You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: content/operate/kubernetes/deployment/openshift/openshift-cli.md
+3-3Lines changed: 3 additions & 3 deletions
Original file line number
Diff line number
Diff line change
@@ -21,7 +21,7 @@ Use these steps to set up a Redis Enterprise Software cluster with OpenShift.
21
21
To see which version of Redis Enterprise for Kubernetes supports your OpenShift version, see [Supported Kubernetes distributions]({{< relref "/operate/kubernetes/reference/supported_k8s_distributions" >}}).
22
22
23
23
{{<note>}}
24
-
If you suspect your file descriptor limits are below 100,000, you must either manually increase limits or [Allow automatic resource adjustment]({{< relref "/operate/kubernetes/security/enable-privileged-mode" >}}). Most major cloud providers and standard container runtime configurations set default file descriptor limits well above the minimum required by Redis Enterprise. In these environments, you can safely run without enabling automatic resource adjustment.
24
+
If you suspect your file descriptor limits are below 100,000, you must either manually increase limits or [Allow automatic resource adjustment]({{< relref "/operate/kubernetes/security/allow-resource-adjustment" >}}). Most major cloud providers and standard container runtime configurations set default file descriptor limits well above the minimum required by Redis Enterprise. In these environments, you can safely run without enabling automatic resource adjustment.
25
25
{{</note>}}
26
26
27
27
## Deploy the operator
@@ -75,7 +75,7 @@ DO NOT modify or delete the StatefulSet created during the deployment process. D
75
75
76
76
## Security context constraints
77
77
78
-
Versions 7.22.0-6 and later run in without permissions to [allow automatic resource adjustment]({{<relref "content/operate/kubernetes/security/allow-resource-adjustment">}}). If you use the recommended default security constraints, remove the existing `redis-enterprise-scc-v2` SCC and unbind it from the REC service account after upgrading.
78
+
Versions 7.22.0-6 and later run in without permissions to [allow automatic resource adjustment]({{<relref "/operate/kubernetes/security/allow-resource-adjustment">}}). If you use the recommended default security constraints, remove the existing `redis-enterprise-scc-v2` SCC and unbind it from the REC service account after upgrading.
79
79
80
80
## Create a Redis Enterprise cluster custom resource
81
81
@@ -84,7 +84,7 @@ Versions 7.22.0-6 and later run in without permissions to [allow automatic resou
84
84
You can rename the file to `<your_cluster_name>.yaml`, but it is not required. Examples below use `<rec_rhel>.yaml`. [Options for Redis Enterprise clusters]({{< relref "/operate/kubernetes/reference/redis_enterprise_cluster_api">}}) has more info about the Redis Enterprise cluster (REC) custom resource, or see the [Redis Enterprise cluster API]({{<relref "/operate/kubernetes/reference/redis_enterprise_cluster_api">}}) for a full list of options.
85
85
86
86
{{<note>}}
87
-
If you suspect your file descriptor limits are below 100,000, you must either manually increase limits or [Allow automatic resource adjustment]({{< relref "/operate/kubernetes/security/enable-privileged-mode">}}). Most major cloud providers and standard container runtime configurations set default file descriptor limits well above the minimum required by Redis Enterprise. In these environments, you can safely run without enabling automatic resource adjustment.
87
+
If you suspect your file descriptor limits are below 100,000, you must either manually increase limits or [Allow automatic resource adjustment]({{< relref "/operate/kubernetes/security/allow-resource-adjustment">}}). Most major cloud providers and standard container runtime configurations set default file descriptor limits well above the minimum required by Redis Enterprise. In these environments, you can safely run without enabling automatic resource adjustment.
88
88
{{</note>}}
89
89
90
90
The REC name cannot be changed after cluster creation.
Copy file name to clipboardExpand all lines: content/operate/kubernetes/deployment/openshift/openshift-operatorhub.md
+3-3Lines changed: 3 additions & 3 deletions
Original file line number
Diff line number
Diff line change
@@ -12,7 +12,7 @@ weight: 70
12
12
---
13
13
You can deploy Redis Enterprise for Kubernetes from the Red Hat OpenShift CLI. You can also use a UI, [OperatorHub](https://docs.openshift.com/container-platform/4.11/operators/index.html) (Red Hat) to install operators and create custom resources.
