diff --git a/content/embeds/supported-platforms-embed.md b/content/embeds/supported-platforms-embed.md index fdac03bde6..6e079cd18f 100644 --- a/content/embeds/supported-platforms-embed.md +++ b/content/embeds/supported-platforms-embed.md @@ -5,7 +5,7 @@ Redis Enterprise Software is supported on several operating systems, cloud envi Supported – The platform is supported for this version of Redis Enterprise Software and Redis Stack modules. -⚠️ Deprecation warning – The platform is still supported for this version of Redis Enterprise Software, but support will be removed in a future release. +:warning: Deprecation warning – The platform is still supported for this version of Redis Enterprise Software, but support will be removed in a future release. | Redis Enterprise
major versions | 7.4 | 7.2 | 6.4 | 6.2 | |---------------------------------|:-----:|:-----:|:-----:|:-----:| @@ -14,10 +14,10 @@ Redis Enterprise Software is supported on several operating systems, cloud envi | **Platforms** | | | | | | RHEL 9 &
compatible distros[1](#table-note-1) | | – | – | – | | RHEL 8 &
compatible distros[1](#table-note-1) | | | | | -| RHEL 7 &
compatible distros[1](#table-note-1) | – | ⚠️ | | | +| RHEL 7 &
compatible distros[1](#table-note-1) | – | :warning: | | | | Ubuntu 20.04[2](#table-note-2) | | | | – | -| Ubuntu 18.04[2](#table-note-2) | ⚠️ | ⚠️ | | | -| Ubuntu 16.04[2](#table-note-2) | – | ⚠️ | | | +| Ubuntu 18.04[2](#table-note-2) | :warning: | :warning: | | | +| Ubuntu 16.04[2](#table-note-2) | – | :warning: | | | | Amazon Linux 2 | | | | – | | Amazon Linux 1 | – | | | | | Kubernetes[3](#table-note-3) | | | | | diff --git a/content/operate/rs/databases/active-active/create.md b/content/operate/rs/databases/active-active/create.md index c5a4d46582..836921933c 100644 --- a/content/operate/rs/databases/active-active/create.md +++ b/content/operate/rs/databases/active-active/create.md @@ -104,7 +104,9 @@ You cannot add RAM-only clusters and [flash-enabled clusters]({{< relref "/opera ## Configuration settings -- **Name** - The database name requirements are: +- **Database version** - The Redis version used by your database. + +- **Database name** - The database name requirements are: - Maximum of 63 characters @@ -114,7 +116,7 @@ You cannot add RAM-only clusters and [flash-enabled clusters]({{< relref "/opera - Case-sensitive -- **Endpoint port number** - You can define the port number that clients use to connect to the database. Otherwise, a port is randomly selected. +- **Port** - You can define the port number that clients use to connect to the database. Otherwise, a port is randomly selected. {{< note >}} You cannot change the [port number]({{< relref "/operate/rs/networking/port-configurations.md" >}}) diff --git a/content/operate/rs/databases/create.md b/content/operate/rs/databases/create.md index b522cba56f..5922c21b2d 100644 --- a/content/operate/rs/databases/create.md +++ b/content/operate/rs/databases/create.md @@ -43,6 +43,8 @@ To quickly create a database and skip additional configuration options during in 1. On the **Databases** screen, select **Quick database**. +1. Select a Redis version from the **Database version** list. + 1. Configure settings that are required for database creation but can be changed later: - Database name @@ -83,6 +85,8 @@ To create a new database and configure additional settings: For Active-Active databases, see [Create an Active-Active geo-replicated database]({{< relref "/operate/rs/databases/active-active/create" >}}). {{}} +1. Select a Redis version from the **Database version** list. + 1. Enter a **Database name**. - Maximum of 63 characters diff --git a/content/operate/rs/references/cli-utilities/rladmin/tune.md b/content/operate/rs/references/cli-utilities/rladmin/tune.md index 07692e7708..dd31bafea8 100644 --- a/content/operate/rs/references/cli-utilities/rladmin/tune.md +++ b/content/operate/rs/references/cli-utilities/rladmin/tune.md @@ -46,6 +46,7 @@ rladmin tune cluster [ db_conns_auditing { enabled | disabled } ] [ acl_pubsub_default { resetchannels | allchannels } ] [ resp3_default { enabled | disabled } ] + [ automatic_node_offload { enabled | disabled } ] ``` ### Parameters @@ -53,6 +54,7 @@ rladmin tune cluster | Parameters | Type/Value | Description | |----------------------------------------|-----------------------------------|------------------------------------------------------------------------------------------------------------------------------| | acl_pubsub_default | `resetchannels`
