You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
This page describe how to deploy Redis Enterprise on Kubernetes using the Redis Enterprise Operator. High level architecture and overview of the solution can be found [HERE](https://docs.redislabs.com/latest/platforms/kubernetes/).
16
17
@@ -27,8 +28,8 @@ The following are the images and tags for this release:
> Note: The redis-enterprise-cluster.yaml file was renamed to redisenterprisecluster_cr.yaml, with the API version prepended to the filename.
92
+
> Notes:
93
+
> 1. The `redis-enterprise-cluster.yaml` file was renamed to `redisenterprisecluster_cr.yaml`, with the API version prepended to the filename.
94
+
> 2. The Operator can only manage one Redis Enterprise Cluster custom resource in a namespace. To deploy another Enterprise Clusters in the same Kubernetes cluster, deploy an Operator in an additional namespace for each additional Enterprise Cluster required. Note that each Enterprise Cluster can effectively host hundreds of Redis Database instances. Deploying multiple clusters is typically used for scenarios where complete operational isolation is required at the cluster level.
91
95
92
96
5. Run ```kubectl get rec``` and verify creation was successful. `rec` is a shortcut for RedisEnterpriseCluster.
93
97
A typical response may look like this:
@@ -154,18 +158,18 @@ Other custom configurations are referenced in this repository.
154
158
```
155
159
156
160
4. Deploy the OpenShift operator bundle:
161
+
> NOTE: Update the `storageClassName` setting in`openshift.bundle.yaml` (by default its set to `gp2`).
@@ -195,6 +199,9 @@ Other custom configurations are referenced in this repository.
195
199
> When using the REDB Custom Resource Definition (Redis Enterprise Database) it is recommended to set up admission controller to improve input validation and catch configuration errors before they reach the cluster. The procedure is documented [here](admission/README.md).
196
200
197
201
202
+
### Installation on PKS
203
+
Instruction on how to deploy the Operator on PKS can be found on the [Redis Labs documentation Website](https://docs.redislabs.com/latest/platforms/pks/)
> NOTE: Make sure to witch context to the REC namespace or add flag -n <namespace>.
353
+
345
354
where:
346
355
347
356
- `<your-registry-server>` is your Private repository FQDN. ([https://index.docker.io/v1/](https://index.docker.io/v1/) for DockerHub)
@@ -377,7 +386,7 @@ spec:
377
386
The Operator automates and simplifies the upgrade process.
378
387
The Redis Enterprise Cluster Software, and the Redis Enterprise Operator for Kubernetes versions are tightly coupled and should be upgraded together.
379
388
It is recommended to use the bundle.yaml to upgrade, as it loads all the relevant CRD documents for this version. If the updated CRDs are not loaded, the operator might fail.
380
-
There are two ways to upgrade - either set'autoUpgradeRedisEnterprise' within the Redis Enterprise Cluster Spec to instruct the operator to automatically upgrade to the compatible version, or specify the correct Redis Enterprise image manually using the versionTag attribute. The Redis Enterprise version compatible with this release is 6.0.6-39
389
+
There are two ways to upgrade - either set'autoUpgradeRedisEnterprise' within the Redis Enterprise Cluster Spec to instruct the operator to automatically upgrade to the compatible version, or specify the correct Redis Enterprise image manually using the versionTag attribute. The Redis Enterprise Version compatible with this release is 6.0.6-39
381
390
382
391
```yaml
383
392
autoUpgradeRedisEnterprise: true
@@ -388,3 +397,24 @@ Alternatively:
388
397
RedisEnterpriseImageSpec:
389
398
versionTag: redislabs/redis:6.0.6-39
390
399
```
400
+
401
+
## Supported K8S Distributions
402
+
Each release of the Redis Enterprise Operator deployment is thoroughly tested against a set of Kubernetes distributions. The table below lists these, along with the current release's support status. "Supported", as well as "deprecated" support status indicates the current release has been tested in this environment and supported by RedisLabs. "Deprecated" also indicates that support will be dropped in a coming future release. "No longer supported" indicates that support has been dropped for this distribution. Any distribution that isn't explicitly listed is not supported for production workloads by RedisLabs.
Copy file name to clipboardExpand all lines: admission/README.md
+5-15Lines changed: 5 additions & 15 deletions
Original file line number
Diff line number
Diff line change
@@ -16,29 +16,19 @@ sed 's/NAMESPACE_OF_SERVICE_ACCOUNT/REPLACE_WITH_NAMESPACE/g' admission.bundle.y
16
16
17
17
If this is the first time one is deploying the admission controller, one has to approve the CSR and setup the webhook to enable resource validation. If one has already set these up, and one is just updating the admission controller, one skips steps 2 and 3 as they are already configured correctly
18
18
19
-
2. and waits for the CSR to ready and approves it
20
-
21
-
wait for it to be ready to be approved
19
+
2. and waits for the secret to be created
22
20
23
21
```shell script
24
-
kubectl get csr admission-tls
25
-
```
26
-
27
-
and approve it once it's pending approval
28
-
29
-
```shell script
30
-
kubectl certificate approve admission-tls
31
-
```
32
-
or on openshift
33
-
```shell script
34
-
oc adm certificate approve admission-tls
22
+
kubectl get secret admission-tls
23
+
NAME TYPE DATA AGE
24
+
admission-tls Opaque 2 2m43s
35
25
```
36
26
37
27
3. and modifies the webhook to use the certificate generated
38
28
39
29
```shell script
40
30
# save cert
41
-
CERT=`kubectl get csr admission-tls -o jsonpath='{.status.certificate}'`
31
+
CERT=`kubectl get secret admission-tls -o jsonpath='{.data.cert}'`
0 commit comments