14
14
15
-
{{<note>}}If you suspect your file descriptor limits are below 100,000, you must either manually increase limits or [Allow automatic resource adjustment]({{< relref "/operate/kubernetes/security/enable-privileged-mode" >}}). Most major cloud providers and standard container runtime configurations set default file descriptor limits well above the minimum required by Redis Enterprise. In these environments, you can safely run without enabling automatic resource adjustment.{{</note>}}
15
+
{{<note>}}If you suspect your file descriptor limits are below 100,000, you must either manually increase limits or [Allow automatic resource adjustment]({{< relref "/operate/kubernetes/security/allow-resource-adjustment" >}}). Most major cloud providers and standard container runtime configurations set default file descriptor limits well above the minimum required by Redis Enterprise. In these environments, you can safely run without enabling automatic resource adjustment.{{</note>}}
16
16
17
17
To see which version of Redis Enterprise for Kubernetes supports your OpenShift version, see [Supported Kubernetes distributions]({{< relref "/operate/kubernetes/reference/supported_k8s_distributions" >}}).
18
18
@@ -46,7 +46,7 @@ To see which version of Redis Enterprise for Kubernetes supports your OpenShift
46
46
47
47
## Security context constraints
48
48
49
-
Versions 7.22.0-6 and later run in without permissions to [allow automatic resource adjustment]({{<relref "content/operate/kubernetes/security/allow-resource-adjustment">}}). If you use the recommended default security constraints, remove the existing `redis-enterprise-scc-v2` SCC and unbind it from the REC service account after upgrading.
49
+
Versions 7.22.0-6 and later run in without permissions to [allow automatic resource adjustment]({{<relref "/operate/kubernetes/security/allow-resource-adjustment">}}). If you use the recommended default security constraints, remove the existing `redis-enterprise-scc-v2` SCC and unbind it from the REC service account after upgrading.
50
50
51
51
## Create Redis Enterprise custom resources
52
52
@@ -56,7 +56,7 @@ The **Installed Operators**->**Operator details** page shows the provided APIs:
56
56
Use the YAML view to create a custom resource file or let OperatorHub generate the YAML file for you by specifying your configuration options in the form view.
57
57
58
58
{{<note>}}
59
-
If you suspect your file descriptor limits are below 100,000, you must either manually increase limits or [Allow automatic resource adjustment]({{< relref "/operate/kubernetes/security/enable-privileged-mode" >}}). Most major cloud providers and standard container runtime configurations set default file descriptor limits well above the minimum required by Redis Enterprise. In these environments, you can safely run without enabling automatic resource adjustment.
59
+
If you suspect your file descriptor limits are below 100,000, you must either manually increase limits or [Allow automatic resource adjustment]({{< relref "/operate/kubernetes/security/allow-resource-adjustment" >}}). Most major cloud providers and standard container runtime configurations set default file descriptor limits well above the minimum required by Redis Enterprise. In these environments, you can safely run without enabling automatic resource adjustment.
60
60
{{</note>}}
61
61
62
62
<note> The REC name cannot be changed after cluster creation.</note>
Copy file name to clipboardExpand all lines: content/operate/kubernetes/release-notes/7-22-0-releases/7-22-0-11-june2025.md
+1-1Lines changed: 1 addition & 1 deletion
Original file line number
Diff line number
Diff line change
@@ -13,7 +13,7 @@ weight: 1
13
13
14
14
## Highlights
15
15
16
-
This is a maintenance release to support [Redis Enterprise Software version 7.22.0-95]({{<relref "/operate/rs/release-notes/rs-7-22-0-releases/">}}). For version changes, supported distributions, and known limitations, see the [release notes for 7.22.0-7 (April 2025)]({{<relref "/operate/kubernetes/release-notes/7-22-0-releases/7-22-0-7-april2025">}}).
16
+
This is a maintenance release to support [Redis Enterprise Software version 7.22.0-95]({{<relref "/operate/rs/release-notes/rs-7-22-releases/">}}). For version changes, supported distributions, and known limitations, see the [release notes for 7.22.0-7 (April 2025)]({{<relref "/operate/kubernetes/release-notes/7-22-0-releases/7-22-0-7-april2025">}}).
