You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: content/post/kubedb-v2025.5.30/index.md
+14-7Lines changed: 14 additions & 7 deletions
Original file line number
Diff line number
Diff line change
@@ -247,7 +247,7 @@ spec:
247
247
```bash
248
248
➤ kubectl get hazelcast -n demo hazelcast-standalone
249
249
NAME VERSION STATUS AGE
250
-
hazelcast-standalone 5.5.2Ready 2m39s
250
+
hazelcast-standalone 5.5.2 Ready 2m39s
251
251
```
252
252
253
253
### Deploy a `Replicaset` Instance with multiple replicas
@@ -492,11 +492,14 @@ Finally, the operator will update the database cluster with the new credential a
492
492
493
493
494
494
## Redis
495
-
New Feature: Rotate Authentication Credentials for Redis
495
+
### New Feature: Rotate Authentication Credentials for Redis
496
496
`RotateAuth`OpsRequest for `Redis` has been added. If a user wants to update the authentication credentials for a particular database, they can create an `OpsRequest` of type `RotateAuth` with or without referencing an authentication secret.
497
-
Rotate Authentication Without Referencing a Secret
497
+
498
+
#### Rotate Authentication Without Referencing a Secret
498
499
If the secret is not referenced, the `ops-manager` operator will create new credentials and update the existing secret with the new credentials.
500
+
499
501
Example YAML:
502
+
500
503
```yaml
501
504
apiVersion: ops.kubedb.com/v1alpha1
502
505
kind: RedisOpsRequest
@@ -509,7 +512,7 @@ spec:
509
512
name: rd-demo
510
513
```
511
514
512
-
Rotate Authentication With a Referenced Secret
515
+
#### Rotate Authentication With a Referenced Secret
513
516
If a secret is referenced, the operator will update the `.spec.authSecret.name` field with the new secret name. Archives the old credentials in the newly created secret under the keys `username.prev` and `password.prev`.
514
517
515
518
New Secret Example:
@@ -542,12 +545,15 @@ spec:
542
545
```
543
546
Finally, the operator will update the database with the new credential and the old credentials will be stored in the secret with keys `username.prev` and `password.prev`. We have added a field `.spec.authSecret.activeFrom` to the db yaml which refers to the timestamp of the credential is active from. We also add an annotation `kubedb.com/auth-active-from` in currently using auth secret which refers to the active from time of this secret.
544
547
548
+
**Note:** The `RotateAuth` OpsRequest can be applied to **Valkey** in the same way as it is for **Redis**.
549
+
545
550
## RedisSentinel
546
551
547
552
### Rotate Authentication Credentials for RedisSentinel
548
553
`RotateAuth`OpsRequest for `RedisSentinel` has been added. If a user wants to update the authentication credentials for `RedisSentinel`, they can create an `OpsRequest` of type `RotateAuth` with or without referencing an authentication secret.
549
-
Rotate Authentication Without Referencing a Secret
554
+
#### Rotate Authentication Without Referencing a Secret
550
555
If the secret is not referenced, the `ops-manager` operator will create new credentials and update the existing secret with the new credentials.
556
+
551
557
Example YAML:
552
558
```yaml
553
559
apiVersion: ops.kubedb.com/v1alpha1
@@ -561,8 +567,9 @@ spec:
561
567
name: sen-demo
562
568
```
563
569
564
-
### Rotate Authentication With a Referenced Secret
570
+
#### Rotate Authentication With a Referenced Secret
565
571
If a secret is referenced, the operator will update the `.spec.authSecret.name` field with the new secret name. Archives the old credentials in the newly created secret under the keys `username.prev` and `password.prev`.
572
+
566
573
New Secret Example:
567
574
```yaml
568
575
apiVersion: v1
@@ -593,7 +600,7 @@ spec:
593
600
```
594
601
Finally, the operator will update the sentinel with the new credential and the old credentials will be stored in the secret with keys `username.prev` and `password.prev`. We have added a field `.spec.authSecret.activeFrom` to the db yaml which refers to the timestamp of the credential is active from. We also add an annotation `kubedb.com/auth-active-from` in currently using auth secret which refers to the active from time of this secret.
595
602
596
-
603
+
**Note:** The `RotateAuth` OpsRequest can be applied to **Valkeysentinel** in the same way as it is for **Redissentinel**.
597
604
## SingleStore
598
605
599
606
In this release, we have addressed a bug related to the SingleStore Backup process. Previously the `databases` flag was not functioning properly, which occasionally caused issues during backup. This issue has been fixed in this release.
0 commit comments