Skip to content

Commit 07b897d

Browse files
authored
RS: 7.8.4 release docs (#1005)
* DOC-4629 Prepare RS 7.8 release notes landing page for minor releases * DOC-4630 DOC-4629 RS 7.8.4 release notes draft * DOC-4630 RS: Add cert-based auth fields to cluster REST API object reference * DOC-4630 RS: Add certificate_subject_line to user REST API object reference * DOC-4630 DOC-4629 Feedback updates to fix cert-based auth steps in release notes * DOC-4630 RS: Fix mtls_authorized_subjects type in cluster REST API object reference * DOC-4630 RS: Fix mtls_certificate_authentication type in release notes example * DOC-4629 Copy HFE known limitation to RS 7.8.4 release notes & remove patch version number from modules * DOC-4628 Added build number & checksums to RS 7.8.4 release notes * DOC-4629 Added one more resolved issue to release notes * Changed punctuation for consistency
1 parent f1b5a43 commit 07b897d

File tree

4 files changed

+302
-17
lines changed

4 files changed

+302
-17
lines changed

content/operate/rs/references/rest-api/objects/cluster/_index.md

Lines changed: 17 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -19,52 +19,55 @@ An API object that represents the cluster.
1919
| bigstore_driver | 'speedb'<br />'rocksdb' | Storage engine for Auto Tiering |
2020
| cluster_ssh_public_key | string | Cluster's autogenerated SSH public key |
2121
| cm_port | integer, (range:&nbsp;1024-65535) | UI HTTPS listening port |
22-
| cm_session_timeout_minutes | integer (default:&nbsp;15) | The timeout (in minutes) for the session to the CM |
23-
| cnm_http_max_threads_per_worker | integer (default: 10) | Maximum number of threads per worker in the `cnm_http` service (deprecated) |
22+
| <span class="break-all">cm_session_timeout_minutes</span> | integer (default:&nbsp;15) | The timeout (in minutes) for the session to the CM |
23+
| <span class="break-all">cnm_http_max_threads_per_worker</span> | integer (default: 10) | Maximum number of threads per worker in the `cnm_http` service (deprecated) |
2424
| cnm_http_port | integer, (range:&nbsp;1024-65535) | API HTTP listening port |
2525
| cnm_http_workers | integer (default: 1) | Number of workers in the `cnm_http` service |
2626
| cnm_https_port | integer, (range:&nbsp;1024-65535) | API HTTPS listening port |
2727
| control_cipher_suites | string | Specifies the enabled ciphers for the control plane. The ciphers are specified in the format understood by the BoringSSL library. |
28-
| control_cipher_suites_tls_1_3 | string | Specifies the enabled TLS 1.3 ciphers for the control plane. The ciphers are specified in the format understood by the BoringSSL library. (read-only) |
28+
| <span class="break-all">control_cipher_suites_tls_1_3</span> | string | Specifies the enabled TLS 1.3 ciphers for the control plane. The ciphers are specified in the format understood by the BoringSSL library. (read-only) |
2929
| crdb_coordinator_port | integer, (range:&nbsp;1024-65535) (default:&nbsp;9081) | CRDB coordinator port |
3030
| crdt_rest_client_retries | integer | Maximum number of retries for the REST client used by the Active-Active management API |
3131
| crdt_rest_client_timeout | integer | Timeout for REST client used by the Active-Active management API |
3232
| created_time | string | Cluster creation date (read-only) |
3333
| data_cipher_list | string | Specifies the enabled ciphers for the data plane. The ciphers are specified in the format understood by the OpenSSL library. |
34-
| data_cipher_suites_tls_1_3 | string | Specifies the enabled TLS 1.3 ciphers for the data plane. |
34+
| <span class="break-all">data_cipher_suites_tls_1_3</span> | string | Specifies the enabled TLS 1.3 ciphers for the data plane. |
3535
| debuginfo_path | string | Path to a local directory used when generating support packages |
36-
| default_non_sharded_proxy_policy | string (default:&nbsp;single) | Default proxy_policy for newly created non-sharded databases' endpoints (read-only) |
37-
| default_sharded_proxy_policy | string (default:&nbsp;all-master-shards) | Default proxy_policy for newly created sharded databases' endpoints (read-only) |
36+
| <span class="break-all">default_non_sharded_proxy_policy</span> | string (default:&nbsp;single) | Default proxy_policy for newly created non-sharded databases' endpoints (read-only) |
37+
| <span class="break-all">default_sharded_proxy_policy</span> | string (default:&nbsp;all-master-shards) | Default proxy_policy for newly created sharded databases' endpoints (read-only) |
3838
| email_alerts | boolean (default:&nbsp;false) | Send node/cluster email alerts (requires valid SMTP and email_from settings) |
3939
| email_from | string | Sender email for automated emails |
4040
| encrypt_pkeys | boolean (default:&nbsp;false) | Enable or turn off encryption of private keys |
4141
| envoy_admin_port | integer, (range:&nbsp;1024-65535) | Envoy admin port. Changing this port during runtime might result in an empty response because envoy serves as the cluster gateway.|
42-
| envoy_max_downstream_connections | integer, (range:&nbsp;100-2048) | The max downstream connections envoy is allowed to open |
42+
| <span class="break-all">envoy_max_downstream_connections</span> | integer, (range:&nbsp;100-2048) | The max downstream connections envoy is allowed to open |
4343
| envoy_mgmt_server_port | integer, (range:&nbsp;1024-65535) | Envoy management server port|
4444
| gossip_envoy_admin_port | integer, (range:&nbsp;1024-65535) | Gossip envoy admin port|
4545
| handle_redirects | boolean (default:&nbsp;false) | Handle API HTTPS requests and redirect to the master node internally |
4646
| http_support | boolean (default:&nbsp;false) | Enable or turn off HTTP support |
4747
| min_control_TLS_version | '1.2'<br />'1.3' | The minimum version of TLS protocol which is supported at the control path |
4848
| min_data_TLS_version | '1.2'<br />'1.3' | The minimum version of TLS protocol which is supported at the data path |
