From 479fce5d869f9ebb1754de2d6802a92639c782bb Mon Sep 17 00:00:00 2001 From: Ubuntu Date: Thu, 4 Nov 2021 18:44:02 +0000 Subject: [PATCH 1/2] promoting version 6.2.8-2 --- .gitignore | 2 +- README.md | 87 +- bundle.yaml | 4874 +++++++++++++++++++++++++-- crds/v1/rec_crd.yaml | 4851 +++++++++++++++++++++++++-- crds/v1alpha1/rec_crd.yaml | 4851 +++++++++++++++++++++++++-- crds/v1alpha1/redb_crd.yaml | 5 + log_collector/log_collector.py | 19 + multi-namespace-redb/README.md | 10 +- multi-namespace-redb/operator.yaml | 4 +- multi-namespace-redb/role.yaml | 10 +- openshift.bundle.yaml | 4875 ++++++++++++++++++++++++++-- openshift/operator_rhel.yaml | 4 +- openshift/rec_rhel.yaml | 2 +- openshift/role.yaml | 21 +- operator.yaml | 4 +- redis_enterprise_cluster_api.md | 42 +- redis_enterprise_database_api.md | 3 +- role.yaml | 18 +- 18 files changed, 18543 insertions(+), 1139 deletions(-) diff --git a/.gitignore b/.gitignore index 485dee6..5c3bdbb 100644 --- a/.gitignore +++ b/.gitignore @@ -1 +1 @@ -.idea +*bundle.yaml diff --git a/README.md b/README.md index 75187b0..49365b7 100644 --- a/README.md +++ b/README.md @@ -32,9 +32,9 @@ High level architecture and overview of the solution can be found [HERE](https:/ The following are the images and tags for this release: | Component | k8s | Openshift | | --- | --- | --- | -| Redis Enterprise | `redislabs/redis:6.2.4-55` | `redislabs/redis:6.2.4-55.rhel7-openshift` | -| Operator | `redislabs/operator:6.2.4-1` | `redislabs/operator:6.2.4-1` | -| Services Rigger | `redislabs/k8s-controller:6.2.4-1` | `redislabs/k8s-controller:6.2.4-1` | +| Redis Enterprise | `redislabs/redis:6.2.8-41` | `redislabs/redis:6.2.8-41.rhel7-openshift` | +| Operator | `redislabs/operator:6.2.8-2` | `redislabs/operator:6.2.8-2` | +| Services Rigger | `redislabs/k8s-controller:6.2.8-2` | `redislabs/k8s-controller:6.2.8-2` | > * RedHat certified images are available on [Redhat Catalog](https://access.redhat.com/containers/#/product/71f6d1bb3408bd0d)
@@ -114,11 +114,12 @@ This is the fastest way to get up and running with a new Redis Enterprise on Kub * Enable the Kubernetes webhook using the generated certificate **NOTE**: One must replace REPLACE_WITH_NAMESPACE in the following command with the namespace the REC was installed into. - + * Save the certificate into a local environmental variable ```shell script - # save cert CERT=`kubectl get secret admission-tls -o jsonpath='{.data.cert}'` - # create patch file + ``` + * Create a patch file + ```shell script sed 's/NAMESPACE_OF_SERVICE_ACCOUNT/REPLACE_WITH_NAMESPACE/g' admission/webhook.yaml | kubectl create -f - cat > modified-webhook.yaml < - In case you have several REC objects on your K8S cluster you need to limit the webhook to the relevant namespace. - This is done by adding a `namespaceSelector` to the webhook spec that targets a label found on the namespace.
- First, make sure you have such a relevant label on the namespace and that it is unique for this namespace. e.g. - ``` - apiVersion: v1 - kind: Namespace - metadata: - labels: - namespace-name: staging - name: staging - ``` - Then patch the webhook with a namespaceSelector. See this example: - ``` + * Limiting the webhook to the relevant namespaces: + Unless limited, webhooks will intercept requests from all namespaces.
+ In case you have several REC objects on your K8S cluster you need to limit the webhook to the relevant namespace. + This is done by adding a `namespaceSelector` to the webhook spec that targets a label found on the namespace.
+ + * First, make sure you have such a relevant label on the namespace and that it is unique for this namespace. e.g. + + ```yaml + apiVersion: v1 + kind: Namespace + metadata: + labels: + namespace-name: staging + name: staging + ``` + + * Then, patch the webhook with a namespaceSelector. See this example: + ```shell script cat > modified-webhook.yaml < Date: Thu, 4 Nov 2021 20:46:40 +0200 Subject: [PATCH 2/2] Update .gitignore --- .gitignore | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/.gitignore b/.gitignore index 5c3bdbb..485dee6 100644 --- a/.gitignore +++ b/.gitignore @@ -1 +1 @@ -*bundle.yaml +.idea