Skip to content

Commit d4878a8

Browse files
authored
promoting version 7.2.4-2 (#267)
1 parent a4def4a commit d4878a8

26 files changed

+243
-1625
lines changed

active_active_database_readme.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -754,6 +754,7 @@ From the output fetch the redis 'targetPort':
754754

755755
## Limitations
756756

757+
757758
### No migration from the previous AA method
758759
migrating Active-Active database with non-operator managed Active-Active database is currently not supported.
759760

admission/GESHER.md

Lines changed: 0 additions & 254 deletions
This file was deleted.

admission/README.md

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,8 +2,6 @@
22

33
Redis Labs' Redis Enterprise Operator provides an installable admission control that can be used to verify RedisEnterpriseDatabase, RedisEnterpriseActiveActiveDatabase and RedisEnterpriseRemoteCluster resources on creation and modification for correctness. This prevents end users from creating syntatically valid but functionally invalid database configurations. The admission control leverages Kubernetes' built in [Dynamic Admission Control](https://kubernetes.io/docs/reference/access-authn-authz/extensible-admission-controllers/).
44

5-
**Note:** Redis Labs' Redis Enterprise Operator can also be installed through the [Gesher Admission Proxy](GESHER.md)
6-
75
## Hooking up the Admission controller directly with Kubernetes
86
**NOTE**: This only has to be done the first time setting up the redis enterprise operator, it can be skipped on update
97

admission/gesher/cluster_role.yaml

Lines changed: 0 additions & 25 deletions
This file was deleted.

admission/gesher/cluster_role_binding.yaml

Lines changed: 0 additions & 14 deletions
This file was deleted.

0 commit comments

Comments
 (0)