Skip to content

Commit d3176e7

Browse files
Merge branch 'main' into DOC-4377
2 parents 02a5cfc + 048669d commit d3176e7

File tree

15 files changed

+165
-16
lines changed

15 files changed

+165
-16
lines changed

content/develop/get-started/vector-database.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -76,7 +76,7 @@ Connect to Redis. By default, Redis returns binary responses. To decode them, yo
7676
{{< clients-example search_vss connect />}}
7777
<br/>
7878
{{% alert title="Tip" color="warning" %}}
79-
Instead of using a local Redis Stack server, you can copy and paste the connection details from the Redis Cloud database configuration page. Here is an example connection string of a Cloud database that is hosted in the AWS region `us-east-1` and listens on port 16379: `redis-16379.c283.us-east-1-4.ec2.cloud.redislabs.com:16379`. The connection string has the format `host:port`. You must also copy and paste the username and password of your Cloud database. The line of code for connecting with the default user changes then to `client = redis.Redis(host="redis-16379.c283.us-east-1-4.ec2.cloud.redislabs.com", port=16379, password="your_password_here" decode_responses=True)`.
79+
Instead of using a local Redis Stack server, you can copy and paste the connection details from the Redis Cloud database configuration page. Here is an example connection string of a Cloud database that is hosted in the AWS region `us-east-1` and listens on port 16379: `redis-16379.c283.us-east-1-4.ec2.cloud.redislabs.com:16379`. The connection string has the format `host:port`. You must also copy and paste the username and password of your Cloud database. The line of code for connecting with the default user changes then to `client = redis.Redis(host="redis-16379.c283.us-east-1-4.ec2.cloud.redislabs.com", port=16379, password="your_password_here", decode_responses=True)`.
8080
{{% /alert %}}
8181

8282

@@ -115,7 +115,7 @@ Now iterate over the `bikes` array to store the data as [JSON]({{< relref "/dev
115115

116116
{{< clients-example search_vss load_data />}}
117117

118-
Once loaded, you can retrieve a specific attributes from one of the JSON documents in Redis using a [JSONPath](https://goessner.net/articles/JsonPath/) expression:
118+
Once loaded, you can retrieve a specific attribute from one of the JSON documents in Redis using a [JSONPath](https://goessner.net/articles/JsonPath/) expression:
119119

120120
{{< clients-example search_vss get />}}
121121

content/develop/interact/search-and-query/query/combined.md

Lines changed: 14 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -54,15 +54,15 @@ FT.SEARCH index "@text_field:( value1 value2 ... )"
5454

5555
The following example shows you a query that finds bicycles in new condition and in a price range from 500 USD to 1000 USD:
5656

57-
```
57+
{{< clients-example query_combined combined1 >}}
5858
FT.SEARCH idx:bicycle "@price:[500 1000] @condition:{new}"
59-
```
59+
{{< /clients-example >}}
6060

6161
You might also be interested in bicycles for kids. The query below shows you how to combine a full-text search with the criteria from the previous query:
6262

63-
```
63+
{{< clients-example query_combined combined2 >}}
6464
FT.SEARCH idx:bicycle "kids (@price:[500 1000] @condition:{used})"
65-
```
65+
{{< /clients-example >}}
6666

6767
## OR
6868

@@ -89,21 +89,21 @@ FT.SEARCH index "@tag_field:{ value1 | value2 | ... }"
8989

9090
The following query shows you how to find used bicycles that contain either the word 'kids' or 'small':
9191

92-
```
92+
{{< clients-example query_combined combined3 >}}
9393
FT.SEARCH idx:bicycle "(kids | small) @condition:{used}"
94-
```
94+
{{< /clients-example >}}
9595

9696
The previous query searches across all text fields. The following example shows you how to limit the search to the description field:
9797

98-
```
98+
{{< clients-example query_combined combined4 >}}
9999
FT.SEARCH idx:bicycle "@description:(kids | small) @condition:{used}"
100-
```
100+
{{< /clients-example >}}
101101

102102
If you want to extend the search to new bicycles, then the below example shows you how to do that:
103103

104-
```
104+
{{< clients-example query_combined combined5 >}}
105105
FT.SEARCH idx:bicycle "@description:(kids | small) @condition:{new | used}"
106-
```
106+
{{< /clients-example >}}
107107