4949
| min_sentinel_TLS_version | '1.2'<br />'1.3' | The minimum version of TLS protocol which is supported at the data path |
50+
| mtls_authorized_subjects | array | {{<code>}}[{<br /> "CN": string,<br /> "O": string,<br /> "OU": [array of strings],<br /> "L": string,<br /> "ST": string,<br /> "C": string<br />}, ...]{{</code>}} A list of valid subjects used for additional certificate validations during TLS client authentication. All subject attributes are case-sensitive.<br />**Required subject fields**:<br />"CN" for Common Name<br />**Optional subject fields:**<br />"O" for Organization<br />"OU" for Organizational Unit (array of strings)<br />"L" for Locality (city)<br />"ST" for State/Province<br />"C" for 2-letter country code |
51+
| <span class="break-all">mtls_certificate_authentication</span> | boolean | Require authentication of client certificates for mTLS connections to the cluster. The API_CA certificate should be configured as a prerequisite. |
52+
| <span class="break-all">mtls_client_cert_subject_validation_type</span> | `disabled`<br />`san_cn`<br />`full_subject` | Enables additional certificate validations that further limit connections to clients with valid certificates during TLS client authentication.<br />Values:<br />**disabled**: Authenticates clients with valid certificates. No additional validations are enforced.<br />**san_cn**: A client certificate is valid only if its Common Name (CN) matches an entry in the list of valid subjects. Ignores other Subject attributes.<br />**full_subject**: A client certificate is valid only if its Subject attributes match an entry in the list of valid subjects. |
5053
| name | string | Cluster's fully qualified domain name (read-only) |
5154
| password_complexity | boolean (default:&nbsp;false) | Enforce password complexity policy |
52-
| password_expiration_duration | integer (default:&nbsp;0) | The number of days a password is valid until the user is required to replace it |
55+
| <span class="break-all">password_expiration_duration</span> | integer (default:&nbsp;0) | The number of days a password is valid until the user is required to replace it |
5356
| password_min_length | integer, (range: 8-256) (default: 8) | The minimum length required for a password. |
5457
| proxy_certificate | string | Cluster's proxy certificate |
55-
| proxy_max_ccs_disconnection_time | integer | Cluster-wide proxy timeout policy between proxy and CCS |
58+
| <span class="break-all">proxy_max_ccs_disconnection_time</span> | integer | Cluster-wide proxy timeout policy between proxy and CCS |
5659
| rack_aware | boolean | Cluster operates in a rack-aware mode (read-only) |
5760
| reserved_ports | array of strings | List of reserved ports and/or port ranges to avoid using for database endpoints (for example `"reserved_ports": ["11000", "13000-13010"]`) |
5861
| s3_url | string | Specifies the URL for S3 export and import |
5962
| saslauthd_ldap_conf | string | saslauthd LDAP configuration |
6063
| sentinel_cipher_suites | array | Specifies the list of enabled ciphers for the sentinel service. The supported ciphers are those implemented by the [cipher_suites.go](<https://golang.org/src/crypto/tls/cipher_suites.go>) package. |
61-
| sentinel_cipher_suites_tls_1_3 | string | Specifies the list of enabled TLS 1.3 ciphers for the discovery (sentinel) service. The supported ciphers are those implemented by the [cipher_suites.go](<https://golang.org/src/crypto/tls/cipher_suites.go>) package.(read-only) |
64+
| <span class="break-all">sentinel_cipher_suites_tls_1_3<span> | string | Specifies the list of enabled TLS 1.3 ciphers for the discovery (sentinel) service. The supported ciphers are those implemented by the [cipher_suites.go](<https://golang.org/src/crypto/tls/cipher_suites.go>) package.(read-only) |
6265
| sentinel_tls_mode | 'allowed'<br />'disabled' <br />'required' | Determines whether the discovery service allows, blocks, or requires TLS connections (previously named `sentinel_ssl_policy`)<br />**allowed**: Allows both TLS and non-TLS connections<br />**disabled**: Allows only non-TLS connections<br />**required**: Allows only TLS connections |
6366
| slave_ha | boolean (default:&nbsp;false) | Enable the replica high-availability mechanism (read-only) |
64-
| slave_ha_bdb_cooldown_period | integer (default:&nbsp;86400) | Time in seconds between runs of the replica high-availability mechanism on different nodes on the same database (read-only) |
65-
| slave_ha_cooldown_period | integer (default:&nbsp;3600) | Time in seconds between runs of the replica high-availability mechanism on different nodes (read-only) |
66-
| slave_ha_grace_period | integer (default:&nbsp;900) | Time in seconds between a node failure and when the replica high-availability mechanism starts relocating shards (read-only) |
67-
| slowlog_in_sanitized_support | boolean | Whether to include slowlogs in the sanitized support package |
67+
| <span class="break-all">slave_ha_bdb_cooldown_period</span> | integer (default:&nbsp;86400) | Time in seconds between runs of the replica high-availability mechanism on different nodes on the same database (read-only) |
68+
| <span class="break-all">slave_ha_cooldown_period</span> | integer (default:&nbsp;3600) | Time in seconds between runs of the replica high-availability mechanism on different nodes (read-only) |
69+
| <span class="break-all">slave_ha_grace_period</span> | integer (default:&nbsp;900) | Time in seconds between a node failure and when the replica high-availability mechanism starts relocating shards (read-only) |
70+
| <span class="break-all">slowlog_in_sanitized_support</span> | boolean | Whether to include slowlogs in the sanitized support package |
6871
| smtp_host | string | SMTP server for automated emails |
6972
| smtp_password | string | SMTP server password |
7073
| smtp_port | integer | SMTP server port for automated emails |

