Skip to content

Commit c67ff94

Browse files
Release k8s Yellow Submarine (#1857)
* K8s: Yellow Submarine release notes (#1819) * 7.22.0-15 release notes * supported distro update * review feedback * K8s: configure role permissions (#1817) * configure role permissions * Apply suggestions from code review Co-authored-by: hassankh148 <[email protected]> * review feedback --------- Co-authored-by: hassankh148 <[email protected]> * K8s: helm upgrade changes (#1640) * helm upgrade changes * add helm info to upgrade pages * add migration section * update prereq * review edits --------- Co-authored-by: hassankh148 <[email protected]>
1 parent 9b39d9d commit c67ff94

File tree

10 files changed

+417
-165
lines changed

10 files changed

+417
-165
lines changed

content/operate/kubernetes/active-active/global-config.md

Lines changed: 70 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -48,7 +48,6 @@ The [REAADB API reference]({{<relref "/operate/kubernetes/reference/redis_enterp
4848

4949
This section edits the secrets under the REAADB `.spec.globalConfigurations` section. For more information and all available fields, see the [REAADB API reference]({{<relref "/operate/kubernetes/reference/redis_enterprise_active_active_database_api">}}).
5050

51-
5251
1. On an existing participating cluster, generate a YAML file containing the database secret with the relevant data.
5352

5453
This example shoes a secret named `my-db-secret` with the password `my-password` encoded in base 64.
@@ -87,7 +86,7 @@ This section edits the secrets under the REAADB `.spec.globalConfigurations` sec
8786

8887
1. On each other participating cluster, check the secret status.
8988

90-
``sh
89+
```sh
9190
kubectl get reaadb <reaadb-name> -o=jsonpath='{.status.secretsStatus}'
9291
```
9392