108108
## NOT
109109

@@ -115,9 +115,9 @@ FT.SEARCH index "-(expr)"
115115

116116
If you want to exclude new bicycles from the search within the previous price range, you can use this query:
117117

118-
```
118+
{{< clients-example query_combined combined6 >}}
119119
FT.SEARCH idx:bicycle "@price:[500 1000] -@condition:{new}"
120-
```
120+
{{< /clients-example >}}
121121

122122
## Numeric filter
123123

@@ -140,8 +140,8 @@ FT.SEARCH index "(filter_expr)=>[KNN num_neighbours @field $vector]" PARAMS 2 ve
140140

141141
Here is an example:
142142

143-
```
143+
{{< clients-example query_combined combined7 >}}
144144
FT.SEARCH idx:bikes_vss "(@price:[500 1000] @condition:{new})=>[KNN 3 @vector $query_vector]" PARAMS 2 "query_vector" "Z\xf8\x15:\xf23\xa1\xbfZ\x1dI>\r\xca9..." DIALECT 2
145-
```
145+
{{< /clients-example >}}
146146

147147
The [vector search article]({{< relref "/develop/interact/search-and-query/query/vector-search" >}}) provides further details about vector queries in general.
Lines changed: 62 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,62 @@
1+
---
2+
alwaysopen: false
3+
categories:
4+
- docs
5+
- operate
6+
- kubernetes
7+
description: The Redis Enterprise K8s 6.4.2-8 release supports Redis Enterprise Software 6.4.2.
8+
linkTitle: 6.4.2-8 (Oct 2024)
9+
title: Redis Enterprise for Kubernetes release notes 6.4.2-8 (Oct 2024)
10+
weight: 53
11+
---
12+
13+
## Overview
14+
15+
This is a maintenance release of Redis Enterprise for Kubernetes version 6.4.2-8 and includes an updated Redis Enterprise image.
16+
17+
## New in this release
18+
19+
### Feature enhancements
20+
21+
* New Redis Enterprise software version 6.4.2-115
22+
23+
## Upgrade considerations
24+
25+
Be aware the following changes included in this release affect the upgrade process. Please read carefully before upgrading to 6.4.2-8.
26+
27+
* **Upgrade path to versions 7.2.4-2 or later**
28+
29+
Upgrading from this versions 7.2.4-2 or 7.2.4-7 is not possible using the OpenShift Operator Lifecycle Manager (OLM). OLM users will need to skip to version 7.2.4-10 to upgrade from this release version.
30+
31+
* **ValidatingWebhookConfiguration**
32+
33+
This release uses a new `ValidatingWebhookConfiguration` resource to replace the `redb-admission` webhook resource. To use releases 6.4.2-4 or later, delete the old webhook resource and apply the new file. See [upgrade Redis cluster]({{< relref "/operate/kubernetes/upgrade/upgrade-redis-cluster#reapply-webhook" >}}) for instructions.
34+
35+
* **OpenShift SCC**
36+
37+
This release includes a new SCC (`redis-enterprise-scc-v2`) that you need to bind to your service account before upgrading. OpenShift clusters running version 6.2.12 or earlier upgrading to version 6.2.18 or later might get stuck if you skip this step. See [upgrade a Redis Enterprise cluster (REC)]({{< relref "/operate/kubernetes/upgrade/upgrade-redis-cluster#before-upgrading" >}}) for more info.
38+
39+
## Compatibility
40+
41+
See [6.4.2-8 (July 2023) release notes]({{< relref "/operate/kubernetes/release-notes/6-4-2-releases/6-4-2-8#compatibility" >}}).
42+
43+
### Images
44+
45+
* **Redis Enterprise**: `redislabs/redis:6.4.2-115`
46+
* **Operator**: `redislabs/operator:6.4.2-8`
47+
* **Services Rigger**: `redislabs/k8s-controller:6.4.2-8.`
48+
49+
#### OpenShift images
50+
51+
* **Redis Enterprise**: `registry.connect.redhat.com/redislabs/redis-enterprise:6.4.2-115.rhel8-openshift`
52+
(or `redislabs/redis-enterprise:6.4.2-115.rhel7-openshift` if upgrading from RHEL 7)
53+
* **Operator**: `registry.connect.redhat.com/redislabs/redis-enterprise-operator:6.4.2-8`
54+
* **Services Rigger**: `registry.connect.redhat.com/redislabs/services-manager:6.4.2-8`
55+
56+
#### OLM bundle
57+
58+
* **Redis Enterprise operator bundle** : `v6.4.2-8.10`
59+
60+
## Known limitations
61+
62+
See [6.4.2-8 (July 2023) release notes]({{< relref "/operate/kubernetes/release-notes/6-4-2-releases/6-4-2-8#known-limitations" >}}).