Copy file name to clipboardExpand all lines: content/operate/kubernetes/release-notes/7-22-0-releases/7-22-0-7-april2025.md
+1-1Lines changed: 1 addition & 1 deletion
Original file line number
Diff line number
Diff line change
@@ -32,7 +32,7 @@ Redis Enterprise for Kubernetes 7.22.0-7 is a feature release that includes enha
32
32
33
33
## Breaking changes
34
34
35
-
By default, the operator no longer sets additional Linux capabilities in the security context. If your deployment requires capabilities such as `SYS_RESOURCE`, see [Enable privileged mode]({{<relref "/operate/kubernetes/security/enable-privileged-mode">}}).
35
+
By default, the operator no longer sets additional Linux capabilities in the security context. If your deployment requires capabilities such as `SYS_RESOURCE`, see [Allow automatic resource adjustment]({{<relref "/operate/kubernetes/security/allow-resource-adjustment" >}}).
Copy file name to clipboardExpand all lines: content/operate/kubernetes/release-notes/7-8-6-releases/7-8-6-1-march2025.md
+2-2Lines changed: 2 additions & 2 deletions
Original file line number
Diff line number
Diff line change
@@ -15,7 +15,7 @@ weight: 50
15
15
16
16
Redis Enterprise for Kubernetes 7.8.6-1 is a feature release that includes enhancements, bug fixes, platform updates, and support for [Redis Software 7.8.6-13]({{<relref "/operate/rs/release-notes/rs-7-8-releases/rs-7-8-6-13.md">}}).
17
17
18
-
This release also includes the ability to [install the operator using Helm]({{<relref "deployment/helm.md">}}).
18
+
This release also includes the ability to [install the operator using Helm]({{<relref "/operate/kubernetes/deployment/helm" >}}).
19
19
20
20
Support for Helm is currently in public preview and is not supported on production workloads. Only new installations of the Redis operator are supported at this time.
21
21
@@ -93,4 +93,4 @@ Any distribution not listed below is not supported for production workloads.
93
93
94
94
## Known limitations
95
95
96
-
See [7.8.6 releases]({{<relref "release-notes/7-8-6-releases">}}) for information on known limitations.
96
+
See [7.8.6 releases]({{<relref "/operate/kubernetes/release-notes/7-8-6-releases/" >}}) for information on known limitations.
Upgrades to versions 7.22.0-6 and later run in **unprivileged mode** without any additional permissions or capabilities. If you don't specifally require additional capabilities, we recommend you maintain the default unprivileged mode, as its more secure. After upgrading, remove the existing `redis-enterprise-scc-v2` SCC and unbind it from the REC service account.
134
134
135
-
To enable privileged mode, see [Enable privileged mode > OpenShift upgrades]({{<relref "/operate/kubernetes/security/enable-privileged-mode#openshift-upgrades">}}).
135
+
To enable automatic resource adjustment, see [Allow automatic resource adjustment > OpenShift upgrades]({{<relref "/operate/kubernetes/security/allow-resource-adjustment#openshift-upgrades">}}).
Copy file name to clipboardExpand all lines: content/operate/kubernetes/upgrade/upgrade-olm.md
+1-1Lines changed: 1 addition & 1 deletion
Original file line number
Diff line number
Diff line change
@@ -77,7 +77,7 @@ You can monitor the upgrade from the **Installed Operators** page. A new Redis E
77
77
78
78
Upgrades to versions 7.22.0-6 and later run in **unprivileged mode** without any additional permissions or capabilities. If you don't specifally require additional capabilities, we recommend you maintain the default unprivileged mode, as its more secure. After upgrading, remove the existing `redis-enterprise-scc-v2` SCC and unbind it from the REC service account.
79
79
80
-
To enable privileged mode, see [Enable privileged mode > OpenShift upgrades]({{<relref "/operate/kubernetes/security/enable-privileged-mode#openshift-upgrades">}}).
80
+
To enable automatic resource adjustment, see [Allow automatic resource adjustment > OpenShift upgrades]({{<relref "/operate/kubernetes/security/allow-resource-adjustment#openshift-upgrades">}}).
0 commit comments