`allchannels` | Default pub/sub ACL rule for all databases in the cluster:
•`resetchannels` blocks access to all channels (restrictive)
•`allchannels` allows access to all channels (permissive) | +| automatic_node_offload | `enabled`
`disabled` | Define whether automatic node offload migration will take place | | data_internode_encryption | `enabled`
`disabled` | Activates or deactivates [internode encryption]({{< relref "/operate/rs/security/encryption/internode-encryption" >}}) for new databases | | db_conns_auditing | `enabled`
`disabled` | Activates or deactivates [connection auditing]({{< relref "/operate/rs/security/audit-events" >}}) by default for new databases of a cluster | | default_concurrent_restore_actions | integer
`all` | Default number of concurrent actions when restoring a node from a snapshot (positive integer or "all") | diff --git a/content/operate/rs/references/rest-api/objects/cluster_settings.md b/content/operate/rs/references/rest-api/objects/cluster_settings.md index 43500afb15..d91d25e649 100644 --- a/content/operate/rs/references/rest-api/objects/cluster_settings.md +++ b/content/operate/rs/references/rest-api/objects/cluster_settings.md @@ -16,6 +16,7 @@ Cluster resources management policy |------|------------|-------------| | acl_pubsub_default | `resetchannels`
`allchannels` | Default pub/sub ACL rule for all databases in the cluster:
•`resetchannels` blocks access to all channels (restrictive)
•`allchannels` allows access to all channels (permissive) | | auto_recovery | boolean (default: false) | Defines whether to use automatic recovery after shard failure | +| automatic_node_offload | boolean (default: true) | Defines whether the cluster will automatically migrate shards from a node, in case the node is overbooked | | bigstore_migrate_node_threshold | integer | Minimum free memory (excluding reserved memory) allowed on a node before automatic migration of shards from it to free more memory | | bigstore_migrate_node_threshold_p | integer | Minimum free memory (excluding reserved memory) allowed on a node before automatic migration of shards from it to free more memory | | bigstore_provision_node_threshold | integer | Minimum free memory (excluding reserved memory) allowed on a node before new shards can no longer be added to it | diff --git a/content/operate/rs/release-notes/rs-7-4-2-releases/rs-7-4-2-126.md b/content/operate/rs/release-notes/rs-7-4-2-releases/rs-7-4-2-126.md new file mode 100644 index 0000000000..ce412ec0b1 --- /dev/null +++ b/content/operate/rs/release-notes/rs-7-4-2-releases/rs-7-4-2-126.md @@ -0,0 +1,227 @@ +--- +Title: Redis Enterprise Software release notes 7.4.2-126 (April 2024) +alwaysopen: false +categories: +- docs +- operate +- rs +compatibleOSSVersion: Redis 7.2.0 +description: Redis database version selection during database creation in the Cluster Manager UI. New Redis logo. +linkTitle: 7.4.2-126 (April 2024) +weight: 70 +--- + +This is a maintenance release for ​[​Redis Enterprise Software version 7.4.2](https://redis.com/redis-enterprise-software/download-center/software/). + +## Highlights + +This version offers: + +- Redis database version selection during database creation in the Cluster Manager UI + +- New Redis logo + +## New in this release + +### Enhancements + +- New Cluster Manager UI enhancements: + + - You can choose the Redis database version during [database creation]({{}}). + + - Updated the Redis logo. + +#### Redis module feature sets + +Redis Enterprise comes packaged with several modules. As of version 7.4.2, Redis Enterprise includes two feature sets, compatible with different Redis database versions. + +Bundled Redis modules compatible with Redis database version 7.2: + +- [RediSearch 2.8.12]({{< relref "/operate/oss_and_stack/stack-with-enterprise/release-notes/redisearch/redisearch-2.8-release-notes.md" >}}) + +- [RedisJSON 2.6.9]({{< relref "/operate/oss_and_stack/stack-with-enterprise/release-notes/redisjson/redisjson-2.6-release-notes.md" >}}) + +- [RedisTimeSeries 1.10.11]({{< relref "/operate/oss_and_stack/stack-with-enterprise/release-notes/redistimeseries/redistimeseries-1.10-release-notes.md" >}}) + +- [RedisBloom 2.6.12]({{< relref "/operate/oss_and_stack/stack-with-enterprise/release-notes/redisbloom/redisbloom-2.6-release-notes.md" >}}) + +- [RedisGears 2.0.19](https://github.com/RedisGears/RedisGears/releases/tag/v2.0.19-m20) + +Bundled Redis modules compatible with Redis database versions 6.0 and 6.2: + +- [RediSearch 2.6.16]({{< relref "/operate/oss_and_stack/stack-with-enterprise/release-notes/redisearch/redisearch-2.6-release-notes.md" >}}) + +- [RedisJSON 2.4.8]({{< relref "/operate/oss_and_stack/stack-with-enterprise/release-notes/redisjson/redisjson-2.4-release-notes.md" >}}) + +- [RedisTimeSeries 1.8.12]({{< relref "/operate/oss_and_stack/stack-with-enterprise/release-notes/redistimeseries/redistimeseries-1.8-release-notes.md" >}}) + +- [RedisBloom 2.4.9]({{< relref "/operate/oss_and_stack/stack-with-enterprise/release-notes/redisbloom/redisbloom-2.4-release-notes.md" >}}) + +- [RedisGraph v2.10.15]({{< relref "/operate/oss_and_stack/stack-with-enterprise/release-notes/redisgraph/redisgraph-2.10-release-notes.md" >}}) + +### Resolved issues + +- RS113727: Added `automatic_node_offload` policy, which defines whether the cluster can automatically migrate shards from a node if the node is overbooked and is enabled by default. During an upgrade, don't offload even if the policy is enabled. + +- RS113828: Removed legacy function that adjusted existing users to role-based access control. + +- RS115636: Delete tasks with "aborted" status from the resource manager result queue. + +- RS122225: Improved descriptions in Cluster Manager UI logs for database upgrade, check node error, and upgrade mode. + +- RS122031: Improved performance of database search in the Cluster Manager UI. + +- RS121866: Block scripts that contain write commands from running on stale CRDB servers. + +- RS122570: Improved error message when unable to locate a requested CRDB-compatible module during Active-Active database creation. + +- RS120820: When using OSS Cluster API, improved availability during failover, database migration, database upgrade, and node optimization. + +- RS117388: Improved `rladmin status` output for stale shards. + +## Version changes + +### Supported platforms + +The following table provides a snapshot of supported platforms as of this Redis Enterprise Software release. See the [supported platforms reference]({{< relref "/operate/rs/references/supported-platforms" >}}) for more details about operating system compatibility. + + Supported – The platform is supported for this version of Redis Enterprise Software and Redis Stack modules. + +:warning: Deprecation warning – The platform is still supported for this version of Redis Enterprise Software, but support will be removed in a future release. + +| Redis Enterprise
major versions | 7.4 | 7.2 | 6.4 | 6.2 | +|---------------------------------|:-----:|:-----:|:-----:|:-----:| +| **Release date** | Feb 2024 | Aug 2023 | Feb 2023 | Aug 2021 | +| [**End-of-life date**]({{< relref "/operate/rs/installing-upgrading/product-lifecycle#endoflife-schedule" >}}) | Determined after
next major release | July 2025 | Feb 2025 | Aug 2024 | +| **Platforms** | | | | | +| RHEL 9 &
compatible distros[1](#table-note-1) | | – | – | – | +| RHEL 8 &
compatible distros[1](#table-note-1) | | | | | +| RHEL 7 &
compatible distros[1](#table-note-1) | – | :warning: | | | +| Ubuntu 20.04[2](#table-note-2) | | | | – | +| Ubuntu 18.04[2](#table-note-2) | :warning: | :warning: | | | +| Ubuntu 16.04[2](#table-note-2) | – | :warning: | | | +| Amazon Linux 2 | | | | – | +| Amazon Linux 1 | – | | | | +| Kubernetes[3](#table-note-3) | | | | | +| Docker[4](#table-note-4) | | | | | + +1. The RHEL-compatible distributions CentOS, CentOS Stream, Alma, and Rocky are supported if they have full RHEL compatibility. Oracle Linux running the Red Hat Compatible Kernel (RHCK) is supported, but the Unbreakable Enterprise Kernel (UEK) is not supported. + +2. The server version of Ubuntu