content/operate/kubernetes/release-notes/7-2-4-releases/7-2-4-12-08-2024.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -22,6 +22,8 @@ This is a maintenance release to support Redis Enterprise Software version 7.2.4
2222

2323
## Version changes
2424

25+
For a list of fixes related to CVEs, see the [Redis Enterprise 7.2.4-109 release notes]({{<relref "operate/rs/release-notes/rs-7-2-4-releases/rs-7-2-4-109">}}).
26+
2527
### Breaking changes
2628

2729
The following changes included in this release affect the upgrade process. Please read carefully before upgrading to 7.2.4-12.
@@ -42,6 +44,7 @@ Versions 6.4.2-4 and later include a new `ValidatingWebhookConfiguration` resour
4244

4345
Versions 6.4.2-6 and later include a new SCC (`redis-enterprise-scc-v2`) that you need to bind to your service account before upgrading. OpenShift clusters running version 6.2.12 or earlier upgrading to version 6.2.18 or later might get stuck if you skip this step. See [upgrade a Redis Enterprise cluster (REC)]({{< relref "/operate/kubernetes/upgrade/upgrade-redis-cluster#before-upgrading" >}}) for instructions.
4446

47+
4548
### Upcoming changes
4649

4750
- A future release of Redis Enterprise will remove support for RHEL7. We recommend migrating to RHEL8.

content/operate/kubernetes/release-notes/7-4-6-releases/7-4-6-2-oct24.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -14,6 +14,7 @@ weight: 3
1414

1515
This is a maintenance release to support [Redis Enterprise Software version 7.4.6-77]({{<relref "operate/rs/release-notes/rs-7-4-2-releases/rs-7-4-6-102/">}}). For version changes, supported distributions, and known limitations, see the [release notes for 7-4-6-2 (July 2024)]({{<relref "/operate/kubernetes/release-notes/7-4-6-releases/7-4-6-2">}}).
1616

17+
1718
## Downloads
1819

1920
- **Redis Enterprise**: `redislabs/redis:7.4.6-77`

content/operate/kubernetes/release-notes/7-4-6-releases/7-4-6-2.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -33,6 +33,8 @@ The primary purpose of this release is to support [Redis Enterprise Software ver
3333

3434
## Version changes
3535

36+
For a list of fixes related to CVEs, see the [Redis Enterprise 7.2.4-109 release notes]({{<relref "/operate/rs/release-notes/rs-7-4-2-releases/rs-7-4-6-22">}}).
37+
3638
### Breaking changes
3739

3840
The following changes included in this release affect the upgrade process. Please read carefully before upgrading.

content/operate/rs/installing-upgrading/quickstarts/docker-quickstart.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -9,6 +9,7 @@ description: Set up a development or test deployment of Redis Enterprise Softwar
99
using Docker.
1010
linkTitle: Docker quickstart
1111
weight: 2
12+
aliases: /operate/rs/installing-upgrading/get-started-docker/
1213
---
1314
{{< warning >}}
1415
Docker containers are currently only supported for development and test environments, not for production. Use [Redis Enterprise on Kubernetes]({{< relref "/operate/kubernetes" >}}) for a supported containerized deployment.

content/operate/rs/release-notes/rs-6-4-2-releases/rs-6-4-2-110.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -108,6 +108,10 @@ Redis Enterprise 6.4.2-110 supports open source Redis 6.2 and 6.0. Below is the
108108

109109
Redis 6.2.x:
110110

111+
- (CVE-2024-31449) An authenticated user may use a specially crafted Lua script to trigger a stack buffer overflow in the bit library, which may potentially lead to remote code execution.
112+
113+
- (CVE-2024-31228) An authenticated user can trigger a denial-of-service by using specially crafted, long string match patterns on supported commands such as `KEYS`, `SCAN`, `PSUBSCRIBE`, `FUNCTION LIST`, `COMMAND LIST`, and ACL definitions. Matching of extremely long patterns may result in unbounded recursion, leading to stack overflow and process crashes.
114+
111115
- (CVE-2023-45145) The wrong order of listen(2) and chmod(2) calls creates a
112116
race condition that can be used by another process to bypass desired Unix
113117
socket permissions on startup. (Redis 6.2.14)

content/operate/rs/release-notes/rs-6-4-2-releases/rs-6-4-2-115.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -100,6 +100,10 @@ Redis Enterprise 6.4.2-115 supports open source Redis 6.2 and 6.0. Below is the
100100