content/operate/rs/references/rest-api/objects/user.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -17,6 +17,7 @@ weight: $weight
1717
| action_uid | string | Action UID. If it exists, progress can be tracked by the `GET`&nbsp;`/actions/{uid}` API request (read-only) |
1818
| auth_method | **'regular'**<br />'certificate'<br />'entraid' | User's authentication method |
1919
| bdbs_email_alerts | complex object | UIDs of databases that user will receive alerts for |
20+
| certificate_subject_line | string | The certificate’s subject line as defined by RFC2253. Used for certificate-based authentication users only. |
2021
| cluster_email_alerts | boolean | Activate cluster email alerts for a user |
2122
| email | string | User's email (pattern matching only ASCII characters) |
2223
| email_alerts | boolean (default:&nbsp;true) | Activate email alerts for a user |

content/operate/rs/release-notes/rs-7-8-releases/_index.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
Title: Redis Software release notes 7.8.2
2+
Title: Redis Software release notes 7.8.x
33
alwaysopen: false
44
categories:
55
- docs
@@ -8,12 +8,12 @@ categories:
88
compatibleOSSVersion: Redis 7.4.0
99
description: Redis Community Edition 7.4 features. Hash field expiration. Client-side caching support. Metrics stream engine preview. New APIs to check database availability, rebalance shards, fail over shards, and control database traffic. Cluster Manager UI enhancements for node actions, database tags, and database configuration. User manager role. Log rotation based on both size and time. Module management enhancements. Configurable minimum password length. Configurable license expiration alert threshold.
1010
hideListLinks: true
11-
linkTitle: 7.8.2 releases
11+
linkTitle: 7.8.x releases
1212
toc: 'true'
1313
weight: 69
1414
---
1515

16-
[​Redis Software version 7.8.2](https://redis.io/downloads/#software) is now available!
16+
[​Redis Software version 7.8](https://redis.io/downloads/#software) is now available!
1717

1818
## Highlights
1919

0 commit comments

Comments
 (0)