is recommended for production installations. The desktop version is only recommended for development deployments. + +3. See the [Redis Enterprise for Kubernetes documentation]({{< relref "/operate/kubernetes/reference/supported_k8s_distributions" >}}) for details about support per version and Kubernetes distribution. + +4. +[Docker images]({{< relref "/operate/rs/installing-upgrading/quickstarts/docker-quickstart" >}}) of Redis Enterprise Software are certified for development and testing only. + +## Downloads + +The following table shows the MD5 checksums for the available packages: + +| Package | MD5 checksum (7.4.2-126 April release) | +|---------|---------------------------------------| +| Ubuntu 18 | 0cca90f27f368d35b9ca08e4016047c7 | +| Ubuntu 20 | 1933107157365c1c1b38b69b9644b47 | +| Red Hat Enterprise Linux (RHEL) 8 | 4eb11678fa80cddca17fc7cfb94b9289 | +| Red Hat Enterprise Linux (RHEL) 9 | 217b6669ff8ac5bbcc2fc8fbc2930c59 | +| Amazon Linux 2 | d0f472f173f09c56a14c57f17d146deb | + +## Security + +#### Open source Redis security fixes compatibility + +As part of Redis's commitment to security, Redis Enterprise Software implements the latest [security fixes](https://github.com/redis/redis/releases) available with [open source Redis](https://github.com/redis/redis). Redis Enterprise has already included the fixes for the relevant CVEs. + +Some CVEs announced for open source Redis do not affect Redis Enterprise due to different or additional functionality available in Redis Enterprise that is not available in open source Redis. + +Redis Enterprise 7.4.2 supports open source Redis 7.2, 6.2, and 6.0. Below is the list of open source Redis CVEs fixed by version. + +Redis 7.2.x: + +- (CVE-2023-41056) In some cases, Redis may incorrectly handle resizing of memory buffers, which can result in incorrect accounting of buffer sizes and lead to heap overflow and potential remote code execution. + +- (CVE-2023-41053) Redis does not correctly identify keys accessed by `SORT_RO` and, as a result, may grant users executing this command access to keys that are not explicitly authorized by the ACL configuration. (Redis 7.2.1) + +Redis 7.0.x: + +- (CVE-2023-41056) In some cases, Redis may incorrectly handle resizing of memory buffers, which can result in incorrect accounting of buffer sizes and lead to heap overflow and potential remote code execution. + +- (CVE-2023-41053) Redis does not correctly identify keys accessed by `SORT_RO` and, as a result, may grant users executing this command access to keys that are not explicitly authorized by the ACL configuration. (Redis 7.0.13) + +- (CVE-2023-36824) Extracting key names from a command and a list of arguments may, in some cases, trigger a heap overflow and result in reading random heap memory, heap corruption, and potentially remote code execution. Specifically: using `COMMAND GETKEYS*` and validation of key names in ACL rules. (Redis 7.0.12) + +- (CVE-2023-28856) Authenticated users can use the `HINCRBYFLOAT` command to create an invalid hash field that will crash Redis on access. (Redis 7.0.11) + +- (CVE-2023-28425) Specially crafted `MSETNX` command can lead to assertion and denial-of-service. (Redis 7.0.10) + +- (CVE-2023-25155) Specially crafted `SRANDMEMBER`, `ZRANDMEMBER`, and `HRANDFIELD` commands can trigger an integer overflow, resulting in a runtime assertion and termination of the Redis server process. (Redis 7.0.9) + +- (CVE-2023-22458) Integer overflow in the Redis `HRANDFIELD` and `ZRANDMEMBER` commands can lead to denial-of-service. (Redis 7.0.8) + +- (CVE-2022-36021) String matching commands (like `SCAN` or `KEYS`) with a specially crafted pattern to trigger a denial-of-service attack on Redis, causing it to hang and consume 100% CPU time. (Redis 7.0.9) + +- (CVE-2022-35977) Integer overflow in the Redis `SETRANGE` and `SORT`/`SORT_RO` commands can drive Redis to OOM panic. (Redis 7.0.8) + +- (CVE-2022-35951) Executing an `XAUTOCLAIM` command on a stream key in a specific state, with a specially crafted `COUNT` argument, may cause an integer overflow, a subsequent heap overflow, and potentially lead to remote code execution. The problem affects Redis versions 7.0.0 or newer. (Redis 