@@ -103,4 +102,72 @@ This section edits the secrets under the REAADB `.spec.globalConfigurations` sec
103102
kubectl apply -f <db-secret-file>
104103
```
105104

106-
1. Repeat the previous two steps on every participating cluster.
105+
1. Repeat the previous two steps on every participating cluster.
106+
107+
## Configure role permissions
108+
109+
You can configure role-based access control (RBAC) permissions for Active-Active databases using the `rolesPermissions` field in the REAADB `.spec.globalConfigurations` section. The role permissions configuration is propagated across all participating clusters, but the underlying roles and Redis ACLs must be manually created on each cluster.
110+
111+
{{<note>}}You must manually create the specified roles and Redis ACLs on all participating clusters before configuring role permissions. The operator only propagates the role permissions configuration—it does not create the underlying roles and ACLs. If roles or ACLs are missing on any cluster, the operator will log errors and dispatch an Event associated with the REAADB object until they are manually created.{{</note>}}
112+
113+
### Prerequisites
114+
115+
Before configuring role permissions:
116+
117+
1. Manually create the required roles and Redis ACLs on all participating clusters using the Redis Enterprise admin console or REST API.
118+
2. Ensure role and ACL names match exactly across all clusters (names are case-sensitive).
119+
3. Verify that roles and ACLs are properly configured on each cluster.
120+
121+
{{<warning>}}The operator does not automatically create or synchronize roles and ACLs across clusters. You are responsible for manually creating identical roles and ACLs on each participating cluster.{{</warning>}}
122+
123+
### Add role permissions to REAADB
124+
125+
1. Create or update your REAADB custom resource to include `rolesPermissions` in the global configurations.
126+
127+
Example REAADB with role permissions:
128+
129+
```yaml
130+
apiVersion: app.redislabs.com/v1alpha1
131+
kind: RedisEnterpriseActiveActiveDatabase
132+
metadata:
133+
name: reaadb-boeing
134+
spec:
135+
globalConfigurations:
136+
databaseSecretName: <my-secret>
137+
memorySize: 200MB
138+
shardCount: 3
139+
rolesPermissions:
140+
- role: <role-name>
141+
acl: <acl-name>
142+
type: redis-enterprise
143+
participatingClusters:
144+
- name: rerc-ohare
145+
- name: rerc-reagan
146+
```
147+
148+
Replace `<role-name>` and `<acl-name>` with the exact names of your Redis Enterprise role and ACL.
149+
150+
2. Apply the REAADB custom resource:
151+
152+
```sh
153+
kubectl apply -f <reaadb-file>
154+
```
155+
156+
Alternatively, patch an existing REAADB to add role permissions:
157+
158+
```sh
159+
kubectl patch reaadb <reaadb-name> --type merge --patch \
160+
'{"spec": {"globalConfigurations": {"rolesPermissions": [{"role": "<role-name>", "acl": "<acl-name>", "type": "redis-enterprise"}]}}}'
161+
```
162+
163+
3. After the REAADB is active and its replication status is "Up", verify role permissions are applied to the local database using the Redis Enterprise REST API. See [Database requests]({{<relref "/operate/rs/references/rest-api/requests/bdbs#get-bdbs">}}) for details.
164+
165+
### Troubleshooting role permissions
166+
167+
If you encounter issues with role permissions:
168+
169+
- **Missing role or ACL errors**: Manually create the specified roles and ACLs on all participating clusters with exact name matches. The operator cannot create these automatically.
170+
- **Permission propagation failures**: Verify that the roles and ACLs are properly configured and accessible on each cluster. Remember that you must manually create identical roles and ACLs on every participating cluster.
171+
- **Case sensitivity issues**: Verify that role and ACL names match exactly, including capitalization, across all clusters.
172+
173+
For more details on the `rolesPermissions` field structure, see the [REAADB API reference]({{<relref "/operate/kubernetes/reference/redis_enterprise_active_active_database_api#specglobalconfigurationsrolespermissions">}}).

content/operate/kubernetes/deployment/helm.md

Lines changed: 65 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -11,14 +11,13 @@ weight: 11
1111
---
1212
Helm charts provide a simple way to install the Redis Enterprise for Kubernetes operator in just a few steps. For more information about Helm, go to [https://helm.sh/docs/](https://helm.sh/docs/).
1313

14-
{{<note>}} This feature is currently in public preview and is not supported on production workloads. Only new installations of the Redis operator are supported at this time. The steps for [creating the RedisEnterpriseCluster (REC)]({{<relref "operate/kubernetes/deployment/quick-start#create-a-redis-enterprise-cluster-rec">}}) and other custom resources remain the same.{{</note>}}
15-
1614
## Prerequisites
1715

1816
- A [supported distribution]({{< relref "/operate/kubernetes/reference/supported_k8s_distributions" >}}) of Kubernetes.
1917
- At least three worker nodes.
2018
- [Kubernetes client (kubectl)](https://kubernetes.io/docs/tasks/tools/).
21-
- [Helm 3.10 or later](https://helm.sh/docs/intro/install/).
19+
- [Helm 3.10 or later](https://helm.sh/docs/intro/install/)
20+
or 3.18 for migrating from a non-Helm installation.
2221

2322
If you suspect your file descriptor limits are below 100,000, you must either manually increase limits or [Allow automatic resource adjustment]({{< relref "/operate/kubernetes/security/allow-resource-adjustment" >}}). Most major cloud providers and standard container runtime configurations set default file descriptor limits well above the minimum required by Redis Enterprise. In these environments, you can safely run without enabling automatic resource adjustment.
2423

@@ -36,14 +35,14 @@ The steps below use the following placeholders to indicate command line paramete
3635

3736
1. Add the Redis repository.
3837

39-
```sh
40-
helm repo add <repo-name> https://helm.redis.io/
41-
```
38+
```sh
39+
helm repo add <repo-name> https://helm.redis.io/
40+
```
4241

4342
2. Install the Helm chart into a new namespace.
4443

4544
```sh
46-
helm install <release-name> redis/redis-enterprise-operator \
45+
helm install <release-name> <repo-name>/redis-enterprise-operator \
4746
--version <chart-version> \
4847
--namespace <namespace-name> \
4948
--create-namespace
@@ -71,13 +70,13 @@ To monitor the installation add the `--debug` flag. The installation runs severa
7170

7271
### Specify values during install
7372

74-
1. View configurable values with `helm show values <repo-name>/<chart-name>`.
73+
1. View configurable values with `helm show values <repo-name>/redis-enterprise-operator`.
7574

7675
2. Install the Helm chart, overriding specific value defaults using `--set`.
7776