101101
Redis 6.2.x:
102102

103+
- (CVE-2024-31449) An authenticated user may use a specially crafted Lua script to trigger a stack buffer overflow in the bit library, which may potentially lead to remote code execution.
104+
105+
- (CVE-2024-31228) An authenticated user can trigger a denial-of-service by using specially crafted, long string match patterns on supported commands such as `KEYS`, `SCAN`, `PSUBSCRIBE`, `FUNCTION LIST`, `COMMAND LIST`, and ACL definitions. Matching of extremely long patterns may result in unbounded recursion, leading to stack overflow and process crashes.
106+
103107
- (CVE-2023-45145) The wrong order of listen(2) and chmod(2) calls creates a
104108
race condition that can be used by another process to bypass desired Unix
105109
socket permissions on startup. (Redis 6.2.14)

content/operate/rs/release-notes/rs-7-2-4-releases/rs-7-2-4-109.md

Lines changed: 12 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -104,12 +104,20 @@ Redis Enterprise 7.2.4-109 supports open source Redis 7.2, 6.2, and 6.0. Below i
104104

105105
Redis 7.2.x:
106106

107+
- (CVE-2024-31449) An authenticated user may use a specially crafted Lua script to trigger a stack buffer overflow in the bit library, which may potentially lead to remote code execution.
108+
109+
- (CVE-2024-31228) An authenticated user can trigger a denial-of-service by using specially crafted, long string match patterns on supported commands such as `KEYS`, `SCAN`, `PSUBSCRIBE`, `FUNCTION LIST`, `COMMAND LIST`, and ACL definitions. Matching of extremely long patterns may result in unbounded recursion, leading to stack overflow and process crashes.
110+
107111
- (CVE-2023-41056) In some cases, Redis may incorrectly handle resizing of memory buffers, which can result in incorrect accounting of buffer sizes and lead to heap overflow and potential remote code execution.
108112

109113
- (CVE-2023-41053) Redis does not correctly identify keys accessed by `SORT_RO` and, as a result, may grant users executing this command access to keys that are not explicitly authorized by the ACL configuration. (Redis 7.2.1)
110114

111115
Redis 7.0.x:
112116

117+
- (CVE-2024-31449) An authenticated user may use a specially crafted Lua script to trigger a stack buffer overflow in the bit library, which may potentially lead to remote code execution.
118+
119+
- (CVE-2024-31228) An authenticated user can trigger a denial-of-service by using specially crafted, long string match patterns on supported commands such as `KEYS`, `SCAN`, `PSUBSCRIBE`, `FUNCTION LIST`, `COMMAND LIST`, and ACL definitions. Matching of extremely long patterns may result in unbounded recursion, leading to stack overflow and process crashes.
120+
113121
- (CVE-2023-41056) In some cases, Redis may incorrectly handle resizing of memory buffers, which can result in incorrect accounting of buffer sizes and lead to heap overflow and potential remote code execution.
114122

115123
- (CVE-2023-41053) Redis does not correctly identify keys accessed by `SORT_RO` and, as a result, may grant users executing this command access to keys that are not explicitly authorized by the ACL configuration. (Redis 7.0.13)
@@ -140,6 +148,10 @@ Redis 7.0.x:
140148

141149
Redis 6.2.x:
142150

151+
- (CVE-2024-31449) An authenticated user may use a specially crafted Lua script to trigger a stack buffer overflow in the bit library, which may potentially lead to remote code execution.
152+
153+
- (CVE-2024-31228) An authenticated user can trigger a denial-of-service by using specially crafted, long string match patterns on supported commands such as `KEYS`, `SCAN`, `PSUBSCRIBE`, `FUNCTION LIST`, `COMMAND LIST`, and ACL definitions. Matching of extremely long patterns may result in unbounded recursion, leading to stack overflow and process crashes.
154+
143155
- (CVE-2023-45145) The wrong order of listen(2) and chmod(2) calls creates a
144156
race condition that can be used by another process to bypass desired Unix
145157
socket permissions on startup. (Redis 6.2.14)

0 commit comments

Comments
 (0)