7.0.5) + +- (CVE-2022-31144) A specially crafted `XAUTOCLAIM` command on a stream key in a specific state may result in heap overflow and potentially remote code execution. The problem affects Redis versions 7.0.0 or newer. (Redis 7.0.4) + +- (CVE-2022-24834) A specially crafted Lua script executing in Redis can trigger a heap overflow in the cjson and cmsgpack libraries, and result in heap corruption and potentially remote code execution. The problem exists in all versions of Redis with Lua scripting support, starting from 2.6, and affects only authenticated and authorized users. (Redis 7.0.12) + +- (CVE-2022-24736) An attacker attempting to load a specially crafted Lua script can cause NULL pointer dereference which will result in a crash of the `redis-server` process. This issue affects all versions of Redis. (Redis 7.0.0) + +- (CVE-2022-24735) By exploiting weaknesses in the Lua script execution environment, an attacker with access to Redis can inject Lua code that will execute with the (potentially higher) privileges of another Redis user. (Redis 7.0.0) + +Redis 6.2.x: + +- (CVE-2023-28856) Authenticated users can use the `HINCRBYFLOAT` command to create an invalid hash field that will crash Redis on access. (Redis 6.2.12) + +- (CVE-2023-25155) Specially crafted `SRANDMEMBER`, `ZRANDMEMBER`, and `HRANDFIELD` commands can trigger an integer overflow, resulting in a runtime assertion and termination of the Redis server process. (Redis 6.2.11) + +- (CVE-2023-22458) Integer overflow in the Redis `HRANDFIELD` and `ZRANDMEMBER` commands can lead to denial-of-service. (Redis 6.2.9) + +- (CVE-2022-36021) String matching commands (like `SCAN` or `KEYS`) with a specially crafted pattern to trigger a denial-of-service attack on Redis, causing it to hang and consume 100% CPU time. (Redis 6.2.11) + +- (CVE-2022-35977) Integer overflow in the Redis `SETRANGE` and `SORT`/`SORT_RO` commands can drive Redis to OOM panic. (Redis 6.2.9) + +- (CVE-2022-24834) A specially crafted Lua script executing in Redis can trigger a heap overflow in the cjson and cmsgpack libraries, and result in heap corruption and potentially remote code execution. The problem exists in all versions of Redis with Lua scripting support, starting from 2.6, and affects only authenticated and authorized users. (Redis 6.2.13) + +- (CVE-2022-24736) An attacker attempting to load a specially crafted Lua script can cause NULL pointer dereference which will result in a crash of the `redis-server` process. This issue affects all versions of Redis. (Redis 6.2.7) + +- (CVE-2022-24735) By exploiting weaknesses in the Lua script execution environment, an attacker with access to Redis can inject Lua code that will execute with the (potentially higher) privileges of another Redis user. (Redis 6.2.7) + +- (CVE-2021-41099) Integer to heap buffer overflow handling certain string commands and network payloads, when `proto-max-bulk-len` is manually configured to a non-default, very large value. (Redis 6.2.6) + +- (CVE-2021-32762) Integer to heap buffer overflow issue in `redis-cli` and `redis-sentinel` parsing large multi-bulk replies on some older and less common platforms. (Redis 6.2.6) + +- (CVE-2021-32761) An integer overflow bug in Redis version 2.2 or newer can be exploited using the `BITFIELD` command to corrupt the heap and potentially result with remote code execution. (Redis 6.2.5) + +- (CVE-2021-32687) Integer to heap buffer overflow with intsets, when `set-max-intset-entries` is manually configured to a non-default, very large value. (Redis 6.2.6) + +- (CVE-2021-32675) Denial Of Service when processing RESP request payloads with a large number of elements on many connections. (Redis 6.2.6) + +- (CVE-2021-32672) Random heap reading issue with Lua Debugger. (Redis 6.2.6) + +- (CVE-2021-32628) Integer to heap buffer overflow handling ziplist-encoded data types, when configuring a large, non-default value for `hash-max-ziplist-entries`, `hash-max-ziplist-value`, `zset-max-ziplist-entries` or `zset-max-ziplist-value`. (Redis 6.2.6) + +- (CVE-2021-32627) Integer to heap buffer overflow issue with streams, when configuring a non-default, large value for `proto-max-bulk-len` and `client-query-buffer-limit`. (Redis 