7877
```sh
79-
helm install <operator-name> redis/redis-enterprise-operator \
80-
--version <release-name> \
78+
helm install <operator-name> <repo-name>/redis-enterprise-operator \
79+
--version <chart-version> \
8180
--namespace <namespace-name> \
8281
--create-namespace
8382
--set <key1>=<value1> \
@@ -86,20 +85,72 @@ helm install <operator-name> redis/redis-enterprise-operator \
8685

8786
### Install with values file
8887

89-
1. View configurable values with `helm show values <repo-name>/<chart-name>`.
88+
1. View configurable values with `helm show values <repo-name>/redis-enterprise-operator`.
9089

9190
2. Create a YAML file to specify the values you want to configure.
9291

9392
3. Install the chart with the `--values` option.
9493

9594
```sh
96-
helm install <operator-name> redis/redis-enterprise-operator \
97-
--version <release-name> \
95+
helm install <operator-name> <repo-name>/redis-enterprise-operator \
96+
--version <chart-version> \
9897
--namespace <namespace-name> \
9998
--create-namespace \
10099
--values <path-to-values-file>
101100
```
102101

102+
## Migrate from a non-Helm installation
103+
104+
To migrate an existing non-Helm installation of the Redis Enterprise operator to a Helm-based installation:
105+
106+
1. [Upgrade]({{<relref "operate/kubernetes/upgrade">}}) your existing Redis Enterprise operator to match the version of the Helm chart you want to install. Use the same non-Helm method you used for the original installation.
107+
108+
2. [Install](#install) the Helm chart adding the `--take-ownership` flag:
109+
110+
```sh
111+
helm install <release-name> <repo-name>/redis-enterprise-operator --take-ownership
112+
```
113+
114+
- The `--take-ownership` flag is available with Helm versions 3.18 or later.
115+
- This flag is only needed for the first installation of the chart. Subsequent upgrades don't require this flag.
116+
- Use the `helm install` command, not `helm upgrade`.
117+
118+
3. Delete the old `ValidatingWebhookConfiguration` object from the previous non-Helm installation:
119+
120+
```sh
121+
kubectl delete validatingwebhookconfiguration redis-enterprise-admission
122+
```
123+
124+
This step is only needed when the `admission.limitToNamespace` chart value is set to `true` (the default). In this case, the webhook object installed by the chart is named `redis-enterprise-admission-<namespace>`, and the original webhook object, named `redis-enterprise-admission`, becomes redundant. If `admission.limitToNamespace` is set to `false`, the webhook installed by the chart is named `redis-enterprise-admission`, and the existing webhook object is reused.
125+
126+
## Upgrade the chart
127+
128+
To upgrade an existing Helm chart installation:
129+
130+
```sh
131+
helm upgrade <release-name> <repo-name>/redis-enterprise-operator --version <chart-version>
132+
```
133+
134+
You can also upgrade from a local directory:
135+
136+
```sh
137+
helm upgrade <release-name> <path-to-chart>
138+
```
139+
140+
For example, to upgrade a chart with the release name `my-redis-enterprise` from the chart's root directory:
141+
142+
```sh
143+
helm upgrade my-redis-enterprise .
144+
```
145+
146+
To upgrade with OpenShift, add `--set openshift.mode=true`.
147+
148+
The upgrade process automatically updates the operator and its components, including the Custom Resource Definitions (CRDs). The CRDs are versioned and update only if the new version is higher than the existing version.
149+
150+
After you upgrade the operator, you might need to upgrade your Redis Enterprise clusters, depending on the Redis software version bundled with the operator. For detailed information about the upgrade process, see [Redis Enterprise for Kubernetes upgrade documentation](https://redis.io/docs/latest/operate/kubernetes/upgrade/).
151+
152+
For more information and options when upgrading charts, see [helm upgrade](https://helm.sh/docs/helm/helm_upgrade/).
153+
103154
## Uninstall
104155

105156
1. Delete any custom resources managed by the operator. See [Delete custom resources]({{<relref "operate/kubernetes/re-clusters/delete-custom-resources">}}) for detailed steps. You must delete custom resources in the correct order to avoid errors.
@@ -116,7 +167,6 @@ This removes all Kubernetes resources associated with the chart and deletes the
116167

117168
## Known limitations
118169

119-
- Only new installations of the Redis operator are supported at this time. The steps for [creating the RedisEnterpriseCluster (REC)]({{<relref "operate/kubernetes/deployment/quick-start#create-a-redis-enterprise-cluster-rec">}}) and other custom resources remain the same.
120-
- Upgrades and migrations are not supported.
170+
- The steps for [creating the RedisEnterpriseCluster (REC)]({{<relref "operate/kubernetes/deployment/quick-start#create-a-redis-enterprise-cluster-rec">}}) and other custom resources remain the same.
121171
- The chart doesn't include configuration options for multiple namespaces, rack-awareness, and Vault integration. The steps for configuring these options remain the same.
122172
- The chart has had limited testing in advanced setups, including Active-Active configurations, air-gapped deployments, and IPv6/dual-stack environments.

0 commit comments

Comments
 (0)