See the [6.4.2-4 release notes]({{< relref "/operate/kubernetes/release-notes/6-4-2-releases/" >}}).
188
+
{{</note>}}
187
189
188
190
### Verify admission controller installation
189
191
@@ -212,14 +214,14 @@ The operator uses the instructions in the Redis Enterprise database (REDB) custo
212
214
213
215
1. Create a `RedisEnterpriseDatabase` custom resource.
214
216
215
-
This example creates a test database. For production databases, see [create a database]({{< relref "/operate/kubernetes/re-databases/db-controller.md#create-a-database" >}}) and [RedisEnterpriseDatabase API reference]({{< relref "/operate/kubernetes/reference/redis_enterprise_database_api" >}}).
217
+
This example creates a test database. For production databases, see [create a database]({{< relref "/operate/kubernetes/re-databases/db-controller.md#create-a-database" >}}) and [RedisEnterpriseDatabase API reference]({{< relref "/operate/kubernetes/reference/redis_enterprise_database_api" >}}).
216
218
217
219
```sh
218
220
cat << EOF > /tmp/redis-enterprise-database.yml
219
221
apiVersion: app.redislabs.com/v1alpha1
220
222
kind: RedisEnterpriseDatabase
221
223
metadata:
222
-
name: redis-enterprise-database
224
+
name: redis-enterprise-database
223
225
spec:
224
226
memorySize: 100MB
225
227
EOF
@@ -235,4 +237,3 @@ The operator uses the instructions in the Redis Enterprise database (REDB) custo
0 commit comments