6.2.6) + +- (CVE-2021-32626) Specially crafted Lua scripts may result with Heap buffer overflow. (Redis 6.2.6) + +- (CVE-2021-32625) An integer overflow bug in Redis version 6.0 or newer can be exploited using the STRALGO LCS command to corrupt the heap and potentially result with remote code execution. This is a result of an incomplete fix by CVE-2021-29477. (Redis 6.2.4) + +- (CVE-2021-29478) An integer overflow bug in Redis 6.2 could be exploited to corrupt the heap and potentially result with remote code execution. The vulnerability involves changing the default set-max-intset-entries configuration value, creating a large set key that consists of integer values and using the COPY command to duplicate it. The integer overflow bug exists in all versions of Redis starting with 2.6, where it could result with a corrupted RDB or DUMP payload, but not exploited through COPY (which did not exist before 6.2). (Redis 6.2.3) + +- (CVE-2021-29477) An integer overflow bug in Redis version 6.0 or newer could be exploited using the STRALGO LCS command to corrupt the heap and potentially result in remote code execution. The integer overflow bug exists in all versions of Redis starting with 6.0. (Redis 6.2.3) + +Redis 6.0.x: + +- (CVE-2022-24834) A specially crafted Lua script executing in Redis can trigger a heap overflow in the cjson and cmsgpack libraries, and result in heap corruption and potentially remote code execution. The problem exists in all versions of Redis with Lua scripting support, starting from 2.6, and affects only authenticated and authorized users. (Redis 6.0.20) + +- (CVE-2023-28856) Authenticated users can use the `HINCRBYFLOAT` command to create an invalid hash field that will crash Redis on access. (Redis 6.0.19) + +- (CVE-2023-25155) Specially crafted `SRANDMEMBER`, `ZRANDMEMBER`, and `HRANDFIELD` commands can trigger an integer overflow, resulting in a runtime assertion and termination of the Redis server process. (Redis 6.0.18) + +- (CVE-2022-36021) String matching commands (like `SCAN` or `KEYS`) with a specially crafted pattern to trigger a denial-of-service attack on Redis, causing it to hang and consume 100% CPU time. (Redis 6.0.18) + +- (CVE-2022-35977) Integer overflow in the Redis `SETRANGE` and `SORT`/`SORT_RO` commands can drive Redis to OOM panic. (Redis 6.0.17) diff --git a/static/images/rs/screenshots/cluster/setup/admin-credentials.png b/static/images/rs/screenshots/cluster/setup/admin-credentials.png index ef6e7c373f..01d92bc630 100644 Binary files a/static/images/rs/screenshots/cluster/setup/admin-credentials.png and b/static/images/rs/screenshots/cluster/setup/admin-credentials.png differ diff --git a/static/images/rs/screenshots/cluster/setup/create-cluster.png b/static/images/rs/screenshots/cluster/setup/create-cluster.png index dc33d52c39..44c0f140ab 100644 Binary files a/static/images/rs/screenshots/cluster/setup/create-cluster.png and b/static/images/rs/screenshots/cluster/setup/create-cluster.png differ diff --git a/static/images/rs/screenshots/cluster/setup/node-settings.png b/static/images/rs/screenshots/cluster/setup/node-settings.png index 9af88f2273..31860ca84f 100644 Binary files a/static/images/rs/screenshots/cluster/setup/node-settings.png and b/static/images/rs/screenshots/cluster/setup/node-settings.png differ diff --git a/static/images/rs/screenshots/databases/db-screen.png b/static/images/rs/screenshots/databases/db-screen.png index 3a5bcf68c0..fb5567233c 100644 Binary files a/static/images/rs/screenshots/databases/db-screen.png and b/static/images/rs/screenshots/databases/db-screen.png differ diff --git a/static/images/rs/screenshots/databases/quick-db-flash.png b/static/images/rs/screenshots/databases/quick-db-flash.png index e5a56770a6..7c020aee71 100644 Binary files a/static/images/rs/screenshots/databases/quick-db-flash.png and b/static/images/rs/screenshots/databases/quick-db-flash.png differ diff --git a/static/images/rs/screenshots/databases/quick-db.png b/static/images/rs/screenshots/databases/quick-db.png index 96177b451f..eccc3dc84a 100644 Binary files a/static/images/rs/screenshots/databases/quick-db.png and b/static/images/rs/screenshots/databases/